NewzIntel.com

    • Checkout Page
    • Contact Us
    • Default Redirect Page
    • Frontpage
    • Home-2
    • Home-3
    • Lost Password
    • Member Login
    • Member LogOut
    • Member TOS Page
    • My Account
    • NewzIntel Alert Control-Panel
    • NewzIntel Latest Reports
    • Post Views Counter
    • Privacy Policy
    • Public Individual Page
    • Register
    • Subscription Plan
    • Thank You Page

Category: Law

  • MIL-OSI Security: Laredo man sentenced to 63 months for smuggling over 100 illegal aliens in locked trailer

    Source: Office of United States Attorneys

    LAREDO, Texas – A 49-year-old resident of Laredo has been ordered to federal prison for his role in a conspiracy to transport illegal aliens, announced U.S. Attorney Nicholas J. Ganjei.

    Juan Manuel Aguirre pleaded guilty Feb. 6.

    U.S. District Judge Keith P. Ellison has now ordered Aguirre to serve 63 months in federal prison to be immediately followed by three years of supervised release. At the hearing, the court considered Aguirre’s history of smuggling aliens on multiple occasions and the danger he posed by transporting them in a sealed, locked, dark and unventilated trailer that required authorities to open with a bolt cutter. 

    “Human smuggling is an incredibly dangerous enterprise, and it requires the trafficker to care absolutely nothing about the lives and safety of those they transport,” said Ganjei. “Fortunately, there were no deaths in this case, but the underlying facts indicate that several of those transported had difficulty breathing and feared for their life. The Southern District of Texas will make sure that all human smugglers pay a serious price for their callousness.”

    On Dec. 2, 2024, law enforcement observed several individuals being loading into a white trailer in a warehouse parking lot. Aguirre was the driver of the truck hauling it. After he departed the location, authorities conducted a traffic stop which resulted in the discovery of 101 aliens locked inside the trailer, 13 of whom were children as young as 13 years old.

    Multiple illegal aliens reported they had difficulty breathing and feared for their life due to the conditions in the trailer. They were from the countries of Mexico, Guatemala, Cuba and Honduras.

    Aguirre will remain in custody pending transfer to a Federal Bureau of Prisons facility to be determined in the near future.

    Immigration and Customs Enforcement – Homeland Security Investigations, FBI, Texas Department of Public Safety and Border Patrol conducted the Organized Crime Drug Enforcement Task Forces (OCDETF) operation with the assistance of Customs and Border Protection, Drug Enforcement Administration and Webb County Sheriff’s Office. OCDETF identifies, disrupts and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found on the Department of Justice’s OCDETF webpage.

    Assistant U.S. Attorney Brandon Scott Bowling is prosecuting the case.

    MIL Security OSI –

    July 23, 2025
  • MIL-OSI USA: Luján Secures Nearly $17 Million in Federal Investments for New Mexico in Committee-Passed Appropriations Bills

    US Senate News:

    Source: United States Senator Ben Ray Luján (D-New Mexico)

    Washington, D.C. – Today, U.S. Senator Ben Ray Luján (D-N.M.) announced funding secured for New Mexico communities through the Appropriations Committee’s bipartisan passage of the Fiscal Year (FY) 2026 Military Construction, Veterans Affairs, and Related Agencies (MilCon-VA) Appropriations Bill and Fiscal Year (FY) 2026 Commerce, Justice, Science, and Related Agencies (CJS) Appropriations Bill.

    From both appropriations bills, Senator Luján secured $16,820,000 in Congressionally Directed Spending for key local projects that will strengthen our national security, boost violence intervention programs, and equip law enforcement with the resources needed to keep New Mexico communities safe.  

    “Across New Mexico, these vital investments will deliver resources to enhance public safety in our communities and upgrade infrastructure at our military bases to boost our military’s readiness and safety,” said Senator Luján. “This funding will equip our brave law enforcement officers with the tools they need to protect New Mexicans, support programs aimed at reducing youth violence and violence in Tribal communities, and reinforce critical infrastructure at our military bases. I’m proud to have fought to secure these investments for our communities, and I’ll continue working to deliver the federal support our families and communities need and deserve.”

    The Committee process is the first step, and the appropriations bills will next be considered by the full U.S. Senate.

    Senator Luján Secured Nearly $17 Million for the Following Local Projects:

    Strengthening New Mexico’s Air Force Bases:

    • $8,100,000 for infrastructure upgrades at Cannon Air Force Base, specifically for ADAL Security Forces Facility. Secured by Senator Luján and Senator Heinrich.
    • $2,000,000 for infrastructure upgrades at Kirtland Air Force Base, specifically for the design for the Wyoming Gate Project. Secured by Senator Luján and Senator Heinrich.
    • $700,000 for infrastructure upgrades at Holloman Air Force Base, specifically for the design for the Holloman High Speed Test Track. Secured by Senator Luján and Senator Heinrich.

    Boosting Public Safety Throughout New Mexico:

    • $1,069,000 for the City of Albuquerque’s Real Time Crime Center for the purchase of law enforcement technology.
    • $1,042,000 for Bernalillo County Sheriff’s Office to purchase a new fleet of vehicles.
    • $1,031,000 for the New Mexico Department of Public Safety Police to provide 5G technology in fleet vehicles. Secured by Senator Luján, Senator Heinrich, and Representative Stansbury in the House-companion bill.
    • $1,000,000 for UNM Office of the Medical Investigator DNA processing laboratory to allow for the purchase of equipment for DNA identification. Secured by Senator Luján and Senator Heinrich.
    • $500,000 for Bernalillo Country public safety technology upgrades to address high rates of crime in the Albuquerque metro area. Secured by Senator Luján, Senator Heinrich, and Representative Vasquez in the House-companion bill.
    • $250,000 for the San Juan County Partnership’s Law Enforcement Assisted Diversion (LEAD) program to assist in mitigating individuals with substance use disorder or mental/behavioral health challenges from continuously interacting with law enforcement.

    Funding Violence Intervention and Prevention Programs:

    • $1,0350,000 for the City of Albuquerque’s expansion of school-based violence intervention program to assist at risk students by improving grades and reducing youth violence.
    • $93,000 for the Coalition to Stop Violence Against Native women to address challenges in domestic violence and sexual violence in Tribal communities.

    MIL OSI USA News –

    July 23, 2025
  • MIL-OSI USA: Amid GOP Assault on Healthcare, Pressley, Duckworth, DeGette, Schakowsky, Frost, Colleagues Unveil EACH Act, Keep Up Fight for Reproductive Justice

    Source: United States House of Representatives – Congresswoman Ayanna Pressley (MA-07)

    Lawmakers File EACH Act to End Hyde Amendment, Lift Unjust Abortion Coverage Restrictions on Medicaid, Other Government Sponsored Plans

    Follows Passage of Big, Ugly Bill that Guts Medicaid, Defunds Planned Parenthood, Further Restricts Healthcare

    Bill Text (PDF) | Floor Speech (YouTube)

    WASHINGTON – Today, as Republicans continue their assault on healthcare, Congresswoman Ayanna Pressley (MA-07), Co-Chair of the Reproductive Freedom Caucus, and Senator Tammy Duckworth (D-IL), along with Congresswoman Diana DeGette (CO-01), Co-Chair of the Reproductive Freedom Caucus, Congresswoman Jan Schakowsky (IL-09), Congressman Maxwell Frost (FL-10), and Senators Patty Murray (D-WA) and Mazie Hirono (D-HI), led their colleagues in reintroducing the Equal Access to Abortion Coverage in Healthcare (EACH) Act, bold legislation to guarantee abortion coverage—regardless of how a patient gets their health insurance. The lawmakers’ bill follows the enactment of Trump and Republicans’ Big, Ugly Bill, which will gut Medicaid, defund Planned Parenthood health centers, and push essential reproductive care further out of reach for millions of people.

    The EACH Act ends the discriminatory Hyde Amendment and lifts unjust abortion coverage restrictions for those who depend on Medicaid and other government-sponsored plans. The bill affirms the fundamental right to abortion care and helps ensure everyone can get the reproductive healthcare they need, regardless of income, insurance, or zip code.

    Rep. Pressley unveiled the bill in a floor speech last night. Full video of that speech is available here.

    “Abortion care is health care, and health care is a human right. With Trump and Republicans advancing a cruel, coordinated assault on our bodily autonomy—gutting Medicaid, defunding Planned Parenthood, and decimating access to care—we must use every tool available to protect and expand reproductive healthcare,” said Congresswoman Pressley, Co-Chair of the Reproductive Freedom Caucus. “The EACH Act would help us do just that. By repealing the racist and discriminatory Hyde Amendment, which has denied necessary care for vulnerable communities for nearly half a century, our bill would help ensure everyone in America can get the reproductive healthcare they need, regardless of income, insurance, or zip code. I’m grateful to Senator Duckworth and our colleagues for their partnership on this critical priority.”

    “Ever since Trump’s far-right Supreme Court majority struck down Roe, Republicans have made it their mission to strip away a woman’s right to reproductive health care—a right they have no place to stand in the way of,” said Senator Duckworth. “As Republicans’ Big, Beautiful Betrayal kicks millions off their health care, we must act to help strengthen access to abortion coverage for low-income Americans, servicemembers and millions more—no matter their zip code. I’m proud to reintroduce this legislation alongside my colleagues so we can do just that.”

    “For nearly 50 years, the Hyde Amendment has been Republicans’ go-to tool for chipping away at abortion rights, denying coverage to the most vulnerable communities,” said Rep. DeGette, Co-Chair of the Reproductive Freedom Caucus. “Now, they’re doubling down with the Big Bad Bill, blocking Medicaid patients from accessing any kind of care, not only abortion care, but also birth control and cancer screenings, at Planned Parenthood. The EACH Act is how we fight back, guaranteeing access to abortion care—no matter your income, your insurance, or your ZIP code”

    “The Hyde Amendment is a racist, discriminatory policy designed to put reproductive and economic freedom out of reach for women of color and low-income women who need an abortion. By restricting Medicaid coverage of abortion, the Hyde Amendment robs those working to make ends meet of the freedom to control their lives and decisions about what is best for their families,” said Congresswoman Jan Schakowsky. “Keeping the Hyde Amendment in place is yet another way for Trump and the extremists in the GOP to limit peoples’ reproductive freedom. Every person should have the freedom to make their own reproductive health care decisions regardless of their income, race, where they work, what zip code they live in, or how they get their insurance. That is why our bill, the EACH Act, will finally repeal the harmful Hyde Amendment. Abortion is health care and health care is a human right.”

    “Women should be able to get the abortion care they need no matter where they live or how much money they have. But for decades, the Hyde Amendment and similar abortion restrictions have blocked low-income women from getting the health care they need and wrongfully divided abortion care from health care for no other reason than Republican politicians’ extreme anti-choice views,” said Senator Murray. “The EACH Act would get rid of the Hyde Amendment and related abortion coverage bans that endanger the health and lives of women who rely on Medicaid or other government-sponsored health coverage. I will always fight to end Hyde and other unjust policies that allow politicians to interfere with women’s ability to make decisions about their bodies, their lives, and their futures.”

    “As Republicans gut Medicaid, defund Planned Parenthoods nationwide, and continue their onslaught of attacks on our bodily autonomy, the Hyde Amendment and other federal coverage restrictions are discriminatory barriers that continue to prevent access to safe and legal abortion care,” said Senator Hirono. “Everyone deserves access to reproductive health care. By ending the Hyde Amendment and expanding coverage for abortion services, the EACH Act would help guarantee abortion access for all, protecting our reproductive rights and our ability to make decisions about our own bodies.”

    “Everyone should have the freedom to control their own lives and bodies, no matter their income, race, or zip code,” said Nourbese Flint, President of All* Above All. “For too long, restrictions like the Hyde Amendment have robbed people working to make ends meet of their ability to make personal decisions about their health, families, and futures. In a time of escalating attacks on reproductive freedom – and efforts to defund Planned Parenthood, shut down clinics, and restrict care – the EACH act sets a powerful standard and helps to end racist and classist health care restrictions. We are proud to support this visionary bill to expand abortion access and ensure coverage for all.”

    Trump and Republicans’ Big, Ugly Bill, which passed Congress earlier this year, will dismantle access to reproductive health care in every state. It will defund Planned Parenthood, block Medicaid reimbursements to health centers, and slash care for millions of people. It would also gut Medicaid, ripping coverage from at least 10 million Americans and cutting off access to essential maternity care, birth control, cancer screenings, and more.

    Text of the EACH Act is available here.

    Joining the lawmakers in introducing the EACH Act are Representatives Alma Adams, Pete Aguilar, Gabe Amo, Yassamin Ansari, Jake Auchincloss, Becca Balint, Nanette Barragán, Joyce Beatty, Wesley Bell, Ami Bera, Don Beyer, Suzanne Bonamici, Shontel Brown, Julia Brownley, Nikki Budzinski, Janelle Bynum, Salud Carbajal, André Carson, Troy Carter, Greg Casar, Ed Case, Sean Casten, Kathy Castor, Joaquin Castro, Sheila Cherfilus-McCormick, Judy Chu, Gil Cisneros, Katherine Clark, Yvette Clarke, Emanuel Cleaver II, Steve Cohen, J. Luis Correa, Angie Craig, Jasmine Crockett, Jason Crow, Sharice Davids, Danny K. Davis, Madeleine Dean, Diana DeGette, Rosa DeLauro, Suzan DelBene, Chris Deluzio, Mark DeSaulnier, Maxine Dexter, Lloyd Doggett, Sarah Elfreth, Veronica Escobar, Adriano Espaillat, Dwight Evans, Shomari Figures, Lizzie Fletcher, Bill Foster, Valerie Foushee, Lois Frankel, Maxwell Frost, John Garamendi, Robert Garcia, Sylvia Garcia, Jesús “Chuy” García, Jared Golden, Dan Goldman, Maggie Goodlander, Josh Gottheimer, Al Green, Jahana Hayes, Jim Himes, Steven Horsford, Val Hoyle, Jared Huffman, Glenn Ivey, Sara Jacobs, Pramila Jayapal, Hank Johnson, Sydney Kamlager-Dove, William R. Keating, Robin Kelly, Tim Kennedy, Ro Khanna, Raja Krishnamoorthi, Greg Landsman, Rick Larsen, John B. Larson, George Latimer, Susie Lee, Summer L. Lee, Teresa Leger Fernández, Mike Levin, Ted Lieu, Seth Magaziner, John Mannion, Doris Matsui, Lucy McBath, Sarah McBride, April McClain Delaney, Jennifer McClellan, Betty McCollum, Morgan McGarvey, Jim McGovern, Gregory Meeks, Rob Menendez, Grace Meng, Kweisi Mfume, Dave Min, Gwen Moore, Joseph Morelle, Kelly Morrison, Jared Moskowitz, Seth Moulton, Kevin Mullin, Jerry Nadler, Eleanor Holmes Norton, Alexandria Ocasio-Cortez, Ilhan Omar, Frank Pallone Jr., Jimmy Panetta, Chris Pappas, Nancy Pelosi, Scott Peters, Brittany Pettersen, Chellie Pingree, Mark Pocan, Mike Quigley, Delia Ramirez, Emily Randall, Jamie Raskin, Luz Rivas, Deborah Ross, Raul Ruiz, Patrick Ryan, Andrea Salinas, Linda T. Sánchez, Mary Gay Scanlon, Jan Schakowsky, Bradley Scott Schneider, Hillary Scholten, Kim Schrier, David Scott, Brad Sherman, Mikie Sherrill, Lateefah Simon, Adam Smith, Eric Sorensen, Darren Soto, Melanie Stansbury, Greg Stanton, Haley Stevens, Marilyn Strickland, Suhas Subramanyam, Eric Swalwell, Emilia Sykes, Mark Takano, Shri Thanedar, Mike Thompson, Dina Titus, Rashida Tlaib, Jill Tokuda, Paul Tonko, Norma Torres, Ritchie Torres, Lori Trahan, Derek T. Tran, Lauren Underwood, Juan Vargas, Gabe Vasquez, Marc Veasey, Nydia M. Velázquez, Debbie Wasserman Schultz, George Whitesides, Nikema Williams, and Frederica Wilson, along with Senators Klobuchar, Warren, Padilla, Merkley, Blumenthal, Rosen, Shaheen, Schiff, Heinrich, Gillibrand, Coons, Cantwell, Van Hollen, Blunt Rochester, Sanders, Gallego, Booker, Smith, Baldwin, Wyden, Welch, Markey, Murphy, Kim, Whitehouse, Fetterman, Cortez Masto, Kelly, and Lujan.

    The EACH Act is endorsed by the following organizations: All* Above All, National Women’s Law Center, Center for Reproductive Rights, Planned Parenthood Federation of America, Center for American Progress, Guttmacher Institute, Power to Decide, National Asian Pacific American Women’s Forum, Brigid Alliance, National Network of Abortion Funds, Midwest Access Coalition, Equality California, Silver State Equality, OutCenter Southwest Michigan, Hadassah, The Women’s Zionist Organization of America, National Abortion Federation, Cobalt, Health Not Prisons Collective, National Family Planning & Reproductive Health Association, Families USA, UCSF Bixby Center for Global Reproductive Health, Center for Biological Diversity, Reproductive Freedom for All, CA LGBTQ Health and Human Services Network, Autistic Women & Nonbinary Network, Physicians for Reproductive Health, Justice and Joy National Collaborative, End Rape On Campus, National Partnership for Women & Families, National Council of Jewish Women, Silver State Hope Fund of Nevada, Above!, The National Association of Nurse Practitioners in Women’s Health (NPWH), National Council of Jewish Women, American Humanist Association, The American Society for Reproductive Medicine, Chicago Abortion Fund, Ibis Reproductive Health, SIECUS: Sex Ed for Social Change, American Atheists, National Health Law Program, National Latina Institute for Reproductive Justice, Advocates for Youth, Courage California, ProgressNow New Mexico, In Our Own Voice: National Black Women’s Reproductive Justice Agenda, EMAA Project, Black Women for Wellness Action Project, Colorado Organization for Latina Opportunity and Reproductive Rights (COLOR), Keystone Progress Education Fund, Wyoming Right To Choose, Safe Abortions For Everyone Maine, REPRO Rising Virginia, National Abortion Federation, National Family Planning & Reproductive Health Association (NFPRHA), National Partnership for Women & Families, Catholics for Choice, Colorado Organization for Latina Opportunity and Reproductive Rights (COLOR), Families USA, American Civil Liberties Union, Indivisible, Women’s Foundation of Florida, People Power United, Equality California, Abortion Forward, Black Women’s Health Imperative, SiX Action, Population Institute, URGE: Unite for Reproductive & Gender Equity, Pregnancy Justice, Just Solutions, UltraViolet Action, National Women’s Political Caucus, Equal Rights Advocates, Feminist Majority Foundation, Clearinghouse on Women’s Issues, American Association of University Women (AAUW), Interfaith Alliance, and Community Catalyst.

    Last month, in the wake of the third anniversary of the Dobbs decision, Congresswoman Pressley spent the week convening leaders and impacted families, renewing her calls for comprehensive legislation to protect abortion care, and uplifting the experiences of people impacted by cruel abortion bans and denials of essential medical care.

    Congresswoman Pressley has been outspoken in demanding justice for Adriana Smith, a 30-year-old pregnant mother who was declared brain dead in February and was forced to remain on life support due to Georgia’s abortion ban. Rep. Pressley delivered an impassioned floor speech in which she underscored that Adriana’s case is far too common in the unjust history of denying Black women their dignity, humanity, and right to bodily autonomy – and that GOP abortion bans such as Georgia’s deepen this pain and bar critical healthcare freedom. Last week, Rep. Pressley issued a statement after Adriana’s infant son Chance was delivered via emergency Cesarean section and Adriana was taken off life support.

    Throughout her time in Congress, Rep. Pressley has fought persistently to protect fundamental reproductive and sexual healthcare rights. 

    • On the first anniversary of the Dobbs decision, Rep. Pressley introduced the Abortion Justice Act, sweeping, intersectional legislation to address access to abortion care and put forth a comprehensive vision of a just America where abortion care is readily available—without stigma, shame or systemic barriers—for all who seek it, regardless of zip code, immigration status, income, or background.
    • Rep. Pressley is a lead co-sponsor of the Women’s Health Protection Act (WHPA), bicameral federal legislation to guarantee equal access to abortion care, everywhere. 
    • Rep. Pressley is also a lead co-sponsor of the EACH Act, bold legislation to repeal the Hyde Amendment and help guarantee abortion coverage—regardless of how a patient gets their health insurance.
    • Shortly before the Supreme Court’s overturning of Roe v. Wade, Rep. Pressley led a group of her Black women colleagues in writing to President Biden urging him to declare a public health emergency amid the unprecedented threats to abortion rights nationwide. 
    • Rep. Pressley condemned the Supreme Court’s leaked draft opinion to overturn Roe v. Wade., and implored the Senate to protect abortion rights and slammed the white supremacist roots of anti-abortion efforts.
    • In October 2024, Rep. Pressley issued a statement on Josseli Barnica, who died on Sept. 3, 2021 after being denied emergency abortion care in Texas as she suffered a miscarriage.
    • In September 2024, in a House Democratic Steering and Policy Committee Hearing, Rep. Pressley highlighted the harmful and deadly impact of abortion bans in America to date, and outlined in detail the shameful circumstances under which Amber Nicole Thurman died after being denied necessary abortion care in Georgia.
    • In June 2024, Rep. Pressley issued a statement on the Supreme Court’s ruling in Idaho v. United States; Moyle v. United States – the case about whether emergency abortion care is included under the Emergency Medical Treatment and Labor Act (EMTALA). 
    • In May 2024, Rep. Pressley issued a statement on a Louisiana bill that would classify medication abortion drugs mifepristone and misoprostol as controlled substances. 
    • In April 2024, at a House Oversight Committee hearing, Rep. Pressley played “Fact or Fiction” with Food and Drug Administration (FDA) Commissioner Robert Califf to emphasize the safety and efficacy of medication abortion drug mifepristone.
    • In August 2023, Rep. Pressley issued a statement on the Fifth Circuit Court decision in Alliance for Hippocratic Medicine v. FDA.
    • In July 2023, Rep. Pressley, alongside Senator Patty Murray (D-WA), Rep. Cori Bush (MO-01), and Senator Tammy Duckworth (D-IL), reintroduced the Reproductive Health Care Accessibility Act, legislation to help people with disabilities—who face discrimination and extra barriers when seeking care—get better access to reproductive healthcare and the informed care they need to control their own reproductive lives.
    • In July 2023, Rep. Pressley applauded the Food and Drug Administration’s (FDA) approval of over-the-counter birth control.
    • In May 2023, Rep. Pressley applauded the FDA Advisory Committee’s unanimous, 17-0 vote to recommend the approval of the first-ever application for over-the-counter birth control. She and Senator Murray also held a press conference applauding the decision and urging the FDA to approval over-the-counter birth control without delay.
    • In May 2023, Rep. Pressley, along with Representatives Alexandria Ocasio-Cortez (NY-14) and Ami Bera, MD (CA-06) and Senators Mazie Hirono (D-HI) and Catherine Cortez Masto (D-NV), reintroduced their bicameral Affordability is Access Act to ensure that once the FDA determines an over-the-counter birth control option to be safe, insurers fully cover over-the-counter birth control without any fees or out-of-pocket costs.
    • In April 2023, Rep. Pressley issued a statement condemning the Texas court ruling on mifepristone, and discussed the Texas case in a recent floor speech in which she affirmed medication abortion as routine medical care and access to mifepristone as essential. She later joined Governor Maura Healey, Senator Elizabth Warren (D-MA), and local leaders in announcing action to protect Mifepristone in Massachusetts.
    • In March 2023, Rep. Pressley, along with Senator Cory Booker (D-NJ) and Reps. Schakowsky, Lee, DeGette, Torres and Strickland, reintroduced the Abortion is Healthcare Everywhere Act harmful and discriminatory Helms Amendment and expand abortion access globally.
    • In March 2023, Rep. Pressley and Senator Hirono led their colleagues in reintroducing a bicameral congressional resolution honoring abortion providers and clinic staff. 
    • In March 2023, Rep. Pressley delivered a speech in which she discussed the pending court case in Texas, which aims to restrict access to medication abortion across the entire nation. In her remarks, Rep. Pressley affirmed medication abortion as routine medical care, and accessibility to the abortion pill mifepristone as essential.
    • In September 2021, Rep. Pressley issued a statement condemning the Supreme Court’s inaction on SB-8, Texas’ restrictive abortion law. Later that month, she participated in a House Oversight Committee hearing to examine the threat posed by abortion bans and underscored the urgency of the Senate passing the Women’s Health Protection Act. 
    • In April 2021, Rep. Pressley, along with Congresswomen Barbara Lee (CA-13), Diana DeGette (CO-01) and Jan Schakowsky (IL-09), led a group of 131 Democratic members in reintroducing the Equal Access to Abortion Coverage in Health Insurance Act or the EACH Act, which would repeal the Hyde Amendment and ensure that all people, regardless of income, insurance or zip code, can make personal reproductive healthcare decisions without interference from politicians. She re-Introduced the legislation In January 2023.
    • Rep. Pressley has led calls in Congress for the FDA to remove medically unnecessary restrictions on the medication abortion drug mifepristone, and applauded the FDA’s action in January 2023 to allow retail pharmacies to dispense abortion medication pills.
    • As Chair of the Pro-Choice Caucus’s Abortion Rights and Access Task Force, Congresswoman Pressley has led the fight to repeal the Hyde Amendments from annual Labor, Health and Human Services, Education and Related Agencies appropriations bills and in July 2020 published a Medium post on the importance of doing so. She applauded the removal of the Hyde Amendment in President Biden’s FY2022 budget.
    • In May 2020, she led more than 155 Members of Congress in calling on House Democratic leadership to ensure that any future COVID-19 relief packages rejected Republican efforts to use the public health crisis to diminish abortion access.
    • In August 2021, Rep. Pressley, Oversight Chairwoman Carolyn Maloney, and Pro-Choice Caucus Co-Chairs Reps. Diana DeGette and Barbara Lee led more than 70 of their House Democratic colleagues in introducing a resolution in support of equitable, science-based policies governing access to medication abortion care. 
    • In January 2023, Rep. Pressley introduced a resolution to condemn all forms of political violence in the U.S., regardless of its target or intent. That same day, she delivered a powerful speech on the House floor slamming Republicans’ harmful, misleading anti-abortion resolution.
    • In September 2022, Rep. Pressley hosted U.S. Department of Health and Human Services Secretary Xavier Becerra at the Codman Square Health Center in Dorchester for a convening on their work to address the Black maternal health crisis and the criminalization of abortion care in states across the nation following the harmful U.S. Supreme Court decision in Dobbs v. Jackson Women’s Health. 
    • In May 2019, she led more than 100 colleagues in introducing H.Con.Res.40, a resolution reaffirming the House of Representative’s support for Roe v. Wade.
    • In June 2019, Rep. Pressley introduced H.R. 3296, the Affordability is Access Act, to make oral contraception available without a prescription. 
    • In September 2016, as a member of the Boston City Council, Pressley championed a resolution calling on Congress and President Obama to repeal the Hyde Amendment and reinstate insurance coverage for abortion services.

    ###

    MIL OSI USA News –

    July 23, 2025
  • MIL-OSI USA: Additional Funding Available for Zero-Emission School Buses

    Source: US State of New York

    overnor Kathy Hochul today announced that an additional $200 million is now available for zero-emission school buses through the third installment of funding from the historic $4.2 billion Clean Water, Clean Air, and Green Jobs Environmental Bond Act of 2022. The funding, distributed through the New York School Bus Incentive Program (NYSBIP), supports the purchase of electric buses, charging infrastructure, and fleet electrification planning as public schools transition to zero-emission technologies that improve air quality and reduce pollution in communities. This investment helps ensure that schoolchildren, drivers, and the communities where they live across New York benefit from clean, quiet, and healthy buses.

    “New York State is leaning into our Environmental Bond Act commitment to provide public schools with the funding and resources to make electric school buses more affordable,” Governor Hochul said. “We are leaving no school behind as we reduce pollution from vehicles so every student can benefit from clean air while building healthier, more sustainable communities for New Yorkers across the state.”

    Administered by the New York State Energy Research and Development Authority (NYSERDA), NYSBIP provides incentives to eligible school bus fleet operators, including school districts and school bus operators, that purchase zero-emission buses. It also offers charging infrastructure vouchers to help support the installation of Level 2 or DC fast chargers and provides funding to develop fleet electrification plans. This support helps ensure safer, more reliable transportation for students while giving schools the tools they need to make smart, cost-effective upgrades.

    The funding is available on a first-come, first-served basis with incentive amounts covering up to 100 percent of the incremental cost of a new or repowered electric school bus. This helps offset some or all of the difference in purchase price between zero-emission buses and comparable diesel or gasoline buses. All school bus fleet operators in New York State can also qualify for funding for fleet electrification plans, which provide a customized roadmap for electric bus adoption.

    New York State Energy Research and Development Authority President and CEO Doreen M. Harris said, “Today is the latest in a series of support that NYSERDA has offered to help make it easier for fleet operators to plan, navigate incentives for bus purchases and install vehicle charging infrastructure. We are excited to help more adopt zero-emission school buses through this additional Environmental Bond Act funding.”

    Program eligibility and rules for charging infrastructure funding are available online through the NYSBIP Implementation Manual. School bus fleet operators do not apply directly for school bus funding. Vehicle dealers apply the funding to the price of buses on their behalf after fleet operators have issued purchase orders. Fleet operators apply directly to NYSERDA for charging vouchers, which support adding charging infrastructure to their depots.

    Larger funding amounts are available for high-need school districts and school districts with significant portions of their population living in disadvantaged communities, as determined by the New York State Climate Justice Working Group criteria. While these districts are defined as priority districts through this program, all school districts can earn increased incentives by removing a gas or diesel bus from operation, purchasing wheelchair accessible buses, or purchasing buses with vehicle to grid capability. All school districts that complete fleet electrification plans also become eligible for higher funding amounts.

    New York State Department of Environmental Conservation Commissioner Amanda Lefton said, “The continued rollout of zero-emission school buses is critical to improving air quality and protecting the health of students and drivers in communities across the State. Investments through the Bond Act are making the transition to these greener vehicles more affordable for school districts. Under the leadership of Governor Hochul and in coordination with our state agency partners, DEC remains focused on administering Bond Act funding to support this important program and continue momentum to help address climate impacts, reduce harmful emissions, and improve quality of life for New York families.”

    New York State Department of Public Service CEO Rory M. Christian said, “Kudos to Governor Hochul and her team for encouraging further adoption and deployment of zero-emission school buses. This program will help continue our move toward a cleaner environment, which benefits all of us.”

    New York State Health Commissioner Dr. James McDonald said, “I thank Governor Hochul for her continued investment in the health of our children and commitment to building healthier communities across the state. Cleaner air means healthier kids, and reducing pollution around schools helps protect them from asthma and other respiratory problems.”

    Modernizing public school transportation with zero-emission buses is a priority for Governor Hochul to ensure the health of New York students. The FY25-26 New York State Budget continued to build momentum for school districts to put electric school buses on the road this year while providing districts with additional flexibility and time to complete their electrification plans and get hands-on experience with this new technology. The new independent range estimate requirement for bus manufacturers will also give school districts greater confidence that the buses will meet specific mileage and route conditions.

    Since NYSBIP’s launch, 88 school districts have applied for funds to purchase 529 buses, which includes 50 priority school districts accounting for 406 buses, and 400 districts are now working with NYSERDA to create Fleet Electrification Plans.

    The Bond Act requires that disadvantaged communities receive no less than 35 percent, with a goal of 40 percent, of the benefit of total Bond Act funds. In line with this goal, NYSERDA aims to ensure that at least 40 percent of the New York School Bus Incentive Program benefits disadvantaged communities. Buses domiciled in priority districts are eligible for higher incentive amounts in support of new zero-emission buses and charging infrastructure.

    New York State provides many resources for school bus fleet operators to transition their fleets to zero-emission buses, including an Electric School Bus Guidebook, a collection of practical user guides that highlight the benefits of electric school buses to make each part of transitioning a bus fleet easy to understand. This is a resource that can inform discussions with schools, New York State agencies, legislators, communities, manufacturers, bus dealers, and utilities to raise awareness on the Bond Act funding available to school districts and to help more communities understand the health and climate benefits that electric buses provide. Fleet operators seeking assistance should contact NYSERDA at [email protected].

    State Senator Kevin Parker said, “The additional $200 million in funding for zero-emission school buses is a bold investment in our children’s health, our environment, and the future of clean energy in New York. By accelerating the transition to electric school buses, we’re not only reducing harmful emissions but also improving air quality and public health in our communities, especially in neighborhoods that have long suffered from high pollution levels. This is a win for clean energy, for equity, and for every New Yorker.”

    State Senator Shelley B. Mayer said, “I am pleased that an additional $200 million is now available to school districts to support the transition to zero-emission school buses. New York has been a leader in the fight against climate change, and this funding, provided through the historic Clean Water, Clean Air, and Green Jobs Environmental Bond Act approved by New Yorkers, will further our efforts to reduce carbon emissions while alleviating financial burdens for New York schools. I would like to thank Governor Hochul and NYSERDA for their dedication to making New York a cleaner place, and I also extend my gratitude to the voters who approved this Bond Act.”

    State Senator Jeremy Cooney said, New York must remain committed to our environmental goals for a brighter future for New Yorkers, but we also realize that the state has a role to play in making this clean energy transition a reality. Today’s announcement is an important step in the right direction, and proof that we’ll continue to help our public schools, bolster charging infrastructure, and create a cleaner, healthier New York.”

    Assemblymember William Magnarelli said, “The Governor’s investment in zero-emission school buses shows the state’s continued commitment to climate leadership and advancing equitable access to clean transportation. The investment allows for a smooth transition to clean transportation and alleviates the anxiety of how districts will pay for the buses.”

    Assemblymember Michael R. Benedetto said, “I applaud Governor Hochul for making this a priority. This $200 million will help many school districts as they work to make the transition to electric buses. It’s a meaningful step toward cleaner air and healthier communities for our children.”

    Assemblymember Didi Barrett said, “The upfront cost of zero emission school buses has been a significant concern for all of the schools in my Assembly District, and the vast majority of districts across the State. This newly released funding from the 2022 Environmental Bond Act offers welcome financial support for our schools to electrify their bus fleets, bringing us closer to creating cleaner, safer and quieter commutes for our school children while helping us get closer to our ambitious climate goals.”

    Association of School Business Officials Executive Director Brian Cechnicki said, “Continued investments, including this funding, are critical for school districts to meet the state’s zero-emission bus mandate, and we are appreciative of NYSERDA for partnering with districts in this work.”

    New York School Bus Contractors Association President Tommy Smith said, “The New York School Bus Contractors Association is grateful that New York State continues to lead in financing the transition to electric school buses. We are excited about the advancements in battery technology that will further accelerate this initiative and help deliver cleaner, quieter, and more sustainable transportation for our students.”

    Mothers Out Front Distributed Senior Organizer Sarah Smiley said, “It is great news for students, parents, and school districts that more funding is now available for electric school buses, charging infrastructure, and fleet transition planning. We hope more districts leverage the New York School Bus Incentive Program funding so that our children have clean rides to school and we can reduce emissions for a healthier planet.”

    For more than fifty years, NYSERDA has been a trusted and objective resource for New Yorkers, taking on the critical role of energy planning and policy analysis, along with making investments that drive New York toward a more sustainable future. New York State is investing nearly $3 billion in electrifying its transportation sector and rapidly advancing measures that all new passenger cars and trucks sold be zero-emission. There are a range of initiatives to grow access to EVs and improve clean transit for all New Yorkers including EV Make Ready, EVolve NY, Charge Ready NY 2.0, the Drive Clean Rebate, the New York Truck Voucher Incentive Program, and the New York State’s climate agenda calls for an affordable and just transition to a clean energy economy that creates family-sustaining jobs, promotes economic growth through green investments, and directs a minimum of 35 percent of the benefits to disadvantaged communities. New York is advancing a suite of efforts to achieve an emissions-free economy by 2050, including in the energy, buildings, transportation, and waste sectors.

    MIL OSI USA News –

    July 23, 2025
  • MIL-OSI Africa: The Legacy of Martyr Ömer Halisdemir Lives on Through Turkish Cooperation and Coordination Agency’s (TİKA) Turkish Language Class in Somalia

    Source: APO


    .

    Turkish Cooperation and Coordination Agency (TİKA) established the “Martyr Ömer Halisdemir Turkish Language Class” at an orphanage in Somalia that houses the children of martyred police officers.

    TİKA launched this meaningful educational project in honor of the children of Somalia’s fallen police officers. Named after July 15 Martyr Ömer Halisdemir, the Turkish language class was inaugurated during a ceremony at an orphanage in the capital, Mogadishu.

    The opening was held as part of the July 15 Democracy and National Unity Day commemoration program, organized by the Embassy of the Republic of Türkiye in Mogadishu.

    The ceremony was attended by Somali Minister of Internal Security, Abdullahi Sheikh Ismael (Fartaag); Minister of Defense, Ahmed Moalim Fiqi; Army Commander Brigadier General Sahal Abdullahi Omar; Somali Police Force Commander, Major General Asad Osman Abdullahi; and Türkiye’s Ambassador to Mogadishu, Alper Aktaş. Also in attendance were the ambassadors of Qatar, Sudan, and Kenya, along with the Permanent Representative of the Organization of Islamic Cooperation to Somalia, Ambassador Mohamed Bamba.

    The “Martyr Ömer Halisdemir Turkish Language Class” aims to honor the national spirit of July 15, preserve the memory of a heroic martyr through education, and provide Somali students with the opportunity to learn Turkish. Turkish language instruction in the classroom will be provided by Yunus Emre Institute, enabling students to become more familiar with the Turkish language and culture and gain an advantage when pursuing educational opportunities in Türkiye.

    Distributed by APO Group on behalf of Turkish Cooperation and Coordination Agency (TIKA).

    MIL OSI Africa –

    July 23, 2025
  • MIL-OSI USA: Tonko, Huizenga Introduce Legislation to Expand Mental Health Care for Seniors

    Source: United States House of Representatives – Representative Paul Tonko (Capital Region New York)

    WASHINGTON, DC—Representatives Paul D. Tonko (D-NY-20) and Bill Huizenga (R-MI-4) today reintroduced the Medicare Mental Health Inpatient Equity Act, bipartisan legislation that would improve care for millions of America’s seniors by permanently repealing the Medicare 190-day lifetime limit for inpatient psychiatric care. No such limit exists for any other Medicare inpatient health care service.

    “Mental illness should be treated like any other illness, but stigma continues to limit equal, quality care — too often with dire consequences,” Congressman Tonko said. “Currently, Medicare feeds into this longstanding prejudice, setting an arbitrary cap unique to mental health care that limits treatment and provides gaps in care for seniors. We’re reintroducing our Medicare Mental Health Inpatient Equity Act to remove this unjust 190-day limit. I urge my colleagues to join us in standing up for seniors and ensuring they are supported with the quality care they need and deserve.”

    “Mental health policies must be modernized to answer the growing needs of the 21st century,” Congressman Huizenga said. “I am proud to help lead on this issue with bipartisan legislation to modernize Medicare policies and bring them in line with the higher standards used by the State of Michigan and private sector. Hopefully this bipartisan bill can help provide a roadmap for additional mental health reforms and challenges Congress must address.”

    Today, despite the enactment of the landmark Paul Wellstone and Pete Domenici Mental Health Parity and Addiction Equity Act of 2008, Medicare continues to discriminate against seniors with mental illnesses. The 190-day limit in care disproportionately harms individuals who receive Medicare coverage earlier in life due to disability. The vast majority of private health insurance has already removed this antiquated limit. MedPac, an independent congressional agency that advises on Medicare, released a March 2025 report recommending that Congress eliminate this limit.

    This legislation is supported by more than three dozen organizations, including: AARP, Acadia Healthcare, Addiction Policy Forum, The Alliance for Rights and Recovery, American Association for Psychoanalysis in Clinical Social Work, American Association of Psychiatric Pharmacists, American College of Emergency Physicians, American Foundation for Suicide Prevention, The American Group Psychotherapy Association, American Hospital Association, American Mental Health Counselors Association, American Psychiatric Association, American Psychological Association Services, Community Catalyst, The Eating Disorders Coalition for Research, Policy, & Action, The Global Alliance for Behavioral Health & Social Justice, IC&RC, Inseparable, The Kennedy Forum, Legal Action Center, Mental Health America, MHANYS, NAMI, National Association for Behavioral Healthcare, The National Association for Rural Mental Health (NARMH), the National Association of County Behavioral Health and Developmental Disability Directors (NACBHDD), The National Association of Pediatric Nurse Practitioners, The National Association of Social Workers (NASW), National Association of State Alcohol and Drug Agency Directors (NASADAD), National Behavioral Health Association of Providers, National Black Harm Reduction Network (NBHRN), National Board for Certified Counselors & Affiliates, National Council for Mental Wellbeing, National Health Care for the Homeless Council, The National League for Nursing, Psychotherapy Action Network (PsiAN), Police Assisted Addiction and Recovery Initiative, Treatment Communities of America, Addiction Professionals of North Carolina, California Consortium of Addiction Programs & Professionals

    A fact-sheet of the bill can be found HERE.

    MIL OSI USA News –

    July 23, 2025
  • MIL-OSI USA: United States Unseals Civil Action Filed Against Approximately $2M in Digital Currency Involved in Hamas Fundraising

    Source: US Justice – Antitrust Division

    Headline: United States Unseals Civil Action Filed Against Approximately $2M in Digital Currency Involved in Hamas Fundraising

    The Justice Department and the U.S. Attorney’s Office for the District of Columbia today announced the unsealing of a civil forfeiture action against approximately $2 million dollars in digital currency held by Tether Limited (Tether) and Binance Holdings LTD (Binance) accounts connected with Buy Cash Money and Money Transfer Company (BuyCash), a Gaza-based money transfer business that was involved in financially supporting Hamas – a designated Foreign Terrorist Organization (FTO) – as well as its agents and collaborators.

    MIL OSI USA News –

    July 23, 2025
  • MIL-OSI Security: United States Unseals Civil Action Filed Against Approximately $2M in Digital Currency Involved in Hamas Fundraising

    Source: United States Attorneys General 7

    The Justice Department and the U.S. Attorney’s Office for the District of Columbia today announced the unsealing of a civil forfeiture action against approximately $2 million dollars in digital currency held by Tether Limited (Tether) and Binance Holdings LTD (Binance) accounts connected with Buy Cash Money and Money Transfer Company (BuyCash), a Gaza-based money transfer business that was involved in financially supporting Hamas – a designated Foreign Terrorist Organization (FTO) – as well as its agents and collaborators.

    “Terrorist organizations like Hamas and their affiliates rely on shadowy financial networks to fund their deadly operations,” said Attorney General Pamela Bondi. “By seizing millions in cryptocurrency, the Justice Department is aggressively dismantling the financial infrastructure of terrorism and refusing to allow our digital currency platforms to become safe havens for terrorist financing.”

    “The forfeiture action executed today is an example of how diligently our office works to prevent any actions from taking place that support foreign terrorist organizations,” said U.S. Attorney Jeanine Ferris Pirro for the District of Colombia. “Our partnership with other law enforcement agencies strengthens us to uphold the safety of the American people from entities that threaten the security of our citizens.”

    “The forfeiture action unsealed today demonstrates that no matter what lengths terrorism financers take to obscure their illegal transactions, the FBI will aggressively disrupt the transmission of illicit proceeds intended to support designated terrorist organizations like Hamas,” said Assistant Director in Charge Steven J. Jensen of the FBI Washington Field Office.

    BuyCash, and one of its owners, Ahmed M. M. Alaqad, have been suspected of supporting various terrorist organizations including Hamas, ISIS, Al-Qaida affiliates and others. After the October 2023 attacks on Israel, BuyCash and Alaqad were designated as having materially supported Hamas under Executive Order 13224 by the U.S. Department of Treasury Office of Foreign Asset Control (OFAC). Since 2017, BuyCash and Alaqad have supported several foreign terrorist organizations. In 2017, BuyCash was used for the procurement of large quantities of online infrastructure on behalf of ISIS. In September 2019, BuyCash was used to receive funds from a known Al-Qaida affiliate. In 2019, law enforcement identified various instances where BuyCash, with the direct support of Alaqad, directly aided in the transfer of fiat currency to known individuals and entities in support of Hamas. In June 2021, Israel’s National Bureau for Counter Terrorist Financing seized various digital currency accounts connected to Hamas and the Izz-al-Din Qassam Brigades, including one involving BuyCash.

    The complaint describes a detailed scheme whereby users utilized BuyCash to fund accounts held by Tether and Binance to obfuscate their financial support of international terrorist organizations, including Hamas. Before and after the October 2023 attacks, one account was reported to have received at least $4 million to support Hamas.

    The government’s forfeiture action targets multiple accounts previously seized from Tether and Binance connected to BuyCash and removed approximately $2 million dollars from streams of funds supporting international terrorism.

    A civil forfeiture complaint contains mere allegations. The burden to prove forfeitability in a civil forfeiture proceeding is upon the government.

    The FBI Washington D.C. Field Office is investigating the case.

    Assistant U.S. Attorneys Rajbir S. Datta and Thomas Saunders for the District of Columbia are prosecuting the case with assistance from Trial Attorney Allison Ickovic of the Criminal Division’s Money Laundering and Asset Recovery Section (MLARS) and Deputy Chief Alicia Cook of the National Security Division. Critical assistance was provided by Paralegal Specialists Brian Rickers, Gina Torres, and the Department of Justice’s Office of International Affairs.  

    MIL Security OSI –

    July 23, 2025
  • MIL-OSI USA: NREL and Google Host Artificial Intelligence Hackathon To Tackle Data Center Energy Challenges

    Source: US National Renewable Energy Laboratory

    Experts Explore Potential of Google AI Tools To Mitigate Potential Energy Limits for Quick Growth of US Data Centers


    NREL and Google teamed up to host a hackathon, bringing together leading researchers from nine U.S. Department of Energy (DOE) national laboratories to explore and leverage Google’s generative artificial intelligence (AI) and large language model tools to address an array of critical challenges related to energy limitations for U.S. data centers.

    Overcoming these challenges is critical to enable scaling for future technologies while ensuring energy reliability and affordability.

    According to Google’s AI definition, fittingly, a hackathon is a collaborative event where people with diverse skills, often programmers and designers, come together to work intensively on a specific project, typically within a short time frame.

    The original idea for the hackathon emerged out of discussions with Google’s public sector team and NREL’s computational science team.

    “Both groups were interested in exposing scientists to some of the latest and greatest AI models to test out what they’re really capable of, but both groups also wanted a targeted application,” said Ray Grout, director of the computational science center at NREL. “Exploring data center energy challenges was a natural fit given the growing demand of energy for AI, and the interest in the topic for the labs and Google.”

    Roughly 50 top minds, including six NREL computational and data scientists, participated in the two-day event, which took place June 17–18 in Washington, D.C. Participants engaged in hands-on experimentation, applying cutting-edge AI capabilities to real-world problems in geospatial analytics, energy systems, data center optimization, and digital-twin development. The hackathon provided a unique platform for participants to directly engage with Google’s AI tools, particularly Gemini, and explore their applicability to a diverse range of scientific and engineering problems.

    The hackathon brought together leading researchers from across DOE’s national laboratories to explore and leverage Google’s generative AI tools. Photo from Beth Hartman, Google

    Google’s AI platform includes several tools that enable researchers to accelerate and expand their work overall. Among the tools are Agentspace and its included agents like Idea Generation and Deep Research. Idea Generation, an agent premade by Google, has the goal of helping with innovation and problem-solving for enterprise users by combining advanced AI with a unique tournament-style competition framework to generate and rank ideas. Deep Research enables researchers to gather, analyze, and understand internal and external information.

    Other tools help improve operational efficiency, allowing researchers to inform their work by more quickly finding resources across labs and agencies. Finally, many tools address specific use cases like geospatial reasoning, population dynamics, and weather forecasting. For example, one demonstration that the Google geospatial team showed at the hackathon used geospatial reasoning and weather forecasting for predicting grid outages. Google teams represented at the hackathon included Google Public Sector, DeepMind, Google Research, and Climate Ops.

    Google’s geospatial reasoning team developed a demo for the hackathon showing outage predictions based on weather forecasting models. Image from Beth Hartman, Google

    “Google was honored to partner with NREL and work with so many DOE labs at this collaborative event,” said Regiuel Days, account executive for federal science and research at Google. “These critical research institutions provide our country with essential insights into key issues such as grid resilience, energy security, and data center optimization. Combined with Google’s data and cutting-edge AI models, we can work together to more quickly find solutions to the big challenges we face.”

    Hackathon Experience and Outcomes

    The hackathon successfully demonstrated the potential of generative AI in accelerating research, automating complex tasks, and generating novel insights.

    During the two-day event, experts teamed up to collaborate and explore the various identified challenges. Some participants focused on geospatial analytics, leveraging Gemini to process and interpret spatial data. Other researchers utilized Gemini’s code-generation and debugging capabilities, while others found Gemini valuable for in-depth research and brainstorming.

    Hackathon participants engaged in collaborative, hands-on experimentation, applying cutting-edge AI capabilities to real-world problems. Photo from Beth Hartman, Google

    NREL’s Gabriel Steenberg was one of several researchers to explore specialized problems. Steenberg explored the Population Dynamics Foundation model to predict power grid behavior, feeding it county-level data to see if it could predict interconnections in other counties. Other laboratories with staff in person at the event included Argonne National Laboratory, Idaho National Laboratory, Jefferson Laboratory, Lawrence Berkeley National Laboratory, National Energy Technology Laboratory, Oakridge National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories.

    The labs explored solutions such as using Vertex AI and Google Earth Engine to better understand data-center load balancing, real-time water data, and cybersecurity. Through these topic explorations, Google gained insights into how national laboratories envision using their AI tools, especially concerning specialized applications like geospatial reasoning, digital twins, and autonomous engineering.

    The hackathon served as a valuable collaborative step, fostering innovation and providing crucial insights into the evolving landscape of generative AI for scientific research. The event generated robust discussion, shared learning, and discoveries and identified opportunities for future follow-on events.

    “We have so many experts across the national labs working on energy challenges, and Google has so many experts developing and deploying AI solutions. This was a great way to get everyone in the same room to figure out what we can do already and where there is more work to be done,” Grout said.

    “Throughout this interactive, guided exploration of Google’s AI models and tools, we learned a tremendous amount about what types of challenges the labs are focused on solving,” said Beth Hartman, Google’s industry executive for federal science and research. “This helps us to better understand how we can help more specifically. Going forward, we are focused on providing the labs with increased access to the models that best support their work. We are also planning to host more hackathons in partnership with the labs and will continue to invite all 17 DOE labs to participate. Stay tuned!”

    Learn more about NREL’s computational science and AI research.

    MIL OSI USA News –

    July 23, 2025
  • MIL-OSI USA: SBA Relief Still Available to Missouri Small Businesses, Private Nonprofits and Residents Affected by April Storms

    Source: United States Small Business Administration

    SACRAMENTO, Calif. – The U.S. Small Business Administration (SBA) is reminding eligible small businesses, private nonprofits, and residents in Missouri of the Aug. 22 deadline to apply for low interest federal disaster loans to offset physical damage caused by severe storms, tornadoes, straight-line winds, heavy rains, large hail, flooding and flash flooding occurring April 29.

    The disaster declaration covers the Missouri counties of Barry, Christian, Dade, Dallas, Greene, Jasper, Lawrence, McDonald, Newton, Polk, Stone and Webster as well as the Kansas county of Cherokee, and the Oklahoma county of Ottawa.

    Small businesses and nonprofits are eligible to apply for business physical disaster loans and may borrow up to $2 million to repair or replace disaster-damaged or destroyed real estate, machinery and equipment, inventory, and other business assets.

    Homeowners and renters are eligible to apply for home and personal property loans and may borrow up to $100,000 to replace or repair personal property, such as clothing, furniture, cars, and appliances. Homeowners may apply for up to $500,000 to replace or repair their primary residence.

    Applicants may also be eligible for a loan increase of up to 20% of their physical damage, as verified by the SBA, for mitigation purposes. Eligible mitigation improvements include strengthening structures to protect against high wind damage, upgrading to wind rated garage doors, and installing a safe room or storm shelter to help protect property and occupants from future damage.

    “One distinct advantage of SBA’s disaster loan program is the opportunity to fund upgrades reducing the risk of future storm damage,” said Chris Stallings, associate administrator of the Office of Disaster Recovery and Resilience at the SBA. “I encourage businesses and homeowners to work with contractors and mitigation professionals to improve their storm readiness while taking advantage of SBA’s physical damage loans.”

    SBA’s Economic Injury Disaster Loan (EIDL) program is available to eligible small businesses, small agricultural cooperatives, nurseries and private nonprofit (PNP) organizations impacted by financial losses directly related to this disaster. The SBA is unable to provide disaster loans to agricultural producers, farmers, or ranchers, except for aquaculture enterprises.

    Interest rates can be as low as 4% for small businesses, 3.625% for nonprofits, and 2.813% for homeowners and renters with terms up to 30 years. Interest does not begin to accrue, and payments are not due until 12 months from the date of the first loan disbursement. The SBA sets loan amounts and terms, based on each applicant’s financial condition.

    To apply online, visit sba.gov/disaster. Applicants may also call SBA’s Customer Service Center at (800) 659-2955 or email disastercustomerservice@sba.gov for more information on SBA disaster assistance. For people who are deaf, hard of hearing, or have a speech disability, please dial 7-1-1 to access telecommunications relay services.

    The deadline to return physical damage applications is Aug. 22.

    ###

    About the U.S. Small Business Administration

    The U.S. Small Business Administration helps power the American dream of business ownership. As the only go-to resource and voice for small businesses backed by the strength of the federal government, the SBA empowers entrepreneurs and small business owners with the resources and support they need to start, grow, expand their businesses, or recover from a declared disaster. It delivers services through an extensive network of SBA field offices and partnerships with public and private organizations. To learn more, visit www.sba.gov.

    MIL OSI USA News –

    July 23, 2025
  • MIL-OSI USA: H.R. 589, FACE Act Repeal Act

    Source: US Congressional Budget Office

    H.R. 589 would repeal a section of federal law that prohibits actions that interfere with a person’s ability to access or provide reproductive health services or to engage in religious worship. Under the bill, individuals and states attorneys general would no longer be able to file civil lawsuits in federal court for violations of the law and the government could not impose civil or criminal penalties related to those actions.

    As a result, CBO expects that enacting H.R. 589 would reduce revenues and direct spending. Criminal and civil fines are recorded in the budget as revenues. Criminal fines are deposited in the Crime Victims Fund and later spent without further appropriation. Generally, civil fines are returned to the Treasury and are not available for spending without further appropriation. CBO estimates that any reduction in the collection of civil and criminal penalties would be insignificant.

    Additionally, CBO estimates that enacting H.R. 589 would reduce the number of civil cases filed in federal court. Under current law, the federal judiciary charges fees to file suits in district courts. Those fees are recorded in the budget as revenues and the courts can spend those fees without further appropriation. CBO estimates that any reduction in the collections of those fees would be insignificant. In total, CBO estimates that enacting H.R. 589 would reduce revenues and the associated direct spending by less than $500,000 in every year and over the 2025-2035 period.

    H.R. 589 would impose an intergovernmental and private-sector mandate as defined in the Unfunded Mandates Reform Act (UMRA) by removing the ability of individuals and state attorneys general to pursue civil remedies for conduct that interfered with the receipt or provision of reproductive health services or participation in religious activities.

    The cost of this mandate would be the lost financial awards from successful litigation. CBO cannot anticipate the number of cases that would be prohibited under this bill, the outcome of such cases, or the financial awards from successful litigation. Therefore, CBO cannot determine whether the cost of the mandate would exceed the UMRA intergovernmental and private-sector thresholds ($103 million and $206 million respectfully, in 2025, adjusted annually for inflation).

    The CBO staff contacts for this estimate are Jeremy Crimm (for federal costs) and Erich Dvorak (for mandates). The estimate was reviewed by H. Samuel Papenfuss, Deputy Director of Budget Analysis.

    Phillip L. Swagel

    Director, Congressional Budget Office

    MIL OSI USA News –

    July 23, 2025
  • MIL-OSI USA: S. 1595, Improving Police CARE Act

    Source: US Congressional Budget Office

    S. 1595 would require the Department of Justice (DOJ) to develop and publish standards for trauma kits and the best practices for law enforcement agencies on the maintenance and use of those kits. The bill would require DOJ to consult with the private sector and state and local law enforcement agencies in developing the standards. S. 1595 also would prohibit grantees under the Edward Byrne Memorial Justice Assistance Grant program from using grant funds to purchase trauma kits that do not meet DOJ’s standards. Under that program, DOJ awards grants to state, local, territorial, and tribal governments to support a variety of criminal justice and law enforcement activities, including the purchase of trauma kits.

    Based on the costs of similar activities, CBO estimates that implementing S. 1595 would cost DOJ less than $500,000 to develop and publish the standards and best practices. Any related spending would be subject to the availability of appropriated funds.

    The CBO staff contact for this estimate is Jeremy Crimm. The estimate was reviewed by H. Samuel Papenfuss, Deputy Director of Budget Analysis.

    Phillip L. Swagel

    Director, Congressional Budget Office

    MIL OSI USA News –

    July 23, 2025
  • MIL-OSI USA: Federal Court Upholds Bureau of Reclamation’s Conversion of Water Service Contracts in Central Valley of California

    Source: US State of California

    Last week, a judgment entered by the U.S. District Court for the Eastern District of California confirmed the ability of the Bureau of Reclamation to convert water service contracts to long term repayment contracts pursuant to the Water Infrastructure and Improvements for the Nation Act. The converted contracts eliminate the need for future renewals and associated costs and allow contractors to lower their overall costs by prepaying their share of project construction costs. The converted contracts also benefit the government by facilitating faster repayment of construction costs which can provide funding for future water storage projects.

    The Court agreed with Reclamation’s interpretation of the WIIN Act, that

    • the WIIN Act requires contract conversion upon request, and
    • WIIN Act § 4011(a)(4)(c) strips Reclamation of discretion to modify any “water service … contractual rights” other than those related to the financial terms specifically addressed by the WIIN Act.

    Because those provisions removed Reclamation’s discretion, Reclamation was not required to conduct an analysis under the National Environmental Policy Act, or consult under the Endangered Species Act, as part of the contract conversions.

    Acting Assistant Attorney General Adam Gustafson of the Justice Department’s Environment and Natural Resources Division (ENRD) made the announcement.

    Trial Attorneys David Gehlert and Jeff Candrian of ENRD’s Natural Resources Section handled the case. 

    MIL OSI USA News –

    July 23, 2025
  • MIL-OSI USA: Washington Hunting Guide and Outfitting Company Enter Guilty Pleas to Lacey Act Crime

    Source: US State of California

    Branden Trager of Brush Prairie, Washington, and his guiding company Mayhem Services LLC pleaded guilty yesterday in federal court in Tacoma to violating the Lacey Act.

    In pleading guilty, Trager admitted he and Mayhem Services violated the Migratory Bird Treaty Act (MBTA) during a January 2023 hunting trip in western Washington and then transported the taken birds in violation of the Lacey Act. Enacted 125 years ago, the Lacey Act protects the nations wildlife resources by prohibiting wildlife violations that cross state or international borders. Trager also acknowledged that in 2022 he brought hunters into British Columbia, Canada, where he guided waterfowl hunting trips targeting the harlequin duck. He could not operate as a hunting guide under Canadian law.

    The harlequin duck (Histrionicus histrionicus) is a small sea duck with a habitat ranging from Alaska to California. Hunters prize the harlequin as a trophy and as part of a challenge to hunt 41 North American waterfowl species. Washington closed harlequin hunting for the 2022-2023 season, but limited hunting remained open in British Columbia.

    According to plea agreements filed in court, the recommended fines are $100,000 for Trager and $75,000 for Mayhem Services. The parties also agreed to recommend that the court order the defendants to make a public statement expressing contrition and emphasizing the importance of hunting, guiding, and wildlife regulations. Sentencing is scheduled for Oct. 16.

    According to a Joint Factual Statement filed in court, the MBTA prohibits, among other things, taking migratory birds using a motor vehicle; taking migratory birds by using a vehicle to concentrate, drive, or rally them; taking migratory birds in excess of daily bag limits; taking or crippling a migratory bird and not make reasonable efforts to retrieve it; and transporting taken migratory birds belonging to another individual without tagging them. Taking includes pursuing, hunting, shooting, wounding, killing, trapping, capturing, or collecting.

    The Lacey Act is the nation’s oldest wildlife trafficking law. It prohibits, among other things, transporting wildlife that had been illegally taken under federal, state, tribal or foreign law. The MBTA is a U.S. law that implemented treaties with Canada and other nations to ensure sustainable populations of migratory birds.

    Acting Assistant Attorney General Adam Gustafson of the Justice Department’s Environment and Natural Resources Division made the announcement.

    The U.S. Fish and Wildlife Service Office of Law Enforcement led the investigation along with Homeland Security Investigations, British Columbia Conservation Officer Service, and the Washington Department of Fish & Wildlife.

    Senior Trial Attorney Ryan Connors and Trial Attorney Sarah Brown of the Justice Department’s Environmental Crimes Section prosecuted the case with assistance from the U.S. Attorney’s Office for the Western District of Washington.

    MIL OSI USA News –

    July 23, 2025
  • MIL-OSI Security: Cedar Rapids Man Who Conspired to Distribute Thousands of Fentanyl Pills Sentenced to Federal Prison

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    A man who conspired to distribute fentanyl pills was sentenced today to 14 years in federal prison.  Jaylon William Throgmartin, age 22, from Cedar Rapids, Iowa, received the prison term after a guilty plea to conspiracy to distribute a controlled substance.

    In a plea agreement and at the sentencing hearing, evidence showed that Throgmartin distributed thousands of fentanyl pills between December 2023 and October 2024.  Throgmartin also facilitated the sale of a firearm in exchange for fentanyl pills.  In January 2025, he distributed at least one fentanyl pill to someone who overdosed.  The victim recovered after receiving Narcan.  

    Throgmartin was sentenced in Cedar Rapids by United States District Court Chief Judge C.J. Williams.  Throgmartin was sentenced to 168 months’ imprisonment and must also serve a four-year term of supervised release after the prison term.  There is no parole in the federal system.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone.  On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    The case was prosecuted by Assistant United States Attorney Devra T. Hake and was investigated as part of the Northern Iowa Heroin Initiative and the Organized Crime Drug Enforcement Task Force (OCDETF) program of the United States Department of Justice through a cooperative effort of the Bureau of Alcohol, Tobacco, Firearms and Explosives, the Cedar Rapids Police Department, the Iowa Division of Narcotics Enforcement, and the Iowa Division of Intelligence and Fusion Center.  OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence‑driven, multi-agency approach. Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.

    This case is part of Operation Take Back America (https://www.justice.gov/dag/media/1393746/dl?inline) a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime.  Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    Throgmartin is being held in the United States Marshal’s custody until he can be transported to a federal prison.

    Court file information at https://ecf.iand.uscourts.gov/cgi-bin/login.pl.

    The case file number is 25-CR-5.

    Follow us on X @USAO_NDIA.

    MIL Security OSI –

    July 23, 2025
  • MIL-OSI Security: Federal Court Upholds Bureau of Reclamation’s Conversion of Water Service Contracts in Central Valley of California

    Source: United States Attorneys General

    Last week, a judgment entered by the U.S. District Court for the Eastern District of California confirmed the ability of the Bureau of Reclamation to convert water service contracts to long term repayment contracts pursuant to the Water Infrastructure and Improvements for the Nation Act. The converted contracts eliminate the need for future renewals and associated costs and allow contractors to lower their overall costs by prepaying their share of project construction costs. The converted contracts also benefit the government by facilitating faster repayment of construction costs which can provide funding for future water storage projects.

    The Court agreed with Reclamation’s interpretation of the WIIN Act, that

    • the WIIN Act requires contract conversion upon request, and
    • WIIN Act § 4011(a)(4)(c) strips Reclamation of discretion to modify any “water service … contractual rights” other than those related to the financial terms specifically addressed by the WIIN Act.

    Because those provisions removed Reclamation’s discretion, Reclamation was not required to conduct an analysis under the National Environmental Policy Act, or consult under the Endangered Species Act, as part of the contract conversions.

    Acting Assistant Attorney General Adam Gustafson of the Justice Department’s Environment and Natural Resources Division (ENRD) made the announcement.

    Trial Attorneys David Gehlert and Jeff Candrian of ENRD’s Natural Resources Section handled the case. 

    MIL Security OSI –

    July 23, 2025
  • MIL-OSI Security: Washington Hunting Guide and Outfitting Company Enter Guilty Pleas to Lacey Act Crime

    Source: United States Attorneys General

    Branden Trager of Brush Prairie, Washington, and his guiding company Mayhem Services LLC pleaded guilty yesterday in federal court in Tacoma to violating the Lacey Act.

    In pleading guilty, Trager admitted he and Mayhem Services violated the Migratory Bird Treaty Act (MBTA) during a January 2023 hunting trip in western Washington and then transported the taken birds in violation of the Lacey Act. Enacted 125 years ago, the Lacey Act protects the nations wildlife resources by prohibiting wildlife violations that cross state or international borders. Trager also acknowledged that in 2022 he brought hunters into British Columbia, Canada, where he guided waterfowl hunting trips targeting the harlequin duck. He could not operate as a hunting guide under Canadian law.

    The harlequin duck (Histrionicus histrionicus) is a small sea duck with a habitat ranging from Alaska to California. Hunters prize the harlequin as a trophy and as part of a challenge to hunt 41 North American waterfowl species. Washington closed harlequin hunting for the 2022-2023 season, but limited hunting remained open in British Columbia.

    According to plea agreements filed in court, the recommended fines are $100,000 for Trager and $75,000 for Mayhem Services. The parties also agreed to recommend that the court order the defendants to make a public statement expressing contrition and emphasizing the importance of hunting, guiding, and wildlife regulations. Sentencing is scheduled for Oct. 16.

    According to a Joint Factual Statement filed in court, the MBTA prohibits, among other things, taking migratory birds using a motor vehicle; taking migratory birds by using a vehicle to concentrate, drive, or rally them; taking migratory birds in excess of daily bag limits; taking or crippling a migratory bird and not make reasonable efforts to retrieve it; and transporting taken migratory birds belonging to another individual without tagging them. Taking includes pursuing, hunting, shooting, wounding, killing, trapping, capturing, or collecting.

    The Lacey Act is the nation’s oldest wildlife trafficking law. It prohibits, among other things, transporting wildlife that had been illegally taken under federal, state, tribal or foreign law. The MBTA is a U.S. law that implemented treaties with Canada and other nations to ensure sustainable populations of migratory birds.

    Acting Assistant Attorney General Adam Gustafson of the Justice Department’s Environment and Natural Resources Division made the announcement.

    The U.S. Fish and Wildlife Service Office of Law Enforcement led the investigation along with Homeland Security Investigations, British Columbia Conservation Officer Service, and the Washington Department of Fish & Wildlife.

    Senior Trial Attorney Ryan Connors and Trial Attorney Sarah Brown of the Justice Department’s Environmental Crimes Section prosecuted the case with assistance from the U.S. Attorney’s Office for the Western District of Washington.

    MIL Security OSI –

    July 23, 2025
  • MIL-OSI Security: NPCC celebrates role of women in policing

    Source: United Kingdom National Police Chiefs Council

    The NPCC Chair, Gavin Stephens, responds to MP’s comments made yesterday (21 July), about the role of women in policing.

    Chief Constable Gavin Stephens, chair of the NPCC, said: “All of our officers come to work every day with passion, determination and courage to serve their communities.

    “There are an increasing number of women who choose a career in policing, bringing with them vital skills and experience that are critical to the progress of policing, our role in society, and keeping the public safe. Over a third of our officers and around 40% of our chief constables are women, and we must not jeopardise our progress by diminishing the value and role women play in our workforce.

    “There are no roles in policing which women cannot do, and the same exacting standards to qualify are met by all men and women who undertake some of the most challenging tasks of any profession.

    “We celebrate that women have an essential and irreplaceable role in every aspect of policing across the United Kingdom; policing is at its best when it represents the communities it serves, and our priority continues to be making policing a career where anyone can thrive and make a difference.”

    MIL Security OSI –

    July 23, 2025
  • MIL-OSI Security: NPCC celebrates role of women in policing

    Source: United Kingdom National Police Chiefs Council

    The NPCC Chair, Gavin Stephens, responds to MP’s comments made yesterday (21 July), about the role of women in policing.

    Chief Constable Gavin Stephens, chair of the NPCC, said: “All of our officers come to work every day with passion, determination and courage to serve their communities.

    “There are an increasing number of women who choose a career in policing, bringing with them vital skills and experience that are critical to the progress of policing, our role in society, and keeping the public safe. Over a third of our officers and around 40% of our chief constables are women, and we must not jeopardise our progress by diminishing the value and role women play in our workforce.

    “There are no roles in policing which women cannot do, and the same exacting standards to qualify are met by all men and women who undertake some of the most challenging tasks of any profession.

    “We celebrate that women have an essential and irreplaceable role in every aspect of policing across the United Kingdom; policing is at its best when it represents the communities it serves, and our priority continues to be making policing a career where anyone can thrive and make a difference.”

    MIL Security OSI –

    July 23, 2025
  • MIL-OSI Africa: Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach

    Source: The Conversation – Africa – By Paa Kwesi Wolseley Prah, Postdoctoral Fellow, Dublin City University

    Ghana stands out in west Africa as a nation that has not experienced terrorist attacks, even though it’s geographically close to countries that have. In Burkina Faso, Mali and Nigeria, extremist groups such as Boko Haram and Islamic State in West Africa (ISWAP) have wreaked havoc.

    This resilience is not accidental. It is the result of deliberate counter-terrorism strategies employed by Ghana’s security institutions.

    Ghana’s counter-terrorism framework was set out in 2020. It has four pillars: prevent, pre-empt, protect, and respond. The idea is to coordinate multiple agencies, including the Ghana Police Service, Ghana Immigration Service, Ghana Armed Forces and the National Intelligence Bureau.

    These pillars guide strategies to address both immediate threats and underlying vulnerabilities. Poverty, religious radicalism and porous borders are common drivers of terrorism in west Africa.

    I am an international security and global governance researcher. My co-author is a government and international studies scholar.

    Four years ago we wrote a paper examining Ghana’s resilience against terrorist attacks. Our findings are still relevant given the increasing activities of terror groups in the west African region.


    Read more: West Africa terror: why attacks on military bases are rising – and four ways to respond


    We wanted to identify what works as a potential model for other countries.

    Using a qualitative methodology, we interviewed stakeholders — including police officers, members of the armed forces, Muslim community leaders, and immigration officials. We also analysed the national framework for preventing and countering violent extremism and terrorism.

    Our findings showed that Ghana’s success is traceable to an approach that integrates community engagement with advanced border technology, inter-agency training, media collaboration and intelligence operations. And it addresses both immediate and underlying threats.

    We argue that Ghana’s ability to balance prevention with security offers solutions for stability in a geopolitically volatile region.


    Read more: Ghana’s new president faces tough regional security problems: why he’s well-placed to tackle them


    Community engagement

    One of the standout strategies is community engagement. This serves multiple purposes, from guiding people away from extremism to gathering intelligence.

    The Ghana Police Service, for instance, engages Muslim-dominated communities, known as “Zongos”, to counter radical Islamic ideologies that could be exploited by terrorist groups.

    By collaborating with local religious leaders, police make communities aware of the dangers of radicalisation. They foster trust and encourage residents to report suspicious activities. This approach also works in tackling illegal arms circulation.

    Ghana has an estimated 2.3 million small arms in circulation – 1.1 million of them illegally possessed. The availability of so many weapons fuels terrorist activities across west Africa.

    Community based de-radicalisation aligns with global best practices. In Norway, for instance, it was used to disengage youth from extremist groups.

    Technology at borders

    Ghana’s border control management is another part of its counter-terrorism strategy. Ghana Immigration Service uses advanced security software and integrated systems like the “Immigration 360” system, designed to fully automate passenger processing and data management.

    The system manages records of fingerprints and other data to improve reporting and intelligence sharing between Ghana Immigration and other security agencies.

    The technology makes it possible to quickly identity individuals on terrorist watchlists and detects concealed goods. This helps prevent illegal cross-border movements.

    There are gaps in Ghana’s defences, however. The influx of migrants fleeing extremist violence in Burkina Faso, Mali and Niger in 2024 highlights the urgency of scaling up investments in the technology.


    Read more: West Africa could soon have a jihadist state – here’s why


    Training for preparedness

    Ghana combats new and varying forms of terrorism by uncovering trends and training personnel to deal with them.

    A notable example was the six-day joint training in 2022 involving the Ghana Immigration Service, Police Service, Customs, Economic and Organised Crime Office, and the National Intelligence Bureau.

    The country also works with regional neighbours like Burkina Faso, Togo and Benin, and partners such as the United States, through initiatives like “Operation Epic Guardian”.

    Media as a strategic partner

    Terrorists rely on media to amplify fear and publicise their causes. Ghana’s security agencies counter this tactic by actively engaging media houses to report accurately.

    The Ghana Armed Forces, for instance, works with media to debunk false reports, which can cause public panic and inadvertently aid terrorists.

    The Ghana Police Service emphasises regular dialogue with media to ensure sensitive information is verified before publication, reducing the risk of tipping off suspects. However, media competition for viewers poses a challenge.

    Surveillance and intelligence gathering

    Surveillance and intelligence gathering is critical. Plainclothes armed forces and immigration personnel blend into communities to monitor potential threats. The approach has worked but is constrained by resources.

    It can also risk human rights violations, such as wrongful profiling, and is less effective against multiple targets compared to technological solutions like facial recognition or CCTV.


    Read more: Funding terror: how west Africa’s deadly jihadists get the money they need to survive


    Challenges and regional implications

    Despite its successes, Ghana’s counter-terrorism framework faces challenges that could undermine its long-term efficacy:

    • logistical and financial constraints

    • the influx of migrants fleeing regional violence

    • a lack of harmonised security cultures within the regional body, Ecowas.

    In all, Ghana’s strategies offer lessons for west Africa, where terrorism is a growing threat.

    Its community engagement model could be followed in Nigeria, Burkina Faso, Mali and Niger to counter radicalisation and arms proliferation, provided it avoids religious stereotyping.

    – Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach
    – https://theconversation.com/ghanas-security-strategy-has-kept-terror-attacks-at-bay-what-other-countries-can-learn-from-its-approach-260333

    MIL OSI Africa –

    July 23, 2025
  • MIL-OSI Security: U.S. Marshals Lone Star Fugitive Task Force Commemorates 20 Years Investigating, Apprehending West Texas Fugitives

    Source: US Marshals Service

    San Antonio, TX – The U.S. Marshals Service (USMS) is commemorating the Lone Star Fugitive Task Force’s 20 years of service as part of the Western District of Texas.

    The Lone Star Fugitive Task Force (LSFTF) is a multi-agency task force focused on the reduction of violence within the Western District of Texas through the identification, investigation, and apprehension of fugitives wanted for egregious crimes against the community. Since its inception in March 2005, the task force has investigated and apprehended over 58,991 fugitives, including 1,795 wanted for murder.  

    The Western District of Texas consists of 93,000 square miles, 68 counties, 809 miles of border with Mexico, with eight divisions located in Austin, Alpine, Del Rio, El Paso, Midland, Pecos, San Antonio and Waco.

    Notable historical cases, arrests, and awards in the Western District of Texas include: 

    In April 2017, the Austin division was presented the Outstanding Team Award at the 34th Annual 100 Club of Central Texas Awards Banquet. 

    June 2022, the Austin division conducted a fugitive investigation that led to the arrest of Kaitlin Armstrong, sought for the May 2022 murder of professional cyclist Moriah “Mo” Wilson. Armstrong was apprehended at a hostel in Costa Rica following a 43-day fugitive investigation with assistance from the U.S. Marshals Office of International Operations, Homeland Security Investigations, and the Department of State Diplomatic Security Service.

    February 2024, the Alpine division investigated the whereabouts of Ivan Ramos-Hernandez, who fled from Presidio Police, engaging them in a high-speed pursuit and firing gunshots. Ramos-Hernandez fled to Ojinaga, Mexico, where he was apprehended by Mexican authorities following a multi-agency collaboration with assistance provided from Homeland Security Investigations, Custom Border Protection, U.S. Probation, Texas Department of Public Safety Criminal Investigation Division, Presidio Police and Mexican officials. Ramos-Hernandez attempted a violent escape one last time during transport that was halted by authorities. 

    January 2022, the Del Rio division was contacted by the Gulf Coast Violent Offenders Fugitive Task Force to locate and apprehend Oscar Rosales, who was wanted for capital murder, when he shot and killed Corporal Charles Galloway with the Harris County Constables Office during a traffic stop. Rosales fired multiple rounds from an assault rifle and fled from the scene. Rosales was added to the Texas10 Most Wanted Fugitive list and was believed to have fled to Mexico. Investigators in the Del Rio division worked directly with Mexican authorities and coordinated his apprehension in Acuna, Mexico. 

    August 2017, the El Paso division initiated a fugitive investigation to apprehend Javier Gonzalez and Manual Gallegos, members of the Kinfolk Outlaw Motorcycle Gang sought for multiple counts of engaging in organized criminal activity and aggravated assault with a deadly weapon. Gonzales and Gallegos were arrested in two separate incidents within a 10-day span with additional assistance from El Paso Police Department’s SWAT team.

    April 2025, the Midland division adopted the apprehension of Noah Gilbert Olgin, who was wanted for aggravated assault with a deadly weapon, injury to a child, deadly conduct and a federal supervised release violation for possession of a firearm, following an incident where he was involved in a drive-by-shooting in Odessa, that resulted in a serious injury to a child.  Olgin was arrested in Midland with assistance from the Midland SWAT team. 

    November 2022, the Pecos division arrested Jose Hernandez, a Texas 10 Most Wanted Fugitive apprehended in Monterey, Nuevo Leon, Mexico, through a coordinated effort with the Gulf Coast Violent Offenders Fugitive Task Force and Mexican authorities. Hernandez was sought on a bond violation for two counts of aggravated sexual assault of a child. 

    January 2024, the San Antonio division joined efforts to apprehend Romeo Nance, who was wanted in connection with a mass shooting in Joliet, Illinois, that killed eight people and wounded one other person. The Great Lakes Regional Fugitive Task Force, Joliet Police Department, and the Will County Sheriff’s Department requested immediate assistance from the LSFTF who located and observed Nance at a gas station in Natalia, Texas. As members of the LSFTF attempted to contain Nance in his vehicle, he fled on foot, taking his own life with a self-inflicted gunshot wound. 

    June 2020, the Waco division was contacted by the U.S. Army Criminal Investigation Division to locate 20-year-old Pfc. Class Vanessa Guillen, a Fort Hood soldier who had been reported missing under unusual circumstances in April 2020. Joining CID’s investigation, task force members determined Guillen had been murdered by another soldier. Less than 24 hours after Guillen’s remains were located in a shallow grave near a river, the LSFTF identified Spc. Aaron David Robinson and his girlfriend Cecily Aguilar as primary suspects in her murder. As task force members attempted to take Robinson into custody, he fatally shot himself. Aguilar pleaded guilty in federal court and was sentenced to 30 years of incarceration. In 2021, the Waco Division received the Distinguished Group Award for District Task Forces at the 40th United States Marshals Service Director’s Honorary Awards in recognition of locating Guillen’s remains and identifying those responsible for her death. In July of 2022, personnel in the Waco Division were recognized for their outstanding service, selfless pursuit of justice, and assisting in bringing closure for Guillen’s family and friends by being granted the 69th Attorney General’s Award for Distinguished Service.   

    On June 2, the Waco Division received the Distinguished Group Award for the District Task Forces at the 43rd United States Marshals Service Director’s Honorary Awards for a two-year-old cold case from Leon County, involving a missing child, and possible homicide of the child’s mother. The division conducted an intensive investigation that resulted in the recovery of the mother’s decomposed remains found buried in a field and completed a multifaceted arrest operation that resulted in the arrest of the suspect and safe recovery of the missing child. During the conclusion of the arrest, multiple firearms, ammunition, body armor, and narcotics were seized, and the suspect was indicted on capital murder.

    “I am immensely proud of the Deputy U.S. Marshals and the numerous task force officers of the Lone Star Fugitive Task Force, men and women who are fully devoted to making their communities safer for their fellow citizens by apprehending offenders wanted for the most serious crimes such as murder and child abuse, while ensuring the equal application of justice for all,” said Marshal Susan Pamerleau, U.S. Marshal of the Western District of Texas.  

    U.S. Marshals task forces combine the efforts of federal, state, and local law enforcement agencies to locate and arrest the most dangerous fugitives. Fifty-eight local task forces are dedicated to reducing violent crime by locating and apprehending wanted criminals. They also serve as the central point for agencies to share information on fugitive matters.  Task force officers are state and local police officers who receive special deputations with the U.S. Marshals. While on a task force, these officers can exercise U.S. Marshals authorities, such as crossing jurisdictional lines.

    Members of the Lone Star Fugitive Task Force across the Western District of TexasSAN ANTONIO – The U.S. Marshals Service is commemorating the Lone Star Fugitive Task Force’s 20 years of service as part of the Western District of Texas.

    The Lone Star Fugitive Task Force (LSFTF) is a multi-agency task force focused on the reduction of violence within the Western District of Texas through the identification, investigation, and apprehension of fugitives wanted for egregious crimes against the community. Since its inception in March 2005, the task force has investigated and apprehended over 58,991 fugitives, including 1,795 wanted for murder.  

    The Western District of Texas consists of 93,000 square miles, 68 counties, 809 miles of border with Mexico, with eight divisions located in Austin, Alpine, Del Rio, El Paso, Midland, Pecos, San Antonio and Waco.

    Notable historical cases, arrests, and awards in the Western District of Texas include: 
    In April 2017, the Austin division was presented the Outstanding Team Award at the 34th Annual 100 Club of Central Texas Awards Banquet. 
    June 2022, the Austin division conducted a fugitive investigation that led to the arrest of Kaitlin Armstrong, sought for the May 2022 murder of professional cyclist Moriah “Mo” Wilson. Armstrong was apprehended at a hostel in Costa Rica following a 43-day fugitive investigation with assistance from the U.S. Marshals Office of International Operations, Homeland Security Investigations, and the Department of State Diplomatic Security Service.
    February 2024, the Alpine division investigated the whereabouts of Ivan Ramos-Hernandez, who fled from Presidio Police, engaging them in a high-speed pursuit and firing gunshots. Ramos-Hernandez fled to Ojinaga, Mexico, where he was apprehended by Mexican authorities following a multi-agency collaboration with assistance provided from Homeland Security Investigations, Custom Border Protection, U.S. Probation, Texas Department of Public Safety Criminal Investigation Division, Presidio Police and Mexican officials. Ramos-Hernandez attempted a violent escape one last time during transport that was halted by authorities. 
    January 2022, the Del Rio division was contacted by the Gulf Coast Violent Offenders Fugitive Task Force to locate and apprehend Oscar Rosales, who was wanted for capital murder, when he shot and killed Corporal Charles Galloway with the Harris County Constables Office during a traffic stop. Rosales fired multiple rounds from an assault rifle and fled from the scene. Rosales was added to the Texas10 Most Wanted Fugitive list and was believed to have fled to Mexico. Investigators in the Del Rio division worked directly with Mexican authorities and coordinated his apprehension in Acuna, Mexico. 
    August 2017, the El Paso division initiated a fugitive investigation to apprehend Javier Gonzalez and Manual Gallegos, members of the Kinfolk Outlaw Motorcycle Gang sought for multiple counts of engaging in organized criminal activity and aggravated assault with a deadly weapon. Gonzales and Gallegos were arrested in two separate incidents within a 10-day span with additional assistance from El Paso Police Department’s SWAT team.
    April 2025, the Midland division adopted the apprehension of Noah Gilbert Olgin, who was wanted for aggravated assault with a deadly weapon, injury to a child, deadly conduct and a federal supervised release violation for possession of a firearm, following an incident where he was involved in a drive-by-shooting in Odessa, that resulted in a serious injury to a child.  Olgin was arrested in Midland with assistance from the Midland SWAT team. 
    November 2022, the Pecos division arrested Jose Hernandez, a Texas 10 Most Wanted Fugitive apprehended in Monterey, Nuevo Leon, Mexico, through a coordinated effort with the Gulf Coast Violent Offenders Fugitive Task Force and Mexican authorities. Hernandez was sought on a bond violation for two counts of aggravated sexual assault of a child. 
    January 2024, the San Antonio division joined efforts to apprehend Romeo Nance, who was wanted in connection with a mass shooting in Joliet, Illinois, that killed eight people and wounded one other person. The Great Lakes Regional Fugitive Task Force, Joliet Police Department, and the Will County Sheriff’s Department requested immediate assistance from the LSFTF who located and observed Nance at a gas station in Natalia, Texas. As members of the LSFTF attempted to contain Nance in his vehicle, he fled on foot, taking his own life with a self-inflicted gunshot wound. 
    June 2020, the Waco division was contacted by the U.S. Army Criminal Investigation Division to locate 20-year-old Pfc. Class Vanessa Guillen, a Fort Hood soldier who had been reported missing under unusual circumstances in April 2020. Joining CID’s investigation, task force members determined Guillen had been murdered by another soldier. Less than 24 hours after Guillen’s remains were located in a shallow grave near a river, the LSFTF identified Spc. Aaron David Robinson and his girlfriend Cecily Aguilar as primary suspects in her murder. As task force members attempted to take Robinson into custody, he fatally shot himself. Aguilar pleaded guilty in federal court and was sentenced to 30 years of incarceration. In 2021, the Waco Division received the Distinguished Group Award for District Task Forces at the 40th United States Marshals Service Director’s Honorary Awards in recognition of locating Guillen’s remains and identifying those responsible for her death. In July of 2022, personnel in the Waco Division were recognized for their outstanding service, selfless pursuit of justice, and assisting in bringing closure for Guillen’s family and friends by being granted the 69th Attorney General’s Award for Distinguished Service.   
    On June 2, the Waco Division received the Distinguished Group Award for the District Task Forces at the 43rd United States Marshals Service Director’s Honorary Awards for a two-year-old cold case from Leon County, involving a missing child, and possible homicide of the child’s mother. The division conducted an intensive investigation that resulted in the recovery of the mother’s decomposed remains found buried in a field and completed a multifaceted arrest operation that resulted in the arrest of the suspect and safe recovery of the missing child. During the conclusion of the arrest, multiple firearms, ammunition, body armor, and narcotics were seized, and the suspect was indicted on capital murder.

    “I am immensely proud of the Deputy U.S. Marshals and the numerous task force officers of the Lone Star Fugitive Task Force, men and women who are fully devoted to making their communities safer for their fellow citizens by apprehending offenders wanted for the most serious crimes such as murder and child abuse, while ensuring the equal application of justice for all,” said Marshal Susan Pamerleau, U.S. Marshal of the Western District of Texas.  

    U.S. Marshals task forces combine the efforts of federal, state, and local law enforcement agencies to locate and arrest the most dangerous fugitives. Fifty-eight local task forces are dedicated to reducing violent crime by locating and apprehending wanted criminals. They also serve as the central point for agencies to share information on fugitive matters.  Task force officers are state and local police officers who receive special deputations with the U.S. Marshals. While on a task force, these officers can exercise U.S. Marshals authorities, such as crossing jurisdictional lines.

    Members of the Lone Star Fugitive Task Force across the Western District of Texas:

    • Austin Police Department-Tactical Intelligence Unit
    • Police Departments:  Anthony, Buffalo, Crystal City, Del Rio, Eagle Pass, El Paso, Georgetown, Killeen, New Braunfels, Nolanville, Round Rock, San Marcos, Uvalde, and Waco, Texas.
    • Sheriff’s Offices:  Bexar County, Coryell County, Dimmett County, Ector County, Hays County, McLennan County, Maverick County, Midland County, New Braunfels, Real County, Travis County, Val Verde County, Williamson County, and Zavala County.
    • District Attorney’s Offices: Bexar County, and Val Verde County.
    • Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF)
    • Midland Fire Marshals Office
    • Naval Criminal Investigative Service (NCIS)
    • Texas Attorney General’s Office
    • Texas Board of Criminal Justice (TBCJ) – Office of the Inspector General (OIG)
    • Texas Department of Public Safety
    • Texas Parks and Wildlife Division
    • Texas National Guard Joint Counterdrug Task Force
    • U.S. Immigration & Customs Enforcement
    • U.S. DHS/Homeland Security Investigations

    MIL Security OSI –

    July 23, 2025
  • MIL-OSI Analysis: Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach

    Source: The Conversation – Africa (2) – By Paa Kwesi Wolseley Prah, Postdoctoral Fellow, Dublin City University

    Ghana stands out in west Africa as a nation that has not experienced terrorist attacks, even though it’s geographically close to countries that have. In Burkina Faso, Mali and Nigeria, extremist groups such as Boko Haram and Islamic State in West Africa (ISWAP) have wreaked havoc.

    This resilience is not accidental. It is the result of deliberate counter-terrorism strategies employed by Ghana’s security institutions.

    Ghana’s counter-terrorism framework was set out in 2020. It has four pillars: prevent, pre-empt, protect, and respond. The idea is to coordinate multiple agencies, including the Ghana Police Service, Ghana Immigration Service, Ghana Armed Forces and the National Intelligence Bureau.

    These pillars guide strategies to address both immediate threats and underlying vulnerabilities. Poverty, religious radicalism and porous borders are common drivers of terrorism in west Africa.

    I am an international security and global governance researcher. My co-author is a government and international studies scholar.

    Four years ago we wrote a paper examining Ghana’s resilience against terrorist attacks. Our findings are still relevant given the increasing activities of terror groups in the west African region.




    Read more:
    West Africa terror: why attacks on military bases are rising – and four ways to respond


    We wanted to identify what works as a potential model for other countries.

    Using a qualitative methodology, we interviewed stakeholders — including police officers, members of the armed forces, Muslim community leaders, and immigration officials. We also analysed the national framework for preventing and countering violent extremism and terrorism.

    Our findings showed that Ghana’s success is traceable to an approach that integrates community engagement with advanced border technology, inter-agency training, media collaboration and intelligence operations. And it addresses both immediate and underlying threats.

    We argue that Ghana’s ability to balance prevention with security offers solutions for stability in a geopolitically volatile region.




    Read more:
    Ghana’s new president faces tough regional security problems: why he’s well-placed to tackle them


    Community engagement

    One of the standout strategies is community engagement. This serves multiple purposes, from guiding people away from extremism to gathering intelligence.

    The Ghana Police Service, for instance, engages Muslim-dominated communities, known as “Zongos”, to counter radical Islamic ideologies that could be exploited by terrorist groups.

    By collaborating with local religious leaders, police make communities aware of the dangers of radicalisation. They foster trust and encourage residents to report suspicious activities. This approach also works in tackling illegal arms circulation.

    Ghana has an estimated 2.3 million small arms in circulation – 1.1 million of them illegally possessed. The availability of so many weapons fuels terrorist activities across west Africa.

    Community based de-radicalisation aligns with global best practices. In Norway, for instance, it was used to disengage youth from extremist groups.

    Technology at borders

    Ghana’s border control management is another part of its counter-terrorism strategy. Ghana Immigration Service uses advanced security software and integrated systems like the “Immigration 360” system, designed to fully automate passenger processing and data management.

    The system manages records of fingerprints and other data to improve reporting and intelligence sharing between Ghana Immigration and other security agencies.

    The technology makes it possible to quickly identity individuals on terrorist watchlists and detects concealed goods. This helps prevent illegal cross-border movements.

    There are gaps in Ghana’s defences, however. The influx of migrants fleeing extremist violence in Burkina Faso, Mali and Niger in 2024 highlights the urgency of scaling up investments in the technology.




    Read more:
    West Africa could soon have a jihadist state – here’s why


    Training for preparedness

    Ghana combats new and varying forms of terrorism by uncovering trends and training personnel to deal with them.

    A notable example was the six-day joint training in 2022 involving the Ghana Immigration Service, Police Service, Customs, Economic and Organised Crime Office, and the National Intelligence Bureau.

    The country also works with regional neighbours like Burkina Faso, Togo and Benin, and partners such as the United States, through initiatives like “Operation Epic Guardian”.

    Media as a strategic partner

    Terrorists rely on media to amplify fear and publicise their causes. Ghana’s security agencies counter this tactic by actively engaging media houses to report accurately.

    The Ghana Armed Forces, for instance, works with media to debunk false reports, which can cause public panic and inadvertently aid terrorists.

    The Ghana Police Service emphasises regular dialogue with media to ensure sensitive information is verified before publication, reducing the risk of tipping off suspects. However, media competition for viewers poses a challenge.

    Surveillance and intelligence gathering

    Surveillance and intelligence gathering is critical. Plainclothes armed forces and immigration personnel blend into communities to monitor potential threats. The approach has worked but is constrained by resources.

    It can also risk human rights violations, such as wrongful profiling, and is less effective against multiple targets compared to technological solutions like facial recognition or CCTV.




    Read more:
    Funding terror: how west Africa’s deadly jihadists get the money they need to survive


    Challenges and regional implications

    Despite its successes, Ghana’s counter-terrorism framework faces challenges that could undermine its long-term efficacy:

    • logistical and financial constraints

    • the influx of migrants fleeing regional violence

    • a lack of harmonised security cultures within the regional body, Ecowas.

    In all, Ghana’s strategies offer lessons for west Africa, where terrorism is a growing threat.

    Its community engagement model could be followed in Nigeria, Burkina Faso, Mali and Niger to counter radicalisation and arms proliferation, provided it avoids religious stereotyping.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    – ref. Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach – https://theconversation.com/ghanas-security-strategy-has-kept-terror-attacks-at-bay-what-other-countries-can-learn-from-its-approach-260333

    MIL OSI Analysis –

    July 23, 2025
  • MIL-OSI Canada: CBSA seizes 187.5 kg of cocaine at the Ambassador Bridge leading to criminal charges by the RCMP

    Source: Government of Canada News (2)

    July 22, 2025    Windsor, Ontario    Canada Border Services Agency 

    On May 23, 2025, Canada Border Services Agency (CBSA) border services officers at the Ambassador Bridge port of entry intercepted 187.5 kg of suspected cocaine concealed in the trailer of a commercial truck coming into Canada from the United States. 

    During a secondary examination of the trailer, CBSA officers discovered 2 suitcases and 5 garbage bags containing 161 bricks of suspected cocaine. The approximate value of the cocaine is $23.4 million.  

    CBSA officers seized the drugs and arrested the driver, Kambiz Karandish, 55, of Richmond Hill, Ontario, and transferred him and the suspected cocaine to the custody of the Royal Canadian Mounted Police (RCMP). Karandish has been charged by the RCMP with Importation of Cocaine, and Possession of Cocaine for the Purpose of Trafficking under the Controlled Drugs and Substances Act.

    The CBSA and the RCMP are committed to protecting our communities from harmful contraband and organized crime. 

    The investigation is ongoing. 

    MIL OSI Canada News –

    July 23, 2025
  • MIL-OSI Asia-Pac: Hongkong Post cyberattack probed

    Source: Hong Kong Information Services

    Hongkong Post said today that Police have initiated investigation into an incident involving an unauthorised party cyberattacking the EC-Ship system with countless attempts at midnight on July 20 and the following day to access and retrieve information through the system’s address book function.

    Hongkong Post has notified all affected account holders by email, reminding them to remain vigilant and immediately inform people in their address books of the incident.

    The services concerned have resumed normal and account holders can continue to use the services, it added.

    For enquiries, call 2921 2222.

    MIL OSI Asia Pacific News –

    July 23, 2025
  • MIL-OSI Europe: Eurojust helps catch alleged author of threatening emails to schools in Czechia, Slovakia and Latvia

    Source: European Union 2

    Eurojust has assisted the authorities in the Czech Republic, Slovakia and Latvia with the apprehension of the alleged perpetrator who was responsible for sending thousands of emails in September last year threatening schools with explosions. The mass threats, which were also sent to other educational institutions and leisure centres, caused major public concern and led to the suspension of classes at the beginning of the school year.

    Eurojust supported the national authorities involved by setting up a joint investigation team (JIT) dedicated to the case, as well as providing additional cross-border judicial support.

    The alleged perpetrator also used the social network Telegram to spread his threats. He was apprehended in the Ukrainian city of Dnipro last week but was released pending potential further steps to be taken by the authorities.

    © Dnipropetrovsk Regional Prosecutor’s Office

    Given the mass scale of the threats at the same time across three countries, the police authorities involved coordinated their investigations, assisted by the setting up of the JIT. The joint investigative efforts, using the cybercrime expertise of the police, led to the identification of an alleged perpetrator, operating from the Ukrainian city of Dnipro.

    With the participation of Czech and Slovak police officers, a joint action took place in Dnipro last week, during which the alleged perpetrator was apprehended and one individual was questioned. Furthermore, two locations were searched, which led to the seizure of computer equipment.

    Thanks to the good and close cooperation of all the authorities concerned, the operation was successfully carried out under extremely difficult circumstances, very close to the frontline of the war in Ukraine, with Ukrainian, Czech and Slovak officers exposed to heavy risks.

    Eurojust offered support not only through the establishment of the JIT but also by organising a coordination meeting to prepare for the joint action day in Ukraine. The operation was carried out at the request of and by the following authorities:

    • Czech Republic: High Public Prosecutor’s Office in Prague; National Counterterrorism, Extremism and Cybercrime Agency (NCTEKK)
    • Latvia: Rīga Pārdaugava Prosecution Office; 1st Unit of Cybercrime Enforcement Department of the Central Criminal Police Department of the State Police
    • Slovakia: General Prosecutor´s Office of the Slovak Republic; Police Department West, Anti-Crime Unit, Bureau for Combating Organized Crime of the Presidium of the Police Corps (Police ACU); Counter Terrorism Centre, Presidium of the Police Corps
    • Ukraine: Dnipropetrovsk regional Prosecutor’s Office; Main Department of National Police in Dnipropetrovsk region; Division for Combating Cybercrime in Dnipropetrovsk region of the Cyber Police Department of National Police of Ukraine

    MIL OSI Europe News –

    July 23, 2025
  • MIL-OSI United Kingdom: New Forensic Science Regulator appointed for England and Wales

    Source: United Kingdom – Government Statements

    News story

    New Forensic Science Regulator appointed for England and Wales

    The regulator ensures that the highest standards in forensic science are met across the criminal justice system.

    Dr Marc Bailey has been appointed as the Forensic Science Regulator for England and Wales.

    Dr Bailey is a scientist who has significant regulatory experience. He has held multiple roles within the Medicines and Healthcare products Regulatory Agency (MHRA) and led international research in quality systems and standardisation, including whilst working at the National Physical Laboratory.

    The Forensic Science Regulator is responsible for ensuring that the provision of forensic science services across England and Wales meet the highest standards of quality and integrity. This includes assessing compliance, providing advice to ministers, setting quality standards and ensuring that all forensic science providers adhere to these standards.

    Dr Bailey will work closely with the police, forensic science providers and the legal profession to ensure that forensic science in England and Wales remains at the forefront of innovation and reliability.

    Dr Bailey will officially assume his duties after Gary Pugh’s term concludes on 25 July 2025.

    Crime and Policing Minister Dame Diana Johnson said:

    Dr Bailey is going to bring a wealth of experience and expertise as the new Forensic Science Regulator.

    This pivotal role is essential in ensuring the highest standards of forensic science are upheld.

    By setting rigorous standards and providing robust oversight, the Forensic Science Regulator will continue to ensure that forensic science supports the work of the police, allowing them to investigate crimes and bring justice for victims.

    I’d like to thank Gary Pugh for his previous work in this role.

    Dr Bailey said:

    I am delighted to be appointed to the post of Forensic Science Regulator.

    I look forward to enacting and developing the regulation of Forensic Science and working with the team that support my role to ensure that the criminal justice system has full confidence in forensic science evidence.

    Share this page

    The following links open in a new tab

    • Share on Facebook (opens in new tab)
    • Share on Twitter (opens in new tab)

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom –

    July 23, 2025
  • MIL-OSI United Nations: Secretary-General’s remarks to the Security Council – on Multilateralism and Peaceful Settlement of Disputes [bilingual as delivered; scroll down for all-English and all-French versions]

    Source: United Nations secretary general

    Mr. President, Excellencies,                                                       

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.

    The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.

    The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate… when unresolved disputes fuel the flames of conflict…and when states lose trust in each other.

    The Charter lays out a number of important tools to forge peace.

    Article 2.3 of the UN Charter is clear:

    “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice.”

    Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.

    This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law, and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts. 

    And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.

    Malnourishment is soaring.  Starvation is knocking on every door. 

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.

    That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.

    With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation. 

    I am appalled that UN premises have been struck – among them facilities of the UN Office for Project Services and the World Health Organization, including WHO’s main warehouse.

    This is despite all parties having been informed of the locations of these UN facilities.

    These premises are inviolable and must be protected under international humanitarian law – without exception.  

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.

    And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.  

    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.

    But it still holds the power to stop them.

    Mr. President,

    Peace is a choice.

    And the world expects the UN Security Council to help countries make this choice.   

    This Council is at the centre of the global architecture for peace and security.  

    Its creation reflected a central truth.

    Competition between states is a geopolitical reality.  

    But cooperation — anchored in shared interests and the greater good — is the sustainable pathway to peace.

    Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year. 

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.

    Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.

    The majority of situations on the Security Council’s agenda are complex and resist quick fixes.
    But even in the darkest days of the Cold War, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.

    One that successfully deployed a range of peacekeeping missions.

    One that opened the door for vital humanitarian aid to flow to people in need.

    And one that helped prevent a Third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.

    This Council should be made more representative of today’s geopolitical realities.

    And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.

    I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.

    The landmark adoption of Security Council Resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and re-build regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    Troisièmement, les États Membres doivent honorer leurs obligations en vertu du droit international, y compris la Charte des Nations Unies, le droit international des droits humains et le droit international humanitaire.

    Le Pacte pour l’avenir appelle tous les États Membres à respecter leurs engagements envers la Charte, ainsi que les principes de respect de la souveraineté, de l’intégrité territoriale et de l’indépendance politique des États.

    Tous ces principes sont ancrés dans le droit international et reposent sur l’engagement de donner la priorité à la prévention des conflits et au règlement pacifique des différends par le dialogue et la diplomatie.

    Le Pacte reconnaît également la contribution essentielle de la Cour internationale de Justice, qui fêtera son 80ème anniversaire l’année prochaine.

    Monsieur le Président,

    À l’occasion du 80ème anniversaire de notre Organisation et de la Charte qui lui a donné vie et forme, nous devons renouveler notre engagement envers l’esprit multilatéral de la paix par la diplomatie.

    Je me réjouis de travailler avec vous en ce sens, afin de parvenir à la paix et la sécurité internationales que les peuples du monde entier espèrent et méritent.

    Je vous remercie.

    [all-English]

    Mr. President, Excellencies,                                                       

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.

    The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.

    The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate… when unresolved disputes fuel the flames of conflict…and when states lose trust in each other.

    The Charter lays out a number of important tools to forge peace.

    Article 2.3 of the UN Charter is clear:

    “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice.”

    Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.

    This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law, and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts. 

    And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.

    Malnourishment is soaring.  Starvation is knocking on every door. 

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.

    That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.

    With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation.

    I am appalled that UN premises have been struck – among them facilities of the UN Office for Project Services and the World Health Organization, including WHO’s main warehouse.

    This is despite all parties having been informed of the locations of these UN facilities.

    These premises are inviolable and must be protected under international humanitarian law – without exception.    

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.

    And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.  
    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.

    But it still holds the power to stop them.

    Mr. President,

    Peace is a choice.

    And the world expects the UN Security Council to help countries make this choice.   

    This Council is at the centre of the global architecture for peace and security.  

    Its creation reflected a central truth.
    Competition between states is a geopolitical reality.  

    But cooperation — anchored in shared interests and the greater good — is the  sustainable pathway to peace.

    Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year. 

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.

    Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.

    The majority of situations on the Security Council’s agenda are complex and resist quick fixes.

    But even in the darkest days of the Cold War, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.

    One that successfully deployed a range of peacekeeping missions.

    One that opened the door for vital humanitarian aid to flow to people in need.

    And one that helped prevent a Third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.

    This Council should be made more representative of today’s geopolitical realities.

    And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.

    I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.

    The landmark adoption of Security Council Resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and re-build regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    And third — Member States must honour their obligations under international law, including the UN Charter, international human rights law and international humanitarian law.

    The Pact for the Future calls on all Member States to live up to their commitments in the UN Charter, and the principles of respect for sovereignty, territorial integrity and the political independence of states.

    All grounded in international law, and a commitment to prioritizing prevention of conflict and the peaceful settlement of disputes through dialogue and diplomacy.

    The Pact also recognized the critical contribution of the International Court of Justice, which celebrates its 80th anniversary next year.

    Mr. President,    

    As we mark the 80th anniversary of our organization and the Charter that gave it life and shape, we need to renew our commitment to the multilateral spirit of peace through diplomacy.

    I look forward to working with you in this important effort, to achieve the international peace and security the people of the world need and deserve.

    Thank you.

    [all-French]

    Monsieur le Président, Excellences,

    Je tiens à remercier le Vice-Premier Ministre et Ministre des affaires étrangères Ishaq Dar et le Pakistan d’avoir organisé le débat public de ce jour.

    Le thème de ce débat met en lumière le lien évident qui existe entre la paix internationale et le multilatéralisme.

    Il y a 80 ans, l’Organisation des Nations Unies a été fondée dans le but premier de préserver l’humanité du fléau de la guerre.

    Les architectes de la Charte des Nations Unies ont considéré que le règlement pacifique des différends était la seule issue possible lorsque les tensions géopolitiques s’intensifiaient, lorsque des différends non résolus attisaient les conflits et lorsque les États perdaient confiance les uns dans les autres.

    La Charte renferme un certain nombre d’outils majeurs destinés à forger la paix.

    Son Article 2.3 est clair :

    « Les Membres de l’Organisation règlent leurs différends internationaux par des moyens pacifiques, de telle manière que la paix et la sécurité internationales ainsi que la justice ne soient pas mises en danger ».

    Son Chapitre VI est tout aussi clair en ce qui concerne les responsabilités confiées au Conseil de sécurité, qui doit contribuer à assurer le règlement pacifique des différends « par voie de négociation, d’enquête, de médiation, de conciliation, d’arbitrage, de règlement judiciaire, de recours aux organismes ou accords régionaux, ou par d’autres moyens pacifiques » du choix des parties.

    La mesure 16 du Pacte pour l’avenir appelle les États Membres à démontrer leur attachement à la diplomatie préventive et au règlement pacifique des différends en recourant davantage à tous les mécanismes existants en la matière.

    Je félicite le Pakistan d’avoir mis à profit sa présidence pour présenter une résolution exhortant tous les États Membres à utiliser pleinement les outils en question dans le cadre de notre quête collective de la paix dans le monde.

    Nous en avons besoin plus que jamais.

    Partout dans le monde, nous observons un mépris total pour le droit international – voire des violations pures et simples de ce droit, notamment du droit international des droits humains, du droit international des réfugiés, du droit international humanitaire et de la Charte des Nations Unies elle-même –, sans que la responsabilité de quiconque ne soit engagée.

    Ces manquements aux obligations internationales surviennent à un moment où les divisions et les conflits géopolitiques s’aggravent.

    Et le coût – en vies humaines, en communautés brisées et en avenirs perdus – est accablant.

    Il suffit de regarder l’horreur qui se déroule à Gaza, avec un niveau de mort et de destruction sans équivalent dans l’histoire récente.

    La malnutrition explose.  La famine frappe à toutes les portes. 

    Et maintenant, nous assistons à l’agonie d’un système humanitaire fondé sur des principes humanitaires.

    Ce système se voit refuser les conditions nécessaires à son fonctionnement.  On lui refuse l’espace nécessaire pour agir.  On lui refuse la sécurité nécessaire pour sauver des vies.

    Alors que les opérations militaires israéliennes s’intensifient et que de nouveaux ordres de déplacement sont émis à Deir al-Balah, la dévastation s’ajoute à la dévastation.

    Je suis consterné que des locaux de l’ONU aient été touchés, notamment ceux du Bureau des Nations Unies pour les services d’appui aux projets et de l’Organisation mondiale de la Santé, y compris son entrepôt principal.

    Ceci alors que toutes les parties ont été informées de l’emplacement de ces installations de l’ONU.

    Ces locaux sont inviolables et doivent être protégés par le droit international humanitaire, sans exception.

    De Gaza à l’Ukraine, du Sahel au Soudan, de Haïti au Myanmar, et dans bien d’autres régions du monde, les conflits font rage, le droit international est bafoué, et la faim et les déplacements atteignent des niveaux record.

    Et le terrorisme, l’extrémisme violent et la criminalité transnationale restent des fléaux tenaces qui rendent la sécurité encore plus inaccessible.

    La diplomatie ne permet pas toujours de prévenir les conflits, la violence et l’instabilité.

    Mais elle a toujours le pouvoir de les arrêter.

    Monsieur le Président,

    La paix est un choix.

    Et le monde attend du Conseil de sécurité de l’Organisation qu’il aide les pays à faire ce choix.

    Ce Conseil est au cœur de l’architecture mondiale pour la paix et la sécurité.

    Sa création reposait sur une vérité fondamentale.

    La rivalité entre les États est une réalité géopolitique.

    Mais la coopération – ancrée dans des intérêts partagés et le bien commun – représente la voie durable vers la paix.

    Nous observons trop fréquemment que les divisions, les positions tranchées et la surenchère verbale bloquent la mise en place de solutions et sape l’efficacité de ce Conseil.

    Mais nous avons également observé des exemples admirables de cas où il a été possible de trouver un terrain d’entente et des solutions aux problèmes mondiaux.

    Ainsi, nous marquons aujourd’hui le troisième anniversaire de la signature de l’Initiative de la mer Noire et du mémorandum d’accord avec la Fédération de Russie – des mesures qui montrent ce que nous pouvons accomplir grâce à la médiation et aux bons offices de l’ONU, y compris dans les moments les plus difficiles.

    Et plus récemment, nous avons été témoins de bien d’autres exemples.

    De la Conférence de Séville sur le financement du développement à la Conférence de Nice sur l’océan, en passant par l’Accord sur la diversité biologique marine des zones ne relevant pas de la juridiction nationale, la Convention sur la cybercriminalité et le Pacte pour l’avenir, adopté l’année dernière.

    Le Pacte, en particulier, témoigne d’une claire volonté du monde de s’engager de nouveau à renforcer le système de sécurité collective des Nations Unies.

    Inspiré du Nouvel Agenda pour la paix, il donne la priorité à la diplomatie préventive et à la médiation, autant de domaines dans lesquels le Conseil peut jouer un rôle essentiel.

    En ce qui concerne le thème du débat qui nous réunit aujourd’hui, il y a selon moi trois domaines dans lesquels nous pouvons nous montrer à la hauteur de l’appel, contenu dans le Pacte, à renouveler notre engagement – et la confiance du monde – envers l’architecture multilatérale dont nous disposons pour régler les problèmes.

    Premièrement, les membres de ce Conseil, en particulier les membres permanents, doivent continuer à s’efforcer de surmonter les dissensions.

    La majorité des situations inscrites à l’ordre du jour du Conseil de sécurité sont complexes et ne se prêtent pas à des solutions rapides.

    Mais même dans les jours les plus sombres de la guerre froide, le dialogue et la prise de décision collective au sein de ce Conseil ont permis de maintenir un système de la sécurité mondiale commun et efficace.

    Un système qui a déployé avec succès toute une série de missions de maintien de la paix.

    Un système qui a ouvert la voie à l’acheminement d’une aide humanitaire vitale aux personnes dans le besoin.

    Et un système qui a permis d’éviter une troisième guerre mondiale.

    Je vous exhorte à adopter le même état d’esprit en maintenant la communication, en continuant d’écouter de bonne foi, en vous employant à surmonter les divergences et à rechercher le consensus.

    Nous devons également veiller à ce que ce Conseil soit à l’image du monde d’aujourd’hui, et non de celui d’il y a 80 ans.

    Ce Conseil devrait être plus représentatif des réalités géopolitiques actuelles.

    Et nous devons continuer de perfectionner ses méthodes de travail afin de le rendre plus inclusif, plus transparent, plus efficace, et plus responsable.

    Je vous demande instamment de continuer d’œuvrer à la recherche du consensus pour faire avancer les négociations intergouvernementales.

    Deuxièmement, ce Conseil doit continuer de renforcer la coopération avec les partenaires régionaux et sous-régionaux.

    L’adoption historique de la résolution 2719 du Conseil de sécurité, visant à financer les opérations d’appui à la paix menées par l’Union africaine au moyen de contributions statutaires, est un bon exemple de la manière dont nous pouvons unir nos forces à celles des organisations régionales pour favoriser la mise en place de mesures plus efficaces.

    Je salue également les mesures prises par ce Conseil pour renforcer et rebâtir les cadres de sécurité régionaux afin d’encourager le dialogue et de favoriser le règlement pacifique des différends.

    Troisièmement, les États Membres doivent honorer leurs obligations en vertu du droit international, y compris la Charte des Nations Unies, le droit international des droits humains et le droit international humanitaire.

    Le Pacte pour l’avenir appelle tous les États Membres à respecter leurs engagements envers la Charte, ainsi que les principes de respect de la souveraineté, de l’intégrité territoriale et de l’indépendance politique des États.

    Tous ces principes sont ancrés dans le droit international et reposent sur l’engagement de donner la priorité à la prévention des conflits et au règlement pacifique des différends par le dialogue et la diplomatie.

    Le Pacte reconnaît également la contribution essentielle de la Cour internationale de Justice, qui fêtera son 80ème anniversaire l’année prochaine.

    Monsieur le Président,

    À l’occasion du 80ème anniversaire de notre Organisation et de la Charte qui lui a donné vie et forme, nous devons renouveler notre engagement envers l’esprit multilatéral de la paix par la diplomatie.

    Je me réjouis de travailler avec vous en ce sens, afin de parvenir à la paix et la sécurité internationales que les peuples du monde entier espèrent et méritent.

    Je vous remercie.

    MIL OSI United Nations News –

    July 23, 2025
  • MIL-OSI Security: #StopRansomware: Interlock

    Source: US Department of Homeland Security

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd. 
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt. 
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL Security OSI –

    July 23, 2025
  • MIL-OSI Submissions: Dog thefts: what really happened during the COVID pandemic

    Source: The Conversation – UK – By Daniel Allen, Animal Geographer, Keele University

    smrm1977/Shutterstock

    Dog theft can be a devastating crime. During the COVID pandemic, newspapers suggested there was an epidemic of “dognapping” in the UK. If you have a dog, the reports may have alarmed you at a time when there were already many reasons to feel afraid.

    There are mixed views on whether or not lockdown triggered an increase in dog ownership. Animal welfare charity Battersea attributed a 53% increase in dog adoption to lockdown, and online pet adoption service Pets4Homes said in their 2022 report that demand for puppies rose 104% at the peak of lockdown in May 2020.

    But animal charity PDSA said its survey data pointed to a gradual increase in dog ownership since 2011 rather than a dramatic surge during lockdown. However, we do know lockdown saw inflated prices for dogs, with some fashionable breeds going for £9,000.

    In terms of criminal activity, social distancing restrictions seemed to lead to a decline in some forms of crime, including shoplifting and burglary. But many media outlets reported the number of dog thefts had increased up to 250% during the pandemic.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    We wanted to explore if the data supported claims of a dognapping epidemic and whether patterns in dog theft could suggest ways to help reduce it. Our recent study found new insights into dog theft patterns and showed the situation was more complicated than it seemed at first glance.

    Under the Theft Act 1968, dog theft is not a specific offence. It comes under other theft offences, such as burglary or theft from a person.

    This means police records on dog theft were not included in crime statistics. The only way to access such information is through Freedom of Information (FOI) requests to individual police forces. There are 45 territorial and three special police forces in the UK, and each has its own reporting and recording practices.

    Although police FOI data for dog theft must be approached with caution, it is useful. Previous studies exploring police FOI data found an upward trend in recorded dog thefts in England and Wales: rising nearly 20% from 2015 (1,545) to 2018 (1,849) for 41 police forces combined; and up 3.5% year on year from 2019 (1,452) to 2020 (1,504) for 33 police forces.

    DogLost, a UK online community for reuniting lost and stolen dogs with their owners, reported a 170% increase in stolen dogs (with Crime Reference Numbers) registered on their website in 2020 (465), compared to 2019 (172). This figure was widely quoted as a national increase “since lockdown started” by the media.

    The 250% increase figure first quoted in December 2020 was actually a comparison of two seven-month periods (January-July 2019 and 2020) for only one police force.

    Patterns and trends

    Our study found the data for the period covering the COVID pandemic is also incomplete. Data was provided by 32 forces (71%) for 2020, by 27 forces (60%) for 2021, and 23 forces (51%) for 2022.

    Patterns and trends do, however, emerge. Between 2020 and 2022, the available data shows a 3.7% rise in dog thefts in the UK, from 1,573 to 1,631. When making adjustments for the number of police forces providing data (which decreased over the period), the estimated national figures suggest there may have been more significant rise of up to 44.2%.

    While we cannot assume that the forces who supplied data are representative of all 45 regional forces, if this were the case, it would equate to 2,212 recorded dog thefts in 2020, 2,645 in 2021, and 3,191 in 2022.

    There was a lot of variation between different areas. For example, Cambridgeshire, Gwent and Northumbria police forces experienced increases of 36%, 49% and 80% respectively in the number of recorded dog thefts between 2020 and 2021.

    Monthly analysis of data from regional police forces and DogLost, show that the number of reports of stolen dogs started to go up when the UK entered its first national lockdown and again during part of the third lockdown. But the average number of police-recorded dog thefts was actually slightly higher outside of lockdown periods than during them between 2020 and 2022.

    However, in contrast with police trends, DogLost data shows a 65.2% drop in dogs reported stolen on DogLost’s website in 2022 compared to 2020. Lower DogLost numbers may reflect limited visibility or presence of their networks, the use of alternative lost and stolen dog services, or reluctance to share personal details online due to scams targeting dog theft victims.

    Dogs are often stolen from inside their own homes.
    GoodFocused/Shutterstock

    Our study found that, overall, there probably was an increase in dog theft from
    2020 to 2022, following already identified increases in the preceding years. This rise was probably driven by a combination of opportunity (more dogs, higher value) and situational factors (accessibility, dogs unattended in gardens while owners were inside).

    Our evidence does not support the notion of a widespread epidemic as portrayed by the media. However, increased media interest probably amplified awareness of the issue, and influenced the creation of the Pet Theft Taskforce, a UK government initiative set up in May 2021 to investigate and tackle dog thefts.

    New research appears to confirm the idea that dog abduction has significant welfare effects on both dogs and their owners. We also know that few dog thefts are successfully resolved, with under a quarter of stolen dogs likely to be returned and around 1%-5% of reported dog thefts result in someone being charged.

    However, there is potential good news. Our ongoing research suggests the number of police-recorded dog thefts decreased slightly in 2023, and again in 2024. This is supported by research from pet insurer Direct Line, which has estimated a 21% decrease in the number of stolen dogs from 2,290 in 2023 to 1,808 in 2024 in the UK.

    Daniel Allen is founder of Pet Theft Reform and patron of the Stolen and Missing Pets Alliance (Sampa).

    Melanie Flynn is a member of the Research Advisory Committee of the Vegan Society (UK).

    John Walliss does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. Dog thefts: what really happened during the COVID pandemic – https://theconversation.com/dog-thefts-what-really-happened-during-the-covid-pandemic-252061

    MIL OSI –

    July 23, 2025
  • MIL-OSI Submissions: What are education and health care plans and why are parents worried about them being scrapped?

    Source: The Conversation – UK – By Jonathan Glazzard, Rosalind Hollis Professor of Education for Social Justice, University of Hull

    Drazen Zigic/Shutterstock

    For children in England with special educational needs and disabilities, an education and health care plan (EHCP) is a central pillar of support. The government is due to set out its educational strategy for children with special educational needs and disabilities in the autumn, though, and has not ruled out scrapping ECHPs. Their removal would signal radical change in how the system works in England.

    ECHPs are individualised plans that set out the needs of a particular child and the support they should receive – from education, health services and social care – in order have the best opportunity to thrive. But demand for ECHPs is soaring and providing support is proving financially catastrophic for local authorities.

    One of the criticisms of EHCPs is that they prioritise providing children with individual models of support, rather than developing inclusive cultures within schools and within the broader education system. Education secretary Bridget Phillipson has outlined a vision of building a system where more children with special educational needs and disabilities can attend mainstream schools.

    But removing ECHPs leads to the possibility of children who need more specialist support missing out.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    To secure an ECHP, local authorities carry out a statutory assessment to determine whether a child’s needs warrant additional support. An assessment does not always lead to an EHCP, but if one is issued, it must outline how the child’s needs will be met and the additional resources needed to do so.

    These resources might include funding to provide a child with a teaching assistant, funding for equipment and transport to school, or funding to go to a specialist school. This system of support helps school leaders ensure that children and young people have the right support, at the right time.

    According to a report published earlier this year, the demand for EHCPs has risen by 140% since 2015. Recent data shows that there are 482,640 children and young people in England with an EHCP.

    Many more children have special educational needs, but do not have an ECHP. These pupils are classed as receiving special educational needs support. The percentage of pupils with an EHCP has increased to 5.3%, from 4.8% in 2024. The percentage of pupils with special educational needs support has increased to 14.2%, from 13.6% in 2024.

    Despite government investment of £10.7 billion to local authorities in 2024-25, a House of Commons committee report outlines that long waiting times for assessments, as well as to access support such as speech and language therapy, has led to parents losing confidence in the system.

    Support may include equipment or additional sessions.
    ABO PHOTOGRAPHY/Shutterstock

    Funding is allocated to each local authority from central government to fund provision in their areas. It is for local authorities, in consultation with their schools, to determine the individual allocation to schools. However, local authorities are struggling to meet the increased demand for EHCPs. Even when funding is allocated through EHCPs, it is not always sufficient to address the needs of those with complex needs.

    And funding is not sufficient to meet demand. Local authorities have accumulated huge deficits due to spending exceeding funding, placing some at risk of going bankrupt.

    Future plans

    Bridget Phillipson has refused to be drawn on whether EHCPs will be axed. “What I can say very clearly,” she has said, “is that we will strengthen and put in place better support for children.”

    Building more inclusive schools is obviously one way of achieving this vision. If scrapping EHCPs means less funding for children for special educational needs and disabilities, though, this cannot be the answer. Children need more support, not less, to enable them to thrive.

    The solution is for the government to work out what models of inclusion work well in mainstream schools and to decide how these can be resourced and evaluated. Clarity is also needed on inclusion in mainstream schools can be measured in order to assess whether it is working.

    Making more support in mainstream schools work also requires an adequate supply of knowledgeable, well-trained teachers. The government is prioritising this through revision to initial teacher education courses, with an emphasis on all teachers being teachers of special educational needs.

    If the government doesn’t get this right, the result may be poorer educational and long-term outcomes for pupils with special educational needs and disabilities. It may also lead to issues with teacher recruitment and retention in mainstream schools, particularly if teachers feel that they do not have the level of support in place that they need to meet the needs of their pupils.

    Jonathan Glazzard does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. What are education and health care plans and why are parents worried about them being scrapped? – https://theconversation.com/what-are-education-and-health-care-plans-and-why-are-parents-worried-about-them-being-scrapped-260622

    MIL OSI –

    July 23, 2025
←Previous Page
1 … 29 30 31 32 33 … 1,000
Next Page→
NewzIntel.com

NewzIntel.com

MIL Open Source Intelligence

  • Blog
  • About
  • FAQs
  • Authors
  • Events
  • Shop
  • Patterns
  • Themes

Twenty Twenty-Five

Designed with WordPress