Category: Technology

  • MIL-OSI Economics: Introducing Surface Laptop 5G: Seamless connectivity, built for business

    Source: Microsoft

    Headline: Introducing Surface Laptop 5G: Seamless connectivity, built for business

    We’re excited to announce the expansion of our Surface Copilot+ PC portfolio for business customers. The new Surface Laptop 5G, 13.8-inch powered by Intel Core Ultra (Series 2) processors, will begin shipping Aug. 26, and the new Surface Laptop, 13-inch and Surface Pro, 12-inch are available starting today.[1]

    AI is every organization’s competitive edge—but only when it’s accessible the moment it’s needed. Surface Laptop 5G delivers that advantage with a 40+ trillion operations per second (TOPS) Neural Processing Unit (NPU) that powers fast, on-device intelligence, making everyday workflows more intuitive and efficient. Whether it’s staying focused in meetings, finding and acting on information faster, or reducing routine tasks, AI accelerates what matters most. With an integrated 5G modem, users stay continuously connected to Microsoft 365 Copilot[2] and other cloud tools, enabling deeper insights and real-time collaboration.

    Adding 5G to Surface Laptop has been one of the most requested features from our business customers. But the ask was never just about adding a modem—it reflected a deeper need to eliminate friction, with the ability to connect instantly, securely and reliably without worrying about signal strength or searching for a hotspot.

    Meeting that need was the driving force behind the design of Surface Laptop 5G. We set out to build the best 5G-connected laptop—one where connectivity fades into the background. Whether you’re a consultant joining a Teams call on a train, a field engineer uploading site data from the field or a sales leader finishing a proposal in a hotel lobby, Surface Laptop 5G keeps business moving wherever work happens.

    Surface Laptop 5G represents Microsoft’s end-to-end innovation in action. Hardware, software and cloud services come together to deliver intelligent, secure and connected experiences for today’s mobile workforce. The Surface for Business portfolio offers a complete solution for every user scenario, from tablet-first flexibility to high-performance laptops, all supported by Microsoft’s modern management and industry-leading security.

    Engineered for seamless 5G performance

    Adding 5G to Surface Laptop required more than just dropping in a modem. Every layer of Surface Laptop 5G was reengineered to deliver a seamless, reliable and secure experience, while preserving the design, performance and portability our customers expect.

    Dynamic antenna system

    At the heart of Surface Laptop 5G is a dynamic antenna system that continuously adapts to its environment. With six strategically placed antennas, the device automatically adjusts signal paths and power based on how it’s being held or used, ensuring strong, reliable connectivity exactly when and where it’s needed.[4] As users move between environments, the device seamlessly transitions between 5G and Wi-Fi networks, keeping a steady and secure connection to cloud-based apps, updates, and corporate resources. This innovative antenna design also enables Surface Laptop 5G to act as a mobile hotspot, securely sharing its 5G connection with other devices when Wi-Fi isn’t available.[3]

    Thoughtfully designed hardware

    Many laptops place antennas near the base, where signals are more likely to be blocked by objects or the user’s legs. Surface Laptop 5G was designed differently, with antennas strategically positioned higher on the device to reduce interference and maintain a strong, reliable and consistent connection.

    This design required a new material, one that allows radio signals to pass through without impacting performance, while still delivering the durability, premium feel and lightness our customers are looking for. We developed a custom multi-layered laminate that meets all of these needs, enabling reliable 5G performance without compromising portability or design.

    Surface Laptop 5G also includes both NanoSIM and eSIM options, integrated to preserve its slim profile while enabling global connectivity.[4] Weighing under 3 pounds, it is light and easy to carry across campuses, through airports or from meeting to meeting.

    Tested for the real world

    In Surface we don’t just simulate real-world use, we build for it. Surface Laptop 5G was tested in homes, apartments and active office environments replicating everyday scenarios. Moving between rooms, switching networks, multitasking and working from laps helped us fine-tune antenna placement, thermal performance and connectivity behavior to reflect how people actually work.

    To ensure global performance, the 5G hardware was field-tested with over 100 mobile operators across more than 50 countries. The result is reliable 5G connectivity that travels with your workforce around the world.[5]

    Secure and connected for smarter management

    With support for 5G built-in, Surface Laptop devices stay continuously connected, enabling IT to deliver security updates, enforce policies and access real-time insights, from almost anywhere. This integration is possible because Surface is engineered in partnership with Windows and Intune, combining hardware, software and cloud-based management into a unified Microsoft solution.

    IT can remotely deploy and manage eSIM profiles, allowing cellular connectivity to be preconfigured and pushed to enrolled Surface devices.6 Paired with Windows Autopilot, it enables a true zero-touch deployment experience where devices arrive fully configured, secured and ready to use.

    The Surface Management Portal within the Intune Admin Center provides centralized visibility into device health, compliance and usage across the Surface fleet. Now with Security Copilot integrated, IT can act faster with AI-powered tools to detect issues, assess risk and respond with greater confidence.

    For an extra layer of protection, the PanzerGlass Privacy Screen Protector helps safeguard on-screen information and can reduce the risk of visual data exposure when working in public spaces.[6]

    Surface is where Microsoft’s hardware, software and cloud come together to deliver an experience that’s easy to manage, safe to deploy and ready for AI from day one.

    A connected future, built for business

    Surface offers powerful protection that safeguards your data and privacy while enabling your employees to achieve more.

    Surface Laptop 5G joins a growing portfolio of Copilot+ PCs designed to meet the evolving needs of today’s workforce. With the Surface Pro for Business, 12-inch and Surface Laptop for Business, 13-inch now shipping, and Surface Laptop 5G arriving on Aug. 26, organizations have more choice than ever to modernize their device fleets with powerful, secure and AI-ready tools.

    When paired with Verizon’s secure, reliable 5G network, Surface devices unlock even greater productivity. The combination of Surface Copilot+ PCs, Microsoft 365 Copilot and high-speed mobile connectivity enables a seamless experience that helps businesses work easier and efficiently, in the office or out in the field. In the U.S., Surface for Business devices are available through a broad network of partners, including Verizon Business, with selected Verizon stores rolling out in the coming months.

    With support ending for Windows 10 PCs on Oct. 14, 2025, now is the time to begin the transition to a modern Windows experience—one that’s optimized for AI, secured by design and built for mobility.

    To learn more about the new Surface Laptop 5G, Surface Pro, 12-inch and Surface Laptop, 13-inch visit Surface.com/Business to find an authorized reseller, or visit the Microsoft Store. When you shop at Microsoft.com, you’ll get free shipping and an extended 60-day price protection and return window. For a deeper technical dive, see the Surface IT Pro Blog.

    [1] 5G will be available later in 2025 and only on specific SKUs of Surface Laptop for Business 13.8-inch | Intel, but not in all areas; compatibility and performance depends on carrier network, plan and other factors. See carrier for details and pricing.

    [2] Per user license sold separately; also requires eligible Microsoft 365 plan.

    [3] Mobile hotspot support may vary by country and/or carrier; additional fees may apply.

    [4] eSIM support and availability may vary by carrier and country.

    [5] Service availability and performance subject to service provider’s network. Contact your service provider for details, compatibility, pricing, SIM card and activation. See all specs and frequencies at surface.com. Availability of data plans for eSIM varies by market and by carrier.

    [6] Sold separately.

    MIL OSI Economics

  • MIL-OSI USA: July 22nd, 2025 Heinrich, Bennet, Hickenlooper Introduce Legislation to Expand and Improve Access to Clean Water for Tribal Families

    US Senate News:

    Source: United States Senator for New Mexico Martin Heinrich

    Half of households on Native American reservations lack access to reliable water sources, clean drinking water, or adequate sanitation

    WASHINGTON — U.S. Senator Martin Heinrich (D-N.M.), along with U.S. Senators Michael Bennet (D-Colo.) and John Hickenlooper (D-Colo.), introduced the Tribal Access to Clean Water Act to dramatically expand access to clean water for Tribal families by investing in water infrastructure. This bill would increase funding through the Indian Health Service, the U.S. Department of Agriculture (USDA), and the Bureau of Reclamation to support water infrastructure projects in Tribal communities and help provide clean water to Native American households that currently lack access.

    “Nearly half of Native American households lack access to clean and reliable water supplies. That is completely unacceptable,” said Heinrich. “By addressing a significant backlog of infrastructure projects and removing barriers to federal programs that provide technical and financial assistance to Tribes, this legislation is an important step toward delivering clean drinking water to all families in Indian Country.”

    “Too many Tribal communities in Colorado and across the country cannot access clean, safe water,” said Bennet. “This legislation builds on our efforts to improve access for Tribes in the Bipartisan Infrastructure Law. It fulfills the federal government’s promise to provide these communities with the clean water they deserve.”

    “Clean drinking water is a basic necessity. Yet, so many of our Tribal communities have been left without the infrastructure. It’s unacceptable,” said Hickenlooper. “Let’s cut red tape and invest in modern resources to finally deliver safe, accessible water to every Tribe.”

    Lack of access to clean drinking water is a significant barrier for many Native American communities. According to data from the U.S. Department of Health and Human Services (HHS), Native American households are 19 times more likely than white households to lack indoor plumbing.

    The Tribal Access to Clean Water Act will:

    • Authorize the USDA to make grants and loans for technical and financial assistance, as well as for construction;
    • Increase funding authorizations for USDA’s Rural Development Community Facilities Grant and Loan Program by $100 million per year for five years, provide $30 million per year specifically for technical assistance, and ensure that Native communities are treated equitably and appropriately when considered for grants and loans;
    • Increase funding authorizations for existing programs of the Indian Health Service for water and sanitation facilities construction over a five-year period, including for community facilities ($2.5 billion), technical assistance ($150 million), and operation and maintenance assistance ($500 million); and
    • Authorize $90 million over five years for the Bureau of Reclamation’s existing Native American Affairs Technical Assistance Program.

    “Water is a sacred resource given to us to protect. It is of the utmost importance that Tribes have access to clean water not only for personal consumption and economic development but also for cultural purposes. Many tribes in the Southwest rely on access to clean water to carry on our culture and traditions. We thank U.S. Senators Martin Heinrich and Michael Bennet for reintroducing the Tribal Access to Clean Water Act,” said Myron Armijo, Santa Ana Pueblo Governor.

    “It is far past time to ensure that Native people have the same level of basic water service most Americans take for granted,” said Manuel Heart, Chairman of the Ute Mountain Ute Tribe. “This bill’s recognition of the need for technical support and operation and maintenance assistance for Tribal water supply facilities is not only essential to realizing the benefit of investment in water infrastructure, but also a critical step toward increasing Tribal independence and governance capabilities.”

    “Some of the starkest examples of the public health impacts from not having clean, running water in the home are right in our backyards,” said Anne Castle, co-founder of the initiative on Universal Access to Clean Water for Tribal Communities. “Higher incidence of respiratory disease, gastrointestinal infections, diabetes, and cancer are all linked to ‘water poverty’ – the lack of access to secure and healthy household water – which is particularly acute for Native American households. With targeted resources and Federal agency coordination, we have the ability to solve this longstanding inequity in Indian country.”

    “For far too long, many indigenous Americans – American Indians, Alaska Natives, and Native Hawaiians – have gone without access to a clean and safe drinking water supply,” said John Echohawk, Executive Director and Co-Founder of the Native American Rights Fund and member of the Pawnee Nation. “These are not isolated or regional deficiencies, but rather a nationwide disparity in access to a basic ingredient of life. This bill will help to address gaps in current support for Tribal drinking water access and help to fulfill the Federal government’s treaty and trust responsibility to Native American Tribes.”

    “Every American is entitled to access to clean drinking water,” said Ken Norton, Chairman of the National Tribal Water Council. “But this undeniable truth simply does not hold for far too many Tribal households. It is well past time to bring the necessary resources to bear that will allow all Tribal families to enjoy the same basic services most Americans take for granted.”

    “Water is a basic human right and this bill fulfills the government’s trust obligation to Tribes and Indigenous communities to ensure all Native populations have access to clean drinking water,” said Garrit Voggesser, Senior Director of Tribal Partnerships and Policy, National Wildlife Federation. “For far too long more than half of the country’s Indigenous peoples haven’t had access to clean drinking water. Water must be accessible to not only support public health, but also meet historical, cultural, ecological, and rights-based needs.”

    Heinrich initially introduced this legislation with Bennet in 2021. He also successfully fought to include funding to improve Tribal access to clean water in the Infrastructure Law. The law included $3.5 billion for the Indian Health Service Sanitation Facilities Construction program to address needs for tribal sanitation facilities and services, $1 billion for the Bureau of Reclamation to support legacy rural water supply projects, which will benefit Tribes, and increased funding for the Environmental Protection Agency’s Clean Water Act and Safe Drinking Water Act State Revolving Funds.

    In addition to Heinrich, Bennet, and Hickenlooper, this bill is co-sponsored by U.S. Senators Bernie Sanders (I-Vt.), Ron Wyden (D-Ore.), Elizabeth Warren (D-Mass.), and Alex Padilla (D-Calif.).

    The text of the bill is available here.

    A summary of the bill is available here.

    MIL OSI USA News

  • MIL-OSI Russia: Air India plane’s auxiliary power unit catches fire after landing

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    NEW DELHI, July 22 (Xinhua) — An Air India passenger plane, flight AI-315, operating from Hong Kong to Delhi, caught fire in its auxiliary power unit shortly after landing at Indira Gandhi International Airport in New Delhi, the Indian capital, on Tuesday, officials said.

    The fire was discovered as passengers were preparing to exit the plane.

    Air India said no passengers or crew were injured, but the fire caused some damage to the aircraft itself.

    Another Air India flight from Cochin to Mumbai skidded off the runway while landing on Monday, causing damage to both the plane and the road surface, according to media reports. Last month, an Air India flight to London crashed shortly after takeoff in the city of Ahmedabad, killing all 241 people on board. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI United Nations: Amid ‘Horror Show in Gaza’, Humanitarian System Denied Space to Deliver, Multilateral Problem-Solving Needed More than Ever, Secretary-General Tells Security Council

    Source: United Nations General Assembly and Security Council

    Following are UN Secretary-General António Guterres’ remarks to the Security Council on multilateralism and peaceful settlement of disputes, in New York today:

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.  The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.  The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate, when unresolved disputes fuel the flames of conflict and when States lose trust in each other.

    The Charter lays out a number of important tools to forge peace.  Article 2.3 of the UN Charter is clear:  “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice”.  Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.  This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts.  And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.  Malnourishment is soaring.  Starvation is knocking on every door.

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.  That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.  With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation.

    I am appalled that UN premises have been struck — among them facilities of the UN Office for Project Services and the World Health Organization (WHO), including WHO’s main warehouse.  This is despite all parties having been informed of the locations of these UN facilities.  These premises are inviolable and must be protected under international humanitarian law — without exception.

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.  And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.

    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.  But it still holds the power to stop them.  Peace is a choice.  And the world expects the UN Security Council to help countries make this choice.  This Council is at the centre of the global architecture for peace and security.  Its creation reflected a central truth.

    Competition between States is a geopolitical reality.  But cooperation — anchored in shared interests and the greater good — is the sustainable pathway to peace.  Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year.

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.  Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.  The majority of situations on the Security Council’s agenda are complex and resist quick fixes.

    But even in the darkest days of the cold war, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.  One that successfully deployed a range of peacekeeping missions.  One that opened the door for vital humanitarian aid to flow to people in need.  And one that helped prevent a third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.  This Council should be made more representative of today’s geopolitical realities.  And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.  I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.  The landmark adoption of Security Council resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and rebuild regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    And third — Member States must honour their obligations under international law, including the UN Charter, international human rights law and international humanitarian law.

    The Pact for the Future calls on all Member States to live up to their commitments in the UN Charter, and the principles of respect for sovereignty, territorial integrity and the political independence of States.

    All grounded in international law, and a commitment to prioritizing prevention of conflict and the peaceful settlement of disputes through dialogue and diplomacy.  The Pact also recognized the critical contribution of the International Court of Justice, which celebrates its eightieth anniversary next year.

    As we mark the eightieth anniversary of our Organization and the Charter that gave it life and shape, we need to renew our commitment to the multilateral spirit of peace through diplomacy.  I look forward to working with you in this important effort, to achieve the international peace and security the people of the world need and deserve.

    MIL OSI United Nations News

  • MIL-OSI USA: Engineer pleads guilty to stealing trade secret technology designed for missile launch detection

    Source: US Immigration and Customs Enforcement

    LOS ANGELES — A Santa Clara County man and former engineer at a Southern California company pleaded guilty July 21 to stealing trade secret technologies developed for use by the United States government to detect nuclear missile launches, track ballistic and hypersonic missiles, and to allow U.S. fighter planes to detect and evade heat-seeking missiles.

    Chenguang Gong, 59, of San Jose, pleaded guilty to one count of theft of trade secrets. He remains free on $1.75 million bond.

    According to his plea agreement, Gong — a dual citizen of the United States and China — transferred more than 3,600 files from a Los Angeles-area research and development company where he worked — identified in court documents as the victim company — to personal storage devices during his brief tenure with the company last year.

    The files Gong transferred include blueprints for sophisticated infrared sensors designed for use in space-based systems to detect nuclear missile launches and track ballistic and hypersonic missiles, as well as blueprints for sensors designed to enable U.S. military aircraft to detect incoming heat-seeking missiles and take countermeasures, including by jamming the missiles’ infrared tracking ability. Some of these files were later found on storage devices seized from Gong’s temporary residence in Thousand Oaks.

    In January 2023, the victim company hired Gong as an application-specific integrated circuit design manager responsible for the design, development and verification of its infrared sensors. Beginning on approximately March 30, 2023, and continuing until his termination on April 26, 2023, Gong transferred thousands of files from his work laptop to three personal storage devices, including more than 1,800 files after he had accepted a job at one of the victim company’s main competitors.

    Many of the files Gong transferred contained proprietary and trade secret information related to the development and design of a readout integrated circuit that allows space-based systems to detect missile launches and track ballistic and hypersonic missiles and a readout integrated circuit that allows aircraft to track incoming threats in low visibility environments.

    Gong also transferred files containing trade secrets relating to the development of “next generation” sensors capable of detecting low observable targets while demonstrating increased survivability in space, as well as the blueprints for the mechanical assemblies used to house and cryogenically cool the victim company’s sensors. This information was among the victim company’s most important trade secrets that are worth hundreds of millions of dollars. Many of the files had been marked “[VICTIM COMPANY] PROPRIETARY,” “FOR OFFICIAL USE ONLY,” “PROPRIETARY INFORMATION,” and “EXPORT CONTROLLED.”

    Law enforcement also discovered that, between approximately 2014 and 2022, while employed at several major technology companies in the United States, Gong submitted numerous applications to ‘Talent Programs’ administered by the People’s Republic of China government. The PRC government has established these talent programs as a means to identify individuals who have expert skills, abilities, and knowledge of advanced sciences and technologies in order to access and utilize those skills and knowledge in transforming the PRC’s economy, including its military capabilities.

    In 2014, while employed at a U.S. information technology company headquartered in Dallas, Gong sent a business proposal to a contact at a high-tech research institute in China focused on both military and civilian products. In his proposal, translated from Chinese, Gong described a plan to produce high-performance analog-to-digital converters like those produced by his employer.

    In another Talent Program application from September 2020, Gong proposed to develop “low light/night vision” image sensors for use in military night vision goggles and civilian applications. Gong’s proposal included a video presentation that contained the model number of a sensor developed by an international defense, aerospace, and security company where Gong worked from 2015 to 2019.

    Gong travelled to China several times to seek Talent Program funding in order to develop sophisticated analog-to-digital converters. In his Talent Program applications, Gong underscored that the high-performance analog-to-digital converters he proposed to develop in China had military applications, explaining that they “directly determine the accuracy and range of radar systems” and that “[m]issile navigation systems also often use radar front-end systems.” In a 2019 email, translated from Chinese, Gong remarked that he “took a risk” by traveling to China to participate in the Talent Programs “because [he] worked for…an American military industry company” and thought he could “do something” to contribute to China’s “high-end military integrated circuits.”

    According to his plea agreement, the intended economic loss from Gong’s criminal conduct exceeds $3.5 million.

    United States District Judge John F. Walter scheduled a September 29 sentencing hearing, at which time Gong will face a statutory maximum sentence of 10 years in federal prison.

    The FBI’s Los Angeles Field Office through the Counterintelligence Task Force in partnership with the State Department’s Diplomatic Security Service and U.S. Immigration and Customs Enforcement Homeland Security Investigations is investigating this matter. The FBI’s San Francisco Field Office and the U.S. Attorney’s Office for the Northern District of California also provided substantial assistance.

    Assistant United States Attorneys David C. Lachman of the Terrorism and Export Crimes Section and Nisha Chandran of the Major Frauds Section are prosecuting this case, with valuable assistance from Department of Justice Trial Attorney Brendan P. Geary of the National Security Division’s Counterintelligence and Export Control Section.

    As a member of the FBI Counterintelligence Task Force, HSI contributes to the whole-of-government efforts to defeat hostile intelligence activities targeting the U.S., to include countering the proliferation of sensitive technology to potential adversaries. This case highlights the partnership between HSI, the FBI and DSS, each leveraging their unique capabilities and authorities, to disrupt insider threats at U.S. technology companies and to safeguard sensitive U.S. technology.

    MIL OSI USA News

  • MIL-OSI USA: CISA Releases Nine Industrial Control Systems Advisories

    News In Brief – Source: US Computer Emergency Readiness Team

    CISA released nine Industrial Control Systems (ICS) advisories on July 22, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

    CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

    MIL OSI USA News

  • MIL-OSI USA: #StopRansomware: Interlock

    News In Brief – Source: US Computer Emergency Readiness Team

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL OSI USA News

  • MIL-OSI USA: CISA Adds One Known Exploited Vulnerability, CVE-2025-53770 “ToolShell,” to Catalog

    News In Brief – Source: US Computer Emergency Readiness Team

    CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. See CISA’s Alert Microsoft Releases Guidance on Exploitation of SharePoint Vulnerability (CVE-2025-53770) for more information and to apply the recommended mitigations. 

    • CVE-2025-53770: Microsoft SharePoint Server Remote Code Execution Vulnerability

    These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.

    Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

    Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

    MIL OSI USA News

  • MIL-OSI USA: Hawley, Blumenthal Unveil Bipartisan Bill Empowering Working Americans to Sue Big Tech, AI Companies for Stealing Creative Works

    US Senate News:

    Source: United States Senator Josh Hawley (R-Mo)

    Monday, July 21, 2025

    Today, U.S. Senators Josh Hawley (R-Mo.) and Richard Blumenthal (D-Conn.) introduced bipartisan legislation to protect consumers’ data rights and hold Big Tech companies accountable for illegally pirating creators’ copyrighted works to train their artificial intelligence (AI) models.

    Senator Hawley’s legislation follows his recent Senate Judiciary Subcommittee hearing where he sounded the alarm on AI companies’ willful engagement in “the largest intellectual property theft in American history.”

    “AI companies are robbing the American people blind while leaving artists, writers, and other creators with zero recourse. It’s time for Congress to give the American worker their day in court to protect their personal data and creative works. My bipartisan legislation would finally empower working Americans who now find their livelihoods in the crosshairs of Big Tech’s lawlessness,” said Senator Hawley.

    “This bill embodies a bipartisan consensus that AI safeguards are urgent—because the technology is moving at accelerating speed, and so are dangers to privacy. Enforceable rules can put consumers back in control of their data, and help bar abuses. Tech companies must be held accountable—and liable legally—when they breach consumer privacy, collecting, monetizing or sharing personal information without express consent. Consumers must be given rights and remedies—and legal tools to make them real—not relying on government enforcement alone,” Senator Blumenthal said.

    Senators Hawley and Blumenthal have previously teamed up to put power back in the hands of users when it comes to Big Tech. Last Congress, they introduced a bipartisan framework to implement guardrails for AI that would protect consumers.

    The AI Accountability and Personal Data Protection Act will: 

    • Bar AI companies from stealing and training on copyright works. The bill safeguards individuals’ copyrighted materials from being used in AI training or AI-generated content without permission. 
    • Create a federal tort for data misuse. The legislation allows individuals to sue any person or company that appropriates, uses, sells, or exploits their personal data or copyrighted works without clear, affirmative consent. 
    • Provide transparency for creators. The bill requires companies to clearly disclose every third party that will access an individual’s data at the time consent is sought. 
    • Ensure robust remedies. The legislation provides for stiff financial penalties, injunctive relief, and protects the ability of individuals to sue in court and join class actions. 

    Read the full bill text here.

    MIL OSI USA News

  • MIL-OSI USA: Grothman, Dingell Reintroduce Bipartisan Dillon’s Law

    Source: United States House of Representatives – Congressman Glenn Grothman (R-Glenbeulah 6th District Wisconsin)

    Congressman Glenn Grothman (R-WI) and Congresswoman Debbie Dingell (D-MI) have reintroduced Dillon’s Law, a bipartisan bill that incentivizes states to empower “good Samaritans” to save lives in critical moments. The legislation encourages trained individuals to administer epinephrine in schools during emergencies. Currently, the administration of this medication is limited solely to trained school employees. 

    Dillon’s Law is named in honor of Dillon Mueller, a native of Mishicot, Wisconsin, who tragically passed away in 2014 at just 18 years old after being stung by a bee that resulted in an anaphylactic reaction. At the time of the incident, epinephrine was not readily available and accessible. 

    Several states, including Wisconsin, Minnesota, and Indiana, have enacted versions of Dillon’s Law with strong bipartisan support. While Congress passed a similar measure in 2013 to support epinephrine programs in schools, this legislation expands access further by allowing any trained individual to administer epinephrine in the event of an emergency.  

    Read more about Dillon’s Story HERE. 

    “We’re working to prevent more heartbreaking tragedies like Dillon’s,” said Congressman Grothman. “No parent should ever have to experience the pain of losing a child simply because lifesaving medication wasn’t available in time. 

    “Dillon’s Law gives states the tools to train and empower everyday people to act in emergencies and save lives. Since Wisconsin enacted a version of this law in 2017, thousands of residents have been trained to use epinephrine in life-threatening situations. This commonsense, bipartisan solution is already making a difference in our state, and it can do the same nationwide. I urge my colleagues in Congress to support this bill, honor Dillon’s legacy, and help save lives.” 

    “Deaths like Dillon’s are heartbreaking and preventable, and we should empower good Samaritans to save lives,” said Congresswoman Dingell. “I’m proud to introduce Dillon’s Law with Rep. Grothman to help prepare individuals to respond to anaphylaxis and prevent tragedies like the one experienced by the Mueller family. We’ve seen programs like this work in my home state of Michigan, and we can help so many people by expanding this to the rest of the country.” 

    “Practicing allergists see firsthand how rapidly anaphylaxis can become life-threatening without immediate access to epinephrine,” said ACAAI President, Dr. James Tracy. “Dillon’s Law is a critical step forward in empowering trained individuals on school grounds to act swiftly and save lives. The American College of Allergy, Asthma, and Immunology (ACAAI) strongly supports this bipartisan effort to expand epinephrine access and Good Samaritan protections. This will help ensure no student or staff member loses their life because lifesaving treatment wasn’t readily available.” 

    “Expanding access to epinephrine will save lives,” said AAFA president and CEO, Kenneth Mendez. “Death from anaphylaxis – a potentially life-threatening allergic reaction – is preventable if epinephrine is administered quickly. By encouraging states to allow any trained individual to administer epinephrine at schools, Dillon’s Law will make it more likely that someone experiencing anaphylaxis receives emergency epinephrine when every second counts. We thank Representatives Grothman and Dingell for their leadership on this lifesaving legislation that helps prevent tragedies before they occur.” 

    “Dillon’s Law is about saving lives by ensuring that more people are prepared to respond to anaphylaxis emergencies when every second counts,” said Lynda Mitchell, CEO of Allergy & Asthma Network. “It empowers everyday citizens to step in during a severe allergic reaction and provide life-saving epinephrine, especially in communities where immediate medical help isn’t always available. We fully support this legislation and urge Congress to move it forward.” 

    “FARE applauds Representative Grothman on the introduction of Dillon’s Law, a common-sense, and cost-effective way to prevent future tragedies,” said Sung Poblete, PhD, RN, CEO of FARE. “Considering that on average, there are two children in every U.S. classroom affected by food allergy alone, the need for this legislation is great. Expanded definitions and protections that allow individuals to act in the event of an emergency, along with the recognition of needle-free epinephrine options are measures that are good for everyone.” 

    “On behalf of more than 431,000 nurse practitioners (NPs) nationwide, the American Association of Nurse Practitioners (AANP) thanks Congressman Grothman and all of the other Members of Congress who support Dillon’s Law for their leadership on this important bill,” said American Association of Nurse Practitioners President Valerie Fuller, PhD, DNP, AGACNP-BC, FNP-BC, FNAP, FAANP. “Prompt access to epinephrine is essential when someone is experiencing anaphylaxis and Dillon’s Law will play an important role in increasing the number of trained individuals who can administer this life-saving treatment in schools.” 

    Background Information 

    Anaphylaxis is a severe, life-threatening allergic reaction that can occur within minutes of exposure to triggers like insect stings, certain foods, or medications. In the U.S., it causes up to 1,000 deaths and hundreds of thousands of ER visits each year. 

    Dillon’s Law is named after Dillon Mueller, an 18-year-old from Mishicot, Wisconsin, who tragically died from anaphylaxis after a bee sting. Since his passing, Dillon’s parents have championed efforts to expand epinephrine training, leading to the passage of Dillon’s Law in Wisconsin in 2017. The program, certified by the Wisconsin Department of Health, has already helped save lives. 

    This legislation builds on the Public Health Service Act by prioritizing federal grant funding for states that allow trained individuals to administer epinephrine on school grounds. It also requires states to provide civil liability protections to trained responders who act in good faith. 

    By expanding access to lifesaving medication and empowering more individuals to respond in emergencies, Dillon’s Law strengthens community safety and helps prevent avoidable tragedies. 

    This bill is endorsed by the American College of Allergy, Asthma, and Immunology (ACAAI), Food Allergy Research & Education (FARE), Asthma and Allergy Foundation of America (AAFA), American Association of Nurse Practitioners (AANP), and Allergy & Asthma Network. 

    U.S. Rep. Glenn Grothman (R-Glenbeulah) proudly serves the people of Wisconsin’s 6th Congressional District in the U.S. House of Representatives 

    MIL OSI USA News

  • MIL-OSI Asia-Pac: 15 nomination forms for Election Committee Subsector By-elections received today

    Source: Hong Kong Government special administrative region – 4

    The nomination period for the 2025 Election Committee (EC) Subsector By-elections runs from today (July 22) until August 4. A total of 12 nomination forms for candidates and three nomination forms from designated bodies were received by the Returning Officers for various subsectors today.

    If there is a contested election for an EC subsector, a poll will be held on September 7.

    The By-elections will fill a total of 93 vacancies in the membership of the EC to be returned by election involving 28 subsectors. The breakdown of nominations by subsectors received today is set out below: 
     

    First Sector
    Subsector No. of nomination forms for candidates received today
    Catering 0
    Commercial (first) 0
    Commercial (second) 0
    Commercial (third) 0
    Employers’ Federation of Hong Kong 0
    Hotel 1
    Import and export 0
    Industrial (first) 0
    Industrial (second) 0
    Real estate and construction 0
    Small and medium enterprises 0
    Tourism 0
    Transport 0
    Second Sector
    Subsector No. of nomination forms for candidates received today
    Architectural, surveying, planning and landscape 0
    Chinese medicine 0
    Education 0
    Legal 0
    Medical and health services 0
    Sports, performing arts, culture and publication 0
    Technology and innovation 0
    Third Sector
    Subsector No. of nomination forms for candidates received today
    Agriculture and fisheries 0
    Associations of Chinese fellow townsmen 1
    Grassroots associations 1
    Labour 1
    Fourth Sector
    Subsector No. of nomination forms for candidates received today
    Heung Yee Kuk 0
    Representatives of members of Area Committees, District Fight Crime Committees, and District Fire Safety Committees of Hong Kong and Kowloon 0
    Representatives of members of Area Committees, District Fight Crime Committees, and District Fire Safety Committees of the New Territories 0
    Fifth Sector
    Subsector No. of nomination forms for candidates received today
    Representatives of Hong Kong members of relevant national organisations 8
       
    Total: 12

    Besides, 10 vacancies involving five subsectors to be returned by nomination will be filled through supplementary nominations by designated bodies. Today, three nomination forms for the relevant subsectors are received, with breakdown as below: 
     

    Accountancy
    Designated body No. of nomination forms received from designated bodies today
    Association of Hong Kong Accounting Advisors Limited 0
     
    Sports, performing arts, culture and publication
    Designated body No. of nomination forms received from designated bodies today
    Sports Federation & Olympic Committee of Hong Kong, China 0
    Hong Kong Publishing Federation Limited 0
     
    Technology and innovation
    Designated body No. of nomination forms received from designated bodies today
    The Greater Bay Area Association of Academicians 0
     
    Religious
    Designated body No. of nomination forms received from designated bodies today
    Catholic Diocese of Hong Kong 0
    Chinese Muslim Cultural and Fraternal Association 1 (1 nominee in total)
    The Hong Kong Taoist Association 1 (2 nominees in total)
     
    Representatives of associations of Hong Kong residents in the Mainland
    Designated body No. of nomination forms received from designated bodies today
    Hong Kong Chamber of Commerce in China—Guangdong 1 (1 nominee in total)
       
    Total: 3 (4 nominees in total)

    Particulars of the nominated persons received today will be uploaded to the election website (www.elections.gov.hk).

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: 30 secondary students to depart for Mainland to join Young Astronaut Training Camp (with photos)

    Source: Hong Kong Government special administrative region – 4

         A send-off ceremony for the Young Astronaut Training Camp 2025 was held at the Hong Kong Science Museum today (July 22). Thirty selected secondary students will set off for Beijing, Jiuquan, and Xi’an from July 25 to August 2 for a nine-day training programme.
     
         Addressing the send-off ceremony, the Deputy Chief Secretary for Administration, Mr Cheuk Wing-hing, encouraged the Young Astronauts to seize this precious training opportunity to immerse themselves in the country’s remarkable aerospace endeavours, look up to aerospace heroes as their role model, and become a valuable new force in promoting the nation’s space development.
     
         Other officiating guests included the First-level Inspector of the Department of Educational, Scientific and Technological Affairs of the Liaison Office of the Central People’s Government in the Hong Kong Special Administrative Region, Mr Liu Maozhou; the Chairman of the Chinese General Chamber of Commerce, Dr Jonathan Choi; the Convenor of the Working Group on Patriotic Education under the Constitution and Basic Law Promotion Steering Committee, Legislative Council Member, Dr Starry Lee; the Permanent Secretary for Culture, Sports and Tourism, Ms Vivian Sum; the Director of Leisure and Cultural Services, Ms Manda Chan; the President of the Beijing-Hong Kong Academic Exchange Centre, Mr Hsu Hoi-shan; the Vice-Chairman of the Chinese General Chamber of Commerce, Ms Jennifer Yeung; and the Museum Director of the Hong Kong Science Museum, Mr Patrick Lau.
     
         Launched in 2009, the Young Astronaut Training Camp has entered its 14th edition, with a total of 400 students participating over the years. The recruitment of this year’s training camp started in May and received an overwhelming response. After three rounds of the selection process, which included a quiz on astronomy and space science, a three-day training camp and an interview, 30 students from Secondary Two to Secondary Six were selected as Young Astronauts out of around 120 applicants from more than 80 secondary schools.
     
         The students participating in the nine-day training camp will visit various key astronomy and aerospace facilities, including Beijing Aerospace City and the Jiuquan Satellite Launch Center. This year’s programme also marks the first visit to the Wuqing Station of the National Astronomical Observatories, where they will learn about data reception and deep space communication systems of the Tianwen-1 Mars exploration mission. At the China Astronaut Research and Training Center, they will experience the aerospace medicine project and astronaut training activities, including the donning and doffing of spacesuits and savouring space food.
     
         The training camp is jointly presented by the Leisure and Cultural Services Department and the Chinese General Chamber of Commerce, in association with the Beijing-Hong Kong Academic Exchange Centre. It is organised by the Hong Kong Space Museum and sponsored by the Chinese General Chamber of Commerce. For details of the training camp, please visit the website of the Hong Kong Space Museum at hk.space.museum/en/web/spm/activities/yatc.html.
     
         The training camp is one of the programmes under the Chinese Culture Promotion Series. For more information, please visit www.ccpo.gov.hk.

    MIL OSI Asia Pacific News

  • MIL-OSI: Buffalo Run Casino & Resort Selects QCI Go to Empower Hosts and Enhance Guest Engagement

    Source: GlobeNewswire (MIL-OSI)

    SAN DIEGO, July 22, 2025 (GLOBE NEWSWIRE) — Buffalo Run Casino & Resort has chosen Quick Custom Intelligence’s (QCI) Go, a native mobile app designed specifically for casino hosts, to elevate host productivity and deliver a superior guest experience.

    QCI Go provides hosts with powerful tools including player card scanning, real-time player lookup, seamless access to QCI Meet and QCI Events, and robust task management features—all in a user-friendly mobile interface. By putting these capabilities directly in the hands of hosts, QCI Go enables faster service, deeper guest relationships, and greater operational efficiency on the casino floor.

    Mary Jewett, Vice President and General Marketing at Buffalo Run Casino & Resort, expressed excitement about the implementation:
    “Bringing QCI Go to Buffalo Run Casino & Resort represents a significant advancement in how we empower our hosts to serve guests. With mobile access to key player information, events, and task management, our team can deliver personalized service in real time, enhancing both the guest experience and host effectiveness.”

    Dr. Ralph Thomas, CEO of QCI, shared his perspective on the partnership:
    “We are thrilled to deploy QCI Go at Buffalo Run Casino & Resort. By providing hosts with mobile access to the QCI platform, we enable them to deliver exceptional, timely service and foster stronger player relationships. This is a great example of how our mobile-first innovations help operators improve team productivity and guest satisfaction.”

    QCI Go is part of Quick Custom Intelligence’s broader commitment to innovation in the gaming industry, providing operators with state-of-the-art tools that support host teams, streamline operations, and drive meaningful guest engagement.

    ABOUT Buffalo Run Casino & Resort
    Owned and operated by the Peoria Tribe of Indians of Oklahoma, Buffalo Run Casino & Resort is future-focused on a gaming entertainment experience that both excites and exceeds guest expectations. Maintaining its reputation for a clean and friendly environment, it empowers team members and continues to elevate hospitality and guest experiences by investing in team member training and career development programs. Consequently, this strategic reinvestment into team members and property has resulted in earning the vote for one of the Best and Brightest Companies in the Nation to work for in 2022.

    Buffalo Run Casino & Resort has over 70,000 square feet of casino floor and features the area’s widest variety of slots and tables games. The resort also includes a non-smoking Hotel, Truckers Lounge with special amenities and offers, the Peoria Showplace in-door event center, the outdoor amphitheater, complimentary entertainment in the Backwoods Bar, an 18-hole championship golf course, two indoor Top Golf® bays, and a smoke-free high-end Player’s Lounge. Additionally, the Buffalo Run Casino & Resort offers three dining experiences including Coal Creek Restaurant with high-end cuisine, the Bistro with hand-tossed brick oven pizza, and the Backwoods Bar & Grill which claims the title for best in-house smoked barbecue in the area.

    Ongoing advancements to the property include the Peoria Showplace remodel, Hotel updates and restaurant remodel with more to come. New technology has been implemented to streamline offer redemption for guests that include self-serve kiosks for dining and promotions, digital core mail pieces, and a mobile app for monthly promotional information. Updates on the casino floor include in-game bonuses and upgraded slots. Innovation and strategic marketing decisions are powered by data driven technology (QCI), empowering the casino to customize the guest experience and increase loyalty in a highly competitive market.

    ABOUT QCI
    Quick Custom Intelligence (QCI) has pioneered the revolutionary QCI Enterprise Platform, an artificial intelligence platform that seamlessly integrates player development, marketing, and gaming operations with powerful, real-time tools designed specifically for the gaming and hospitality industries. Our advanced, highly configurable software is deployed in over 250 casino resorts across North America, Australia, New Zealand, Canada, Latin America, and Europe. The QCI AGI Platform, which manages more than $35 billion in annual gross gaming revenue, stands as a best-in-class solution, whether on-premises, hybrid, or cloud-based, enabling fully coordinated activities across all aspects of gaming or hospitality operations. QCI’s data-driven, AI-powered software propels swift, informed decision-making vital in the ever-changing casino industry, assisting casinos in optimizing resources and profits, crafting effective marketing campaigns, and enhancing customer loyalty. QCI was co-founded by Dr. Ralph Thomas and Mr. Andrew Cardno and is based in San Diego, with additional offices in Las Vegas, St. Louis, Dallas, and Tulsa. Main phone number: (858) 299.5715. Visit us at www.quickcustomintelligence.com.

    ABOUT Dr. Ralph Thomas
    Dr. Ralph Thomas is the Co-Founder and Chief Executive Officer of Quick Custom Intelligence. Ralph is a product visionary in applied analytics and the founder of two companies that deliver solutions in casino gaming, education, and adult learning. As a gaming industry veteran, Dr. Thomas has substantial experience implementing analytics into single and multi-property gaming companies to drive tangible and measurable gains to the bottom line and has built business intelligence tools for multibillion-dollar casinos. Dr. Thomas is co-author of seven books and over 80 articles on applied analytics and data science in gaming, an inventor on dozens of patents, and understands gaming from raw data up through casino operations, giving him a unique, 360-degree view of the industry.

    The MIL Network

  • MIL-OSI: OZ Studio, a Global Firm with Texas Roots, Showcases Ethical AI Governance Model at the United Nations

    Source: GlobeNewswire (MIL-OSI)

    VIENNA, AUSTRIA , July 22, 2025 (GLOBE NEWSWIRE) — OZ Studio, a global technology firm with offices in Austin, Texas; Geneva, Switzerland; and Monterrey, Mexico, presented a groundbreaking model for municipal governance and ethical artificial intelligence at the United Nations headquarters in Vienna. The presentation marks a significant milestone for the company, which, after 22 years of serving multinational corporations, has pivoted its focus since 2020 toward empowering governments, entrepreneurs, and small businesses with integrated digital platforms.

    Osuna attends sessions at the UN Office on Drugs and Crime that focus on data security and sovereignty.

    The firm, represented by its CEO Daniel Osuna, who also serves on the UN’s AI Council ethics committee, detailed its successful public-private partnerships in the municipalities of Escobedo and Santiago, Mexico. These collaborations showcase a new standard for applying AI ethically at the local government level, a core mission of OZ Studio’s government services division.

    For over two decades, OZ Studio built a reputation for providing high-level services to large multinational companies. However, recognizing a critical gap in the market, the company strategically shifted its focus in 2020. The new mission: to channel its extensive expertise into creating comprehensive digital ecosystems for those who form the backbone of local economies—small and medium-sized enterprises (SMEs) and the public institutions that serve them.

    This new direction is embodied by two of its flagship platforms: LINK360 and the OZZY AI system. LINK360 is a digital empowerment platform that provides local businesses with e-commerce tools and AI-powered marketing, ensuring economic value and data sovereignty remain within the community. OZZY AI is an open-source framework trained for municipal processes, designed with ethical principles like transparency, algorithmic fairness, and cultural adaptation at its core.

    The results of this approach are transformative. Under the leadership of Mayor Andrés Mijes, the city of Escobedo has become a 100% digitized municipality, a remarkable achievement that has streamlined public services and eliminated bureaucratic red tape. In Santiago, Mayor David de la Peña is leveraging the LINK360 program to foster a vibrant local entrepreneurial scene.

    The international community has taken notice. Following the conclusion of the UN activities on Monday, July 22, OZ Studio (https://www.oz.studio) has entered into strategic alliances to explore pilot programs with several nations, including: Spain, Egypt, Georgia, Austria, and Australia. This global interest validates OZ Studio’s model as a scalable solution for governments worldwide seeking to innovate responsibly.

    From its strategic locations in Austin, Geneva, and Monterrey, OZ Studio is now positioned to lead the charge in ethical AI for public service. The company’s evolution from a corporate service provider to a champion for local development demonstrates a powerful vision: leveraging top-tier technology to build self-sustaining, equitable, and prosperous communities from the ground up.

    Presenting the OZZI AI framework and the Public Private Partnership for ethical AI

    About OZ Studio

    At OZ Studio, we are your premier destination for transformative digital solutions, anchored in over two decades of innovation and expertise. We are proud to say that we’ve evolved from pioneering basic email marketing to mastering complex digital strategies and immersive creative experiences. Our comprehensive suite of services spans from state-of-the-art website development to advanced SEO strategies, engaging interactive videos, and cutting-edge AI tools. As true digital architects, we empower our clients by merging top-tier technology with unmatched creative prowess, ensuring every digital interaction is compelling and results-oriented. We revolutionized the traditional digital service model through our productized Creative-as-a-Service (CaaS), which guarantees transparency, efficiency, and scalability. Our subscription-based approach simplifies access to a holistic digital strategy, incorporating a full spectrum of expertly managed creative and technical services. Partner with us at OZ Studio, and let us help elevate your brand to new heights, optimizing every touchpoint in your digital journey for growth and transformation. 

    Press inquiries

    OZ Studio
    https://oz.studio
    Daniel Osuna
    oz@oz.studio
    +12123811969
    5900 Balcones Drive
    Austin, TX 78731

    The MIL Network

  • MIL-OSI Africa: Ambassador Yin Chengwu attended Liberia Technology Summit 2025

    Source: APO


    .

    On July 21, Ambassador Yin Chengwu attended the Liberia Technology Summit 2025 and delivered a speech. The event was also attended by Hon. Haja Mamaka Bility, Acting Minister of States, Hon. Augustine K. Ngafuan, Minister of Finance and Development Planning, Hon. Sekou M. Kromah, Minister of Post and Telecommunications. Representatives from relevant UN agencies and diplomatic missions in Liberia.

    Yin highlighted the outcomes of the Ministerial Meeting of Coordinators on the Implementation of the Follow-up Actions of the Forum on China-Africa Cooperation and China’s achievements in science and technology. He pointed out that China will establish a global scientific research fund and increase science and technology assistance to developing countries, making technological progress benefits all humanity. He expressed China is willing to strengthen scientific and technological innovation cooperation with Liberia, so as to make it a new engine of China-Liberia strategic partnership.

    Distributed by APO Group on behalf of Embassy of the People’s Republic of China in the Republic of Liberia.

    MIL OSI Africa

  • MIL-OSI Africa: African Development Bank’s Sustainable Energy Fund for Africa (SEFA) supports electric cooking expansion across three African nations

    Source: APO

    The Sustainable Energy Fund for Africa (SEFA), managed by the African Development Bank (AfDB) (www.AfDB.org), is tackling charcoal dependence in Kenya, Uganda, and Zambia with a $4 million reimbursable grant. This grant will fund the Burn Electric Cooking Expansion Program (BEEP), deploying 115,000 Burn ECOA Electric Induction Cookers to provide clean cooking solutions for low-income, grid-connected households currently relying on charcoal.

    Burn, a Kenya-based clean cookstove company and carbon developer with operations in over 10 African countries, will implement BEEP. This program makes clean cooking appliances more affordable and accessible by prefinancing induction cookers and recovering costs through carbon credit sales in the voluntary market. This innovative model combines carbon-backed subsidies with pay-as-you-go payment plans, significantly lowering upfront costs for end-users.

    Capitalised through a Special Purpose Vehicle (SPV), the Program is funded by a $5 million senior loan from the Spark+ Africa Fund, a $4 million reimbursable grant from SEFA, and $1 million in equity from Burn Manufacturing Company. This SPV will partner with Burn to manage sales, distribution, and servicing of the cookers. The appliances will generate carbon credits, owned by the SPV, with revenues shared among investors.

    Dr. Daniel Schroth, Director for Renewable Energy and Energy Efficiency at the African Development Bank Group, stated, “This marks the Bank’s first carbon finance transaction of its kind, with SEFA playing a critical role in mitigating carbon market risks and enhancing the Program’s financial sustainability.”

    The program aligns with SEFA’s thematic area on Energy Efficiency, catalysing private sector investments in efficient appliances and promoting scale-up of clean cooking technologies. It also supports the Mission 300 Initiative and the Bank’s New Deal on Energy for Africa, which aim to deliver universal energy access through low-carbon solutions.

    “We are honoured to receive this catalytic investment from the African Development Bank’s Sustainable Energy Fund for Africa—their first-ever investment in carbon projects focused on electric cooking. This milestone enables BURN to rapidly scale our IoT-enabled induction stove across Kenya, Uganda, and Zambia, providing low-income households with a zero-emission, digitally monitored alternative to charcoal and wood,” said Peter Scott, Founder and CEO, BURN. “By integrating cutting-edge technology, carbon financing, and mobile-enabled Pay-As-You-Cook models, we are demonstrating that electric cooking can be clean, affordable, and scalable across the continent.” 

    In addition to environmental and health benefits, the program will stimulate job creation and fortify local supply chains within the three target countries, paving the way for a cleaner, more prosperous future for communities across Kenya, Uganda, and Zambia.

    Distributed by APO Group on behalf of African Development Bank Group (AfDB).

    Media contact: 
    Alexis Adélé
    Communications and External Relations Department
    media@afdb.org

    ABOUT SEFA:
    SEFA is a multi-donor Special Fund that provides catalytic finance to unlock private sector investments in renewable energy and energy efficiency. SEFA offers technical assistance and concessional finance instruments to remove market barriers, build a more robust pipeline of projects and improve the risk-return profile of individual investments. The Fund’s overarching goal is to contribute to universal access to affordable, reliable, sustainable, and modern energy services for all in Africa, in line with the New Deal on Energy for Africa and the M300.

    About the African Development Bank Group:
    The African Development Bank Group is Africa’s leading development finance institution. It comprises three distinct entities: the African Development Bank (AfDB), the African Development Fund (ADF) and the Nigeria Trust Fund (NTF). Represented in 41 African countries, with an external office in Japan, the Bank contributes to the economic development and social progress of its 54 regional member countries. For more information: www.AfDB.org

    Media files

    .

    MIL OSI Africa

  • MIL-OSI: Aspida Re Expands Global Footprint with Strategic Reinsurance Transaction in Japan

    Source: GlobeNewswire (MIL-OSI)

    DURHAM, N.C., July 22, 2025 (GLOBE NEWSWIRE) — Aspida Life Re Ltd (“Aspida Re”), a Bermuda-based life and annuity reinsurance company, announced the execution of its second reinsurance transaction in Japan, effective June 1, 2025. This milestone marks a significant step in Aspida Re’s ongoing strategy to expand its global footprint and deliver innovative reinsurance solutions to life and annuity insurance partners worldwide.

    The transaction was completed with a highly rated Japanese life insurance carrier (“Company”). Aspida Re, rated A- (Excellent) by AM Best, will reinsure new or incoming flow business. The reinsured product is a Japanese yen (JPY) denominated fixed annuity, highlighting Aspida Re’s ability to manage foreign exchange risk and deliver tailored solutions to its cedents.

    “This transaction is highly strategic for Aspida Re,” said David Florian, CEO of Aspida Re. “It reflects our deep commitment to the Japanese market and our broader vision of supporting insurers around the world with innovative, capital-efficient reinsurance solutions.”

    Aspida Re’s continued growth in Asian markets demonstrates its agility and expertise in navigating complex regulatory and financial environments, while reinforcing its role as a trusted partner in the global reinsurance landscape.

    “We are excited to secure our second Japanese reinsurance agreement,” said Jon Steffen, President and Chief Actuary of Aspida Re. “Our flexibility and customized solutions allow us to provide significant advantage to clients and partners, no matter their location.”

    To learn more about Aspida Re, visit aspidare.bm.

    About Aspida Re

    Aspida Life Re Ltd (“Aspida Re”), a Bermuda-based reinsurance platform, is focused on providing efficient and secure life and annuity reinsurance solutions to its global clients. Aspida Re seeks to be a trusted partner in its clients’ long-term financial growth by delivering creative, customized solutions while driving business by doing good for the communities it serves. Aspida Re is part of Aspida Holdings Ltd, with over $23.1bn in total assets as of March 31, 2025. A subsidiary of Ares Management Corporation (NYSE: ARES) acts as the dedicated investment manager, capital solutions, and corporate development partner to Aspida Re. For more information on Aspida Re, please visit www.aspidare.bm or follow them on LinkedIn.

    Krystle Cajas, PR Contact
    krystle.cajas@modop.com

    The MIL Network

  • MIL-OSI: Aspida Re Expands Global Footprint with Strategic Reinsurance Transaction in Japan

    Source: GlobeNewswire (MIL-OSI)

    DURHAM, N.C., July 22, 2025 (GLOBE NEWSWIRE) — Aspida Life Re Ltd (“Aspida Re”), a Bermuda-based life and annuity reinsurance company, announced the execution of its second reinsurance transaction in Japan, effective June 1, 2025. This milestone marks a significant step in Aspida Re’s ongoing strategy to expand its global footprint and deliver innovative reinsurance solutions to life and annuity insurance partners worldwide.

    The transaction was completed with a highly rated Japanese life insurance carrier (“Company”). Aspida Re, rated A- (Excellent) by AM Best, will reinsure new or incoming flow business. The reinsured product is a Japanese yen (JPY) denominated fixed annuity, highlighting Aspida Re’s ability to manage foreign exchange risk and deliver tailored solutions to its cedents.

    “This transaction is highly strategic for Aspida Re,” said David Florian, CEO of Aspida Re. “It reflects our deep commitment to the Japanese market and our broader vision of supporting insurers around the world with innovative, capital-efficient reinsurance solutions.”

    Aspida Re’s continued growth in Asian markets demonstrates its agility and expertise in navigating complex regulatory and financial environments, while reinforcing its role as a trusted partner in the global reinsurance landscape.

    “We are excited to secure our second Japanese reinsurance agreement,” said Jon Steffen, President and Chief Actuary of Aspida Re. “Our flexibility and customized solutions allow us to provide significant advantage to clients and partners, no matter their location.”

    To learn more about Aspida Re, visit aspidare.bm.

    About Aspida Re

    Aspida Life Re Ltd (“Aspida Re”), a Bermuda-based reinsurance platform, is focused on providing efficient and secure life and annuity reinsurance solutions to its global clients. Aspida Re seeks to be a trusted partner in its clients’ long-term financial growth by delivering creative, customized solutions while driving business by doing good for the communities it serves. Aspida Re is part of Aspida Holdings Ltd, with over $23.1bn in total assets as of March 31, 2025. A subsidiary of Ares Management Corporation (NYSE: ARES) acts as the dedicated investment manager, capital solutions, and corporate development partner to Aspida Re. For more information on Aspida Re, please visit www.aspidare.bm or follow them on LinkedIn.

    Krystle Cajas, PR Contact
    krystle.cajas@modop.com

    The MIL Network

  • MIL-OSI: DebitMyData™ Closes Oversubscribed Seed Round- Launches $1B Human Energy Grid Global Expansion

    Source: GlobeNewswire (MIL-OSI)

    DebitMyData™ Logo

    FORT LAUDERDALE, Fla., July 22, 2025 (GLOBE NEWSWIRE) — DebitMyData™, Inc.—the powerhouse has closed a seed round at more than twice its original target. This surge of investor confidence paves the way for a bold, billion-dollar global rollout of DebitMyData™’s Human Energy Grid, setting a new standard for individual data ownership, ethical monetization, and human-centric AI innovation.

    Preparing to launch a U.S and global expansion round, DebitMyData™ is already attracting top-tier venture capitalists—some of whom previously backed OpenAI alumni Ilya Sutskever and Mira Murati. Their attention is now focused on founder Preska Thomas and her breakthrough vision for a decentralized, human-led future in Adtech, AI, cybersecurity, and digital sovereignty.

    “We’re advancing AI frameworks including Fuzzy Logic, ML, NLP, and robotic networks—but the Human Energy Grid ensures we embed ethics, skills, and human vision at the algorithmic core,” said Preska Thomas, Founder & CEO.

    Agentic Logos, Nodes, and Verified Digital Identity

    Integral to DebitMyData™ ‘s technology are Agentic Logos—cryptographically validated identity tools that combat fraud, impersonation, and deepfakes.

    Core LLM Features:

    • Verified Ownership: Every identity is cryptographically bound to an authentic user or brand.
    • Real-Time Security: Proprietary consensus mechanisms eliminate spoofing and fakes.
    • Plug-and-Play APIs: Enterprises and large language models (LLMs) can easily verify and interface with Agentic Nodes.

    By embedding identity-driven trust into content and advertising, DebitMyData™ transforms audience engagement. Brands and individuals alike benefit from frictionless, permission-based experiences that foster credibility and prevent misuse.

    The Human Energy Grid: An Ethics-Powered Digital Ecosystem

    DebitMyData™’s signature innovation—the Human Energy Grid—places people at the center of the digital economy.

    Key Components:

    • Digital Ownership: Users control and protect their digital footprints via DID-LLM (Digital Identity LLM).
    • Agentic Avatars: AI agents trained and owned by users, supporting monetization through sponsorships, licensing, and personal branding.
    • Ethical AI Training: Decentralized Agentic Avatars contribute to safe, human-aligned AI development.
    • NFT-Backed Security: Blockchain-protected digital creations ensure transparent royalties and rights.
    • Quantum-Resistant Privacy: Federated learning and next-generation encryption secure all interactions.

    This ecosystem empowers individuals to earn from their data and digital identity, marking a shift from extractive models toward equitable participation in the digital economy.

    Global Expansion and Ecosystem Integration

    Building on its momentum, DebitMyData™ is launching a global initiative to:

    • Open subsidiaries in the EU, Asia, and the Middle East
    • Advance Agentic Avatar technology for LLMs, APIs, and user-controlled AI
    • Partner with NFT platforms and creator-centric brands like AnimeGamer, MemeShorts (“The TikTok of America”), and Monetize YourSelfie

    The roadmap includes further integration across decentralized marketplaces for data, content, and avatar-based economies.

    Institutional & Government Alignment

    DebitMyData™ is engaged in advanced discussions with regulatory bodies, family offices, and public sector partners worldwide, reinforcing its commitment to compliance, transparency, and leadership in large-scale data solutions.

    Image by DebitMyData™

    About DebitMyData™, Inc.

    DebitMyData™, Inc. enables users to reclaim, verify, and monetize their digital identities through Agentic Logos and Agentic Avatars. Its scalable platform ensures GDPR compliance and AI alignment via the Human Energy Grid and DID-LLM, meeting evolving demands in ethical AI, cybersecurity, and digital equity.

    “This is our moment—not just to advance AI but to protect what makes us human. The Human Energy Grid ensures humanity stays present, empowered, and valued in the algorithms that shape the future,” said Preska Thomas, Founder & CEO.

    For more information, visit:

    Media Contact:
    Henry Cision
    (754) 315-2420
    communications@debitmydata.com
    https://debitmydata.com/

    Photos accompanying this announcement are available at
    https://www.globenewswire.com/NewsRoom/AttachmentNg/95c96c26-19e8-422a-b695-f624bef63d48

    https://www.globenewswire.com/NewsRoom/AttachmentNg/16c08f37-b662-4707-973b-06f8df03d725

    A video accompanying this announcement is available at
    https://www.globenewswire.com/NewsRoom/AttachmentNg/21a44de1-99d5-4625-a80a-80e766eb06d5

    The MIL Network

  • MIL-OSI Analysis: As Sri Lanka’s economy pivots from tourism, it’s well placed to benefit from global trade and geopolitical jostling – new research

    Source: The Conversation – UK – By Hemamali Tennakoon, Senior Lecturer in Strategy and Management, Brunel University of London

    Dmytro Buianskyi/Shutterstock

    With its natural beauty, wildlife and culture, Sri Lanka is known as the “pearl of the Indian Ocean”, and attracts millions of tourists every year.

    But my research suggests that the country might not be so reliant on tourism in the future, as it looks to become a major player in global maritime trade. The island’s numerous harbours and enviable location along international sea routes have led to major investment from China and the US, as they seek to extend their strategic influence in the region.

    That investment is being welcomed after years of economic and political turmoil in Sri Lanka.

    The Easter bombings of 2019 targeted Catholic churches and hotels, killing 269 people and devastating tourism. The same year, significant tax cuts slashed government revenue before COVID did serious damage to the economy.

    In 2021, a ban on chemical fertilisers led to nationwide agricultural failure, while excessive borrowing and money printing triggered soaring inflation, which peaked at 70% in August 2022. The country ended up failing to pay its foreign debts.

    Following huge protests in 2022 and the resignation of the president, Sri Lanka began a major political and economic shift. It secured a bailout from the International Monetary Fund and implemented reforms aimed at stabilising the economy.

    So far, some of the effects have been positive. Inflation has eased, investor confidence has improved and more tea, clothing and rubber products are being exported up.

    Key to this has been improved logistics and port infrastructure. Business at the port of Colombo, the country’s largest, is booming, aided in part by global shipping disruptions, including the Red Sea crisis, which rerouted vessels through the Indian Ocean.

    But international maritime ambitions can be a complex affair, and Sri Lanka needs to be wary of becoming just a well-positioned commodity for the world’s economic superpowers.

    China for example, has secured a controversial 99-year lease of Hambantota port. India, wary of Chinese encroachment, has ramped up its own investments, including the development of a container terminal in Colombo.

    In 2023, the US announced a US$500 million (£372 million) plan to develop a deep-water shipping container terminal at the port of Colombo. And the potential US tariffs of 30% on imports from Sri Lanka have been interpreted by some as a pressure tactic to get greater access to its waters.

    Balancing these interests is a delicate act. While foreign investment is crucial for infrastructure development, Sri Lanka needs to protect its sovereignty and ensure that port operations serve national, not just international, interests.

    My research suggests that one way of building a resilient and diverse Sri Lankan economy would be to focus on its surrounding waters. Sri Lanka’s vast “exclusive economic zone”, an area of sea where it controls marine resources, holds massive untapped potential.

    Blue economy

    This potential lies in traditional sectors like fisheries and tourism, but also emerging industries such as marine biotechnology.

    This growing field offers opportunities in things like bioengineering and marine-based pharmaceuticals. With other countries rapidly advancing in these sectors, Sri Lanka is well-positioned to follow suit and become a regional leader in the blue economy (economic activities associated with the sustainable use of ocean resources).

    Business is booming in the port of Colombo.
    shutterlk/Shutterstock

    But there is still a complex web of geopolitical interests and economic pressures to navigate, as well as environmental challenges.

    At the moment for example, the Sri Lankan government is making plans for the deep natural port at Trincomalee to become a major marine repair and refuelling centre between Dubai and Singapore. Other proposed projects include offshore wind farms and oil rig facilities.

    The country also needs to compete with the likes of Malaysia, which is investing heavily in AI-driven port operations. To stay competitive, Sri Lanka must modernise infrastructure and streamline processes.

    And despite the progress, challenges persist. Poverty in Sri Lanka has doubled since 2021, while youth unemployment remains high.

    Sri Lanka faces rising maritime threats like piracy and illegal fishing, requiring stronger maritime surveillance. Simultaneously, port expansion risks damaging marine ecosystems. Green technologies and stricter environmental regulations are essential for long-term security and sustainability.

    Sri Lanka’s strategic location and maritime heritage offer a foundation for economic renewal. With wise governance, sustainability, and balanced geopolitics, its ports could once again become vital gateways to regional prosperity and global trade.

    Hemamali Tennakoon does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. As Sri Lanka’s economy pivots from tourism, it’s well placed to benefit from global trade and geopolitical jostling – new research – https://theconversation.com/as-sri-lankas-economy-pivots-from-tourism-its-well-placed-to-benefit-from-global-trade-and-geopolitical-jostling-new-research-261231

    MIL OSI Analysis

  • MIL-OSI Banking: Microsoft Sentinel data lake: Unify signals, cut costs, and power agentic AI

    Source: Microsoft

    Headline: Microsoft Sentinel data lake: Unify signals, cut costs, and power agentic AI

    You can’t protect what you can’t see. Security operations teams have long been faced with the challenge of managing massive, fast-growing datasets, and the cost of scaling traditional data management tools to handle these data volumes has become unsustainable. We’re evolving our industry-leading Security Incidents and Event Management solution (SIEM), Microsoft Sentinel, to include a modern, cost-effective data lake. By unifying all your security data, Microsoft Sentinel data lake, now in public preview, accelerates agentic AI adoption and drives unparalleled visibility, empowering teams to detect and respond faster. With Sentinel data lake, you’re no longer forced to choose between retaining critical data and staying within budget.

    Learn more about Microsoft Sentinel

    Microsoft Sentinel started on this journey five years ago with the introduction of the first cloud-native SIEM to simplify data onboarding and bring the power of AI to threat detection.¹ Since then, we’ve integrated Sentinel with Microsoft Defender and enriched it with real-time threat intelligence, guided recommendations, and automated response capabilities. Microsoft Sentinel data lake is the next step in that journey—built to help security leaders break through the limitations of traditional SIEMs by putting security data at the center of the security operations center (SOC), at scale, and without compromise. Now, you can continue your own journey and onboard Microsoft Sentinel data lake.

    Breaking down data silos for better security

    WHAT is SIEM?

    Learn more

    With security log volumes growing fast, teams are forced into making painful tradeoffs: reduce logging by risking blind spots, shorten retention by compromising forensic depth, or absorb unsustainable costs when aiming to manage all their security data within a SIEM. This is the paradox of modern security: the more data you have, the harder it becomes to use it effectively. And without unified, long-term visibility, even the most advanced AI models can’t deliver to their full potential. Siloed data means missed cyberthreats, delayed investigations, and underutilized tools.

    Microsoft Sentinel data lake was purpose-built to solve this challenge and provides the foundation for agentic defense. It brings together all your security data, from Microsoft and third-party sources, into a single, cost-effective data lake, with more than 350 native connectors. With data retention priced at less than 15% of traditional analytics logs, it enables seamless enrichment with threat intelligence and AI-powered detection across your entire environment. This isn’t just a new product, it’s a new architecture for security operations—one that empowers security teams to hunt cyberthreats across months or years, reconstruct incidents with precision, and unlock the full value of AI.

    Microsoft’s vision for Sentinel data lake reflects what matters most in cybersecurity: clarity, scale, and real-world impact. With more than 1,200 Sentinel deployments worldwide, BlueVoyant has seen the need firsthand. Large scale data challenges are now the norm. Sentinel data lake marks a natural evolution of the SIEM and SOAR model, one that critically supports modern analytics, data science, and flexible ingestion strategy. It is a critical step forward for customers looking to modernize their security operations.

    —Milan Patel, Chief Revenue Officer at BlueVoyant

    To further help defenders get the most out of their data, we’re democratizing threat intelligence by converging Microsoft Defender Threat Intelligence (MDTI) capabilities into Defender XDR and Sentinel at no additional cost; this means that security teams will no longer need to buy a separate SKU to access these powerful features. MDTI value will be merged in Sentinel and Defender XDR over time, starting in October 2025 when all Microsoft first-party threat reports, including intel profiles and indicators of compromise (IoCs), will be available in Defender XDR. Additionally, IoCs will be incorporated into Sentinel case management so customers can collaborate and share threat intelligence across teams within their organization. The remaining features will become available over time.

    With this change, security teams can easily tap into a powerful repository of frontline threat intelligence, sourced from 84 trillion daily signals and backed by the expertise of more than 10,000 Microsoft security specialists. Read more about how this added value in Sentinel and Defender will greatly enhance capabilities with real-time, high-quality threat data.

    Empowering security teams to do more

    The promise of AI in cybersecurity has always been bold: faster detection, smarter response, and the ability to outpace even the most sophisticated cyberattackers. But most security teams are held back by fragmented data and incomplete context. Centralizing your data in a threat intel-enriched data lake eliminates silos and ensures AI models like Security Copilot have the full context they need to detect subtle cyberattack patterns, correlate signals across time and space, and surface high-fidelity alerts. This creates the foundation for the future of agentic defense where AI doesn’t just assist, it acts. This shift now empowers security teams to:

    What are indicators of compromise?

    Learn more

    • Uncover cyberattacker behavior going back years without worrying as much about storage limits
    • Address pre-breach and post-breach use cases by correlating asset, activity, and TI data
    • Utilize real-time threat intel to triage faster and retroactively hunt over historical data
    • Trigger detections automatically based on the latest IoCs and tactics, techniques, and procedures (TTPs)
    • Use Kusto Query Language (KQL) and Apache Spark to query across extended time horizons and detect subtle cyberattack patterns
    • Support regulatory and compliance needs with scalable, cost-efficient data retention

    These are the jobs that matter most in modern security operations and now they’re easier, faster, and more cost-effective to execute.

    For cyber teams, the massive proliferation of data can misdirect focus or delay responses to genuine [cyber]threats. Microsoft Sentinel data lake can be a valuable tool for data centralization and visibility and for historical analysis across large volumes of datasets. Together with Microsoft, Accenture can help our clients leverage the data lake to extend the power of Microsoft Sentinel to supercharge attack detection and proactive remediation.

    Rex Thexton, Chief Technology Officer, Accenture Security

    Simplifying operations while being AI-ready

    Microsoft Sentinel data lake simplifies data management with a flexible, centralized experience in the Microsoft Defender portal—bringing your security data together alongside the tools your defenders use to prevent, detect, and respond to cyberthreats every day. Analysts can move seamlessly between the analytics and data lake tiers, enabling real-time response and deep investigation from a single interface. While doing that all your data stored in the analytics tier is automatically available in the data lake tier, and because it’s built on open formats, organizations can tailor analytics workflows, build custom machine learning (ML) models, and leverage familiar tools, over a single copy of their security data, to extend the value of the data lake to meet their unique needs. Whether you’re consolidating tools, scaling your SOC, or preparing for AI-powered defense, Sentinel data lake adapts to your security strategy and journey.

    Sentinel data lake enables SOC teams into the next era of security operations. Being able to ensure coverage of your security estate—across all security data sources and vast time horizons—enables security teams to proactively detect latent cyberattacks, detect emerging cyberthreats with AI-powered models, reconstruct cyberattack timelines in forensic detail, and retroactively uncover indicators of compromise that might otherwise go unnoticed.

    The [cyber]attack surface is expanding with every application and AI application deployed across hybrid cloud environments, and AI-powered attacks are evolving just as fast. What many organizations still lack isn’t just better tools—it’s ​real-time visibility of their IT estate, their configurations and business context. To understand their full exposure, organizations need the right asset intelligence and a shared industry effort. The new Microsoft Sentinel data lake represents a valuable step in that direction; IBM is committed to working across the ecosystem to help solve that challenge.

    —Srini Tummalapenta, IBM Distinguished Engineer, Chief Technology Officer for IBM Consulting Cybersecurity Services

    What is extended detection and response?

    Learn more

    This launch marks more than a product evolution enabling security operations teams to respond faster and with maximum visibility. Microsoft Sentinel is continuing to push the boundaries with a scalable architecture that combines SIEM, extended detection and response (XDR), and threat intelligence into a single, integrated experience. Sentinel data lake is the foundation of this evolution, enabling security teams to reason over more data, more intelligently, and more affordably than ever before.

    Get started today

    Microsoft Sentinel data lake is now in preview. Join us as we redefine what’s possible in security operations:

    To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (Microsoft Security) and X (@MSFTSecurity) for the latest news and updates on cybersecurity.


    ¹Announcing new cloud-based technology to empower cyber defenders, Official Microsoft Blog. Ann Johnson. Feb 28, 2019.

    MIL OSI Global Banks

  • MIL-OSI: BitMart Launches Crypto Loans: Unlock Liquidity and Earn While You Borrow

    Source: GlobeNewswire (MIL-OSI)

    Mahe, Seychelles, July 22, 2025 (GLOBE NEWSWIRE) —

    BitMart, a leading global cryptocurrency exchange, announced the launch of BitMart Crypto Loans service, the lending product that allows users to stake their digital assets as collateral, borrow instantly, and continue earning interest — all without selling their holdings.

    As the digital asset market evolves rapidly, users are increasingly seeking flexible and efficient ways to manage their assets. In the current market environment, liquidity has become a major challenge for crypto asset holders. Traditional solutions often require selling assets to unlock funds — but this also means giving up the potential for future appreciation, particularly for long-term holders of major assets like BTC, ETH, or the platform token BMX. For these users, selling their holdings could mean missing out on future opportunities. Therefore, the market urgently needs a solution that provides liquidity without liquidating assets.

    Key Highlights of BitMart Crypto Loans

    • Flexible Loans Without Selling Assets — Users can pledge their digital assets as collateral to borrow loans without having to sell. This is especially attractive to long-term holders.
    • Earn Interest on Collateralized Assets — Users can continue earning yields on your pledged assets via BitMart Earn.
    • Flexible Repayment — No fixed terms or late fees; repay anytime at your convenience.
    • Multi-Asset Support — Borrow and pledge in USDT, USDC, BTC, ETH, BMX, and more.
    • Transparent, Low Costs — Competitive hourly interest rates that adjust with the market.

    BMX, BitMart’s native token, plays a pivotal role in this ecosystem. It can be used both as collateral and as a borrowed asset, further enhancing liquidity and utility. BMX holders also enjoy additional perks, including trading fee discounts, VIP benefits, and participation in BitMart’s growth through airdrops and rewards — creating a vibrant, user-driven ecosystem.

    Launch Benefits: Interest Rebates and USDC Rewards

    To celebrate the launch, BitMart is offering exclusive promotions:

    • Interest Subsidy — New users receive a 50% rebate on interest paid; VIP users enjoy a full 100% rebate, achieving “zero-interest” borrowing.
    • Leaderboard Rewards — The top 50 borrowers by total loan amount will share in generous USDC prizes, with first place taking home 1,000 USDC.

    Details: https://www.bitmart.com/activity/cryptoloans/en-US 

    As the digital asset market matures and evolves, traditional asset management models can no longer meet modern users’ demands for flexibility, efficiency, and diversification. The launch of BitMart Crypto Loans not only brings a fresh liquidity solution to the market but also opens up new possibilities for the application of crypto assets. Without sacrificing the long-term appreciation potential of their holdings, users can easily allocate funds while earning transparent and sustainable yields through financial tools. This innovative model undoubtedly represents the future of the industry: smarter, more flexible, and more efficient asset management is set to become the new norm in the crypto market.

    About BitMart

    BitMart is the premier global digital asset trading platform. With millions of users worldwide and ranked among the top crypto exchanges on CoinGecko, it currently offers 1,700+ trading pairs with competitive trading fees. Constantly evolving and growing, BitMart is interested in crypto’s potential to drive innovation and promote financial inclusion. To learn more about BitMart, visit their Website, follow their X (Twitter), or join their Telegram for updates, news, and promotions. Download BitMart App to trade anytime, anywhere.

    Disclaimer:

    Use of BitMart services is entirely at your own risk. All crypto investments, including earnings, are highly speculative in nature and involve substantial risk of loss. Past, hypothetical, or simulated performance is not necessarily indicative of future results. The value of digital currencies can go up or down and there can be a substantial risk in buying, selling, holding, or trading digital currencies. You should carefully consider whether trading or holding digital currencies is suitable for you based on your personal investment objectives, financial circumstances, and risk tolerance. BitMart does not provide any investment, legal, or tax advice.

    The MIL Network

  • MIL-OSI: BoldSign® by Syncfusion® Earns 2025 SaaS Awards Finalist Honors and Five G2 Summer Badges

    Source: GlobeNewswire (MIL-OSI)

    RESEARCH TRIANGLE PARK, N.C., July 22, 2025 (GLOBE NEWSWIRE) — Syncfusion®, Inc., the enterprise technology provider of choice, today announced that its e-signature solution, BoldSign®, has been named a finalist in the 2025 SaaS Awards in multiple categories. Additionally, BoldSign has secured five Leader badges in G2’s Summer 2025 Grid® Reports.

    BoldSign is a SaaS Awards Finalist in the Highest Customer Satisfaction with a SaaS Product and Best SaaS for Sustainability and Ethical Impact categories.

    In the latest reports from leading review platform G2, BoldSign earned the following recognitions:

    Additional information can be found on the BoldSign blog.

    “BoldSign removes friction from everyday agreements while giving developers full control,” said Daniel Jebaraj, CEO of Syncfusion®. “Recognition from the SaaS Awards judges and hundreds of verified G2 reviewers affirms that BoldSign delivers real, measurable value through its thoughtful feature set, robust security, and developer-friendly approach.”

    The SaaS Awards, operated by global cloud computing awards body The Cloud Awards, spotlight the most innovative and impactful cloud software worldwide. BoldSign is backed by enterprise-grade SOC 2®-certified security, industry-recognized customer support, qualified electronic signature support, and extensive integration capabilities. These enable development teams to embed modern, paper-free signing in any application while helping organizations reduce paper waste and meet sustainability goals.

    BoldSign offers simple, flexible pricing (as well as a free plan), straightforward APIs, and a growing feature set, giving teams a faster, more affordable path to legally binding e-signatures. For more information or to start a free trial, visit boldsign.com.

    About Syncfusion®, Inc.
    Headquartered in the technology hub of Research Triangle Park, N.C., Syncfusion, Inc. delivers an award-winning ecosystem of developer control suites, embeddable BI platforms, and business software. Syncfusion was founded in 2001 with a single software component and a mission to support businesses of all sizes—from individual developers and start-ups to Fortune 500 enterprises. Though its pilot product, the Essential Studio® suite, has grown to over 1,900 developer controls, its mission remains the same. With offices in the U.S., India, and Kenya, Syncfusion prioritizes the customer experience by providing feature-rich solutions to help developers and enterprises solve complex problems, save money, and build high-performance, robust applications.

    Contact: Brittany Kearns
    Phone: 571-271-7211
    Email: brittany@crossroadsb2b.com

    The MIL Network

  • MIL-OSI United Nations: Supercharging Clean Energy Will Repair Humankind’s Relationship with Climate, Fuel Economic Growth, Secretary-General Says, Noting $2 Trillion Invested in 2024

    Source: United Nations General Assembly and Security Council

    Following is UN Secretary-General António Guterres’ address on climate action “A Moment of Opportunity:  Supercharging the Clean Energy Age”, in New York today:

    The headlines are dominated by a world in trouble.  By conflict and climate chaos.  By rising human suffering.  By growing geopolitical divides.  But amidst the turmoil, another story is being written.  And its implications will be profound.

    Throughout history, energy has shaped the destiny of humankind — from mastering fire to harnessing steam to splitting the atom.  Now, we are on the cusp of a new era.  Fossil fuels are running out of road.  The sun is rising on a clean energy age.

    Just follow the money.  Two trillion dollars went into clean energy last year — that’s $800 billion more than fossil fuels and up almost 70 per cent in 10 years.  And new data released today from the International Renewable Energy Agency shows that solar — not so long ago four times the cost of fossil fuels — is now 41 per cent cheaper.  Offshore wind — 53 per cent. And over 90 per cent of new renewables worldwide produced electricity for less than the cheapest new fossil fuel alternative.

    This is not just a shift in power.  This is a shift in possibility.  Yes, in repairing our relationship with the climate.  Already, the carbon emissions saved by solar and wind globally are almost equivalent to what the whole European Union produces in a year.

    But this transformation is fundamentally about energy security and people’s security.  It’s about smart economics.  Decent jobs, public health, advancing the Sustainable Development Goals.  And delivering clean and affordable energy to everyone, everywhere.

    Today, we are releasing a special report with the support of UN agencies and partners — the International Energy Agency, the International Monetary Fund (IMF), International Renewable Energy Agency, the Organisation for Economic Cooperation and Development (OECD) and the World Bank.

    The report shows how far we have come in the decade since the Paris Agreement sparked a clean energy revolution.  And it highlights the vast benefits — and actions needed — to accelerate a just transition globally.

    Renewables already nearly match fossil fuels in global installed power capacity.  And that’s just the beginning.  Last year, almost all the new power capacity built came from renewables.  And every continent on Earth added more renewables capacity than fossil fuels.  The clean energy future is no longer a promise.  It’s a fact.  No government.  No industry. No special interest can stop it.

    Of course, the fossil fuel lobby of some fossil fuel companies will try — and we know the lengths to which they will go. But I have never been more confident that they will fail — because we have passed the point of no return.

    For three powerful reasons.  First, market economics.  For decades, emissions and economic growth rose together.  No more.  In many advanced economies, emissions have peaked, but growth continues.

    In 2023 alone, clean energy sectors drove 10 per cent of global gross domestic product (GDP) growth.  In India, 5 per cent.  The United States, 6 per cent.  China — a leader in the energy transition — 20 per cent.  And in the European Union, nearly 33 per cent.  And clean energy sector jobs now outnumber fossil fuel jobs — employing almost 35 million people worldwide.

    Even Texas — the heart of the American fossil fuel industry — now leads the United States in renewables.  Why?  Because it makes economic sense.

    And yet fossil fuels still enjoy a 9-to-1 advantage in consumption subsidies globally — a clear market distortion.  Add to that the unaccounted costs of climate damages on people and planet — and the distortion is even greater.

    Countries that cling to fossil fuels are not protecting their economies — they are sabotaging them.  Driving up costs.  Undermining competitiveness.  Locking in stranded assets.  And missing the greatest economic opportunity of the twenty-first century.

    Second — renewables are here to stay because they are the foundation of energy security and sovereignty. Let’s be clear:  The greatest threat to energy security today is in fossil fuels.  They leave economies and people at the mercy of price shocks, supply disruptions and geopolitical turmoil.  Just look at Russia’s invasion of Ukraine.  A war in Europe led to a global energy crisis.  Oil and gas prices soared.  Electricity and food bills followed.  In 2022 average households around the world saw energy costs jump 20 per cent.

    Modern and competitive economies need stable, affordable energy. Renewables offer both.  There are no price spikes for sunlight.  No embargoes on wind.  Renewables can put power — literally and figuratively — in the hands of people and governments.  And almost every nation has enough sun, wind, or water to become energy self-sufficient.  Renewables mean real energy security.  Real energy sovereignty.  And real freedom from fossil-fuel volatility.

    The third and final reason why there is no going back on renewables: Easy access.  You can’t build a coal plant in someone’s backyard.  But you can deliver solar panels to the most remote village on Earth.  Solar and wind can be deployed faster, cheaper and more flexibly than fossil fuels ever could.  And while nuclear will be part of the global energy mix, it can never fill the access gaps.

    All of this is a game changer for the hundreds of millions of people still living without electricity — most of them in Africa, a continent bursting with renewable potential. By 2040, Africa could generate 10 times more electricity than it needs — entirely from renewables.

    We are already seeing small-scale and off-grid renewable technologies lighting homes, and powering schools and businesses in remote areas.  And in places like Pakistan for example, people power is fuelling a solar surge — consumers are driving the clean energy boom.

    The energy transition is unstoppable.  But the transition is not yet fast enough or fair enough.  OECD countries and China account for 80 per cent of renewable power capacity installed worldwide.  Brazil and India make up nearly 10 per cent.  Africa — just 1.5 per cent.

    Meanwhile, the climate crisis is laying waste to lives and livelihoods.  Climate disasters in small island States have wiped out over 100 per cent of GDP.  In the United States, they are pushing insurance premiums through the roof.

    And the 1.5-degree limit is in unprecedented peril.  To keep it within reach, we must drastically speed up the reduction of emissions — and the reach of the clean energy transition.  With manufacturing capacity racing, prices plummeting, and COP30 [Thirtieth Session of the Conference of the Parties to the United Nations Framework Convention on Climate Change] fast approaching…  This is our moment of opportunity.  We must seize it.  We can do so by taking action in six opportunity areas.

    First — by using new national climate plans to go all-out on the energy transition.  Too often, governments send mixed messages:  Bold renewable targets on one day.  New fossil fuel subsidies and expansions the next.

    The next national climate plans, or NDCs, are due in a matter of months.  They must bring clarity and certainty.  Group of Twenty (G20) countries must lead. They produce 80 per cent of global emissions.  The principle of common but differentiated responsibilities must apply but every country must do more.  Ahead of COP30 in Brazil this November, they must submit new plans.

    I invite leaders to present their new NDCs at an event I will host in September, during General Assembly High-level week.   These must: cover all emissions, across the entire economy; align with the 1.5-degree limit; integrate energy, climate and sustainable development priorities into one coherent vision; and deliver on global promises to double energy efficiency and triple renewables capacity by 2030, and to accelerate the transition away from fossil fuels.  These plans must be backed by long-term road maps for a just transition to net-zero energy systems — in line with global net-zero by 2050.

    And they must be underpinned by policies that show that the clean energy future is not just inevitable — but investable.  Policies that create clear regulations and a pipeline of projects.  That enhance public-private partnerships — unlocking capital and innovation.  That put a meaningful price on carbon.  And that end subsidies and international public finance for fossil fuels — as promised.

    Second, this is our moment of opportunity to build the energy systems of the twenty-first century.  The technology is moving ahead.  In just 15 years, the cost of battery storage systems for electricity grids has dropped over 90 per cent.

    But here’s the problem.  Investments in the right infrastructure are not keeping up.  For every dollar invested in renewable power, just 60 cents go to grids and storage.  That ratio should be one-to-one.

    We are building renewable power — but not connecting it fast enough.  There’s three times more renewable energy waiting to be plugged into grids than was added last year.  And fossil fuels still dominate the global total energy mix.

    We must act now and invest in the backbone of a clean energy future:  In modern, flexible and digital grids — including regional integration.  In a massive scale-up of energy storage.  In charging networks — to power the electric vehicle revolution.

    On the other hand, we need energy efficiency but also electrification — across buildings, transport and industry. This is how we unlock the full promise of renewables — and build energy systems that are clean, secure and fit for the future.

    Third, this is our moment of opportunity to meet the world’s surging energy demand sustainably.  More people are plugging in.  More cities are heating up — with soaring demand for cooling.  And more technologies — from AI to digital finance — are devouring electricity.  Governments must aim to meet all new electricity demand with renewables.

    AI can boost efficiency, innovation and resilience in energy systems.  And we must take profit in it.  But it is also energy hungry.  A typical AI data centre eats up as much electricity as 100,000 homes.  The largest ones will soon use 20 times that.  By 2030, data centres could consume as much electricity as all of Japan does today.

    This is not sustainable — unless we make it so.  And the technology sector must be out front.  Today I call on every major tech firm to power all data centres with 100 per cent renewables by 2030.

    And — along with other industries — they must use water sustainably in cooling systems.  The future is being built in the cloud.  It must be powered by the sun, the wind and the promise of a better world.

    Fourth, this is the moment of opportunity for a just energy transition. The clean energy that we must deliver must also deliver equity, dignity and opportunity for all.

    That means governments leading a just transition.  With support, education and training — for fossil fuel workers, young people, women, Indigenous Peoples and others — so that they can thrive in the new energy economy.  With stronger social protection — so no one is left behind.  And with international cooperation to help low-income countries that are highly-dependent on fossil fuels and struggling to make the shift.

    But justice doesn’t stop here.  The critical minerals that power the clean energy revolution are often found in countries that have long been exploited.  And today, we see history repeating.  Communities mistreated.  Rights trampled.  Environments trashed.  Nations stuck at the bottom of value chains — while others reap rewards.  And extractive models digging deeper holes of inequality and harm.  This must end.

    Developing countries can play a major role in diversifying sources of supply. The UN Panel on Critical Energy Transition Minerals has shown the way forward — with a path grounded in human rights, justice and equity.

    Today, I call on governments, businesses and civil society to work with us to deliver its recommendations.  Let’s build a future that is not only green — but just.  Not only fast — but fair.  Not only transformative — but inclusive.

    Fifth, we have a moment of opportunity to use trade and investment to supercharge the energy transition.  Clean energy needs more than ambition.  It needs access — to technologies, materials and manufacturing.

    But these are concentrated in just a few countries.  And global trade is fragmenting.

    Trade policy must support climate policy.  Countries committed to the new energy era must come together to ensure that trade and investment drive it forward.  By building diverse, secure and resilient supply chains.  By cutting tariffs on clean energy goods.  By unlocking investment and trade — including through South-South cooperation. And by modernizing outdated investment treaties — starting with Investor-State Dispute Settlement provisions.

    Today, fossil fuel interests are weaponizing these provisions to delay the transition, particularly in several developing countries.  Reform is urgent.  The race for the new must not be a race for the few.  It must be a relay — shared, inclusive and resilient.  Let’s make trade a tool for transformation.

    Sixth and finally, this is our moment of opportunity to unleash the full force of finance — driving investment to markets with massive potential.  Despite soaring demand and vast renewables potential — developing countries are being locked out of the energy transition.

    Africa is home to 60 per cent of the world’s best solar resources.  But it received just 2 per cent of global clean energy investment last year.  Zoom out, and the picture is just as stark.

    In the last decade, only 1 in every 5 clean energy dollars went to emerging and developing countries outside China.  To keep the 1.5-degree limit alive — and deliver universal energy access – annual clean energy investment in those countries must rise more than fivefold by 2030.

    That demands bold national policies.  And concrete international action to:  Reform the global financial architecture.  Drastically increase the lending capacity of multilateral development banks — making them bigger, bolder and better able to leverage massive amounts of private finance at reasonable costs.  And take effective action on debt relief — and scale up proven tools like debt for climate swaps.

    Today, developing countries pay outlandish sums for both debt and equity financing — in part because of outdated risk models, bias and broken assumptions that boost the cost of capital.  Credit ratings agencies and investors must modernize.

    We need a new approach to risk that reflects:  the promise of clean energy; the rising cost of climate chaos; and the danger of stranded fossil fuel assets.  I urge parties to unite to solve the complex challenges facing some developing countries in the energy transition — such as early retirement of coal plants.

    The fossil fuel age is flailing and failing.  We are in the dawn of a new energy era.  An era where cheap, clean, abundant energy powers a world rich in economic opportunity.  Where nations have the security of energy autonomy.  And the gift of power is a gift for all.

    That world is within reach.  But it won’t happen on its own.  Not fast enough.  Not fair enough.  It is up to us.  We have the tools to power the future for humanity.  Let’s make the most of them.  This is our moment of opportunity.

    MIL OSI United Nations News

  • MIL-OSI USA: Speaker Johnson Commends Selection of Rep. Garbarino to Serve as Chairman of the House Homeland Security Committee

    Source: United States House of Representatives – Representative Mike Johnson (LA-04)

    Speaker Johnson Commends Selection of Rep. Garbarino to Serve as Chairman of the House Homeland Security Committee

    Washington, July 22, 2025

    WASHINGTON — Speaker Johnson released the following statement after the House Republican Conference selected Rep. Andrew Garbarino (R-NY) to serve as the next Chairman of the House Homeland Security Committee following the departure of Rep. Mark Green (R-TN):

    “House Republicans know that Rep. Garbarino will serve as a steady hand at the helm of the House Homeland Security Committee as Congressional Republicans and the Trump Administration continue our work to restore law and order at our borders following four years of neglect and catastrophic failures under the Biden Administration. While we had a superb group of uniquely qualified candidates, Andrew was elected to the position because of his experience as a highly effective legislator at the state and federal level, his ability to build consensus in our Conference, and his impressive work heading the Cybersecurity and Infrastructure Protection Subcommittee. We look forward to moving forward together as one team to continue advancing legislation in the House that keeps our border permanently secured and our country safe.”

    ###

    MIL OSI USA News

  • MIL-OSI USA: ICYMI: California’s economic leadership shines in three recent studies

    Source: US State of California Governor

    Jul 22, 2025

    What you need to know: California is cementing its role as a global economic powerhouse — new data highlights the Golden State’s leadership in innovation, business growth, and AI readiness.

    SACRAMENTO – California continues to dominate as an economic leader nationwide. As the fourth largest economy in the world, California is fostering growth in sectors across the board, creating jobs and spurring economic activity.

    “California is where a diverse class of dreamers and doers meet more access to venture capital funding, more Fortune 500 companies, and more business starts than anywhere else in the nation. That is how we regularly punch above our weight in economic success on a global scale.”

    Governor Gavin Newsom

    According to recent reporting: 

    ➜ Eight California cities ranked among the 25 fastest-growing for trade between businesses, referred to as business-to-business payments growth, since January 2025 – more than any other state. 

    ➜ Three city regions – San Francisco, San Jose and Los Angeles – are among the top 10 in the country when it comes to having everything in place to launch big AI businesses, according to a recent report from Brookings. No other state has more than one region in the top 10.

    ➜ Nearly four times more companies launched their headquarters in California than relocated out of state, according to data from a recent report by the Public Policy Institute of California (PPIC). 

    When it comes to economic leadership, California leads the nation as:

    Furthering the state’s initiative to support business development, the California Competes Tax Credit this week opened its first application window for the fiscal year. With special consideration given to businesses within the “strengthen” and “accelerate” sector categories as outlined in the California Jobs First Economic Blueprint, California Competes aims to invest in the state’s key economic sectors that will drive innovation and access to good-paying jobs. Learn more and apply here by August 11.

    Recent news

    News What you need to know: Governor Gavin Newsom calls on the President to send every soldier home now – this dangerous militarization must end. Los Angeles, California – As pressure continues mounting for the President to end the unlawful deployment of soldiers in…

    News SACRAMENTO – Governor Gavin Newsom has approved the prepositioning of firefighting resources in Sierra and Plumas counties in response to critical fire weather conditions forecasted to impact Northern California starting Sunday, July 20, through Tuesday, July 22,…

    News SACRAMENTO – Governor Gavin Newsom and Acting Governor Eleni Kounalakis issued the following statement regarding the deaths of Los Angeles County Sheriff’s Department Detectives Joshua Kelley-Eklund, Victor Lemus, and William Osborn:“Detectives Kelley-Eklund,…

    MIL OSI USA News

  • MIL-OSI Africa: African Union, in partnership with the United Nations Children’s Fund (UNICEF), convene a Validation Workshop to Scale Proven Solutions for Foundational Learning in Africa

    Source: APO


    .

    The Validation Workshop on Scalable Foundational Literacy and Numeracy (FLN) Practices to End Learning Poverty in Africa was officially opened today. The two-day gathering, held at the African Union Commission (AUC) Headquarters in Addis Ababa from July 22 to 23, 2025, marks a significant step forward in the collective effort to address the continent’s learning crisis and ensure that every child acquires the essential foundational skills they deserve by age 10.

    The workshop brings together technical experts from 25 Member States, along with representatives from the African Union Commission, UNICEF, the Gates Foundation, and other development partners. The goal is to validate the research findings constituting the mapping of scalable good practices for foundational literacy and numeracy across the continent.

    “The continental Foundational Literacy and Numeracy mapping resource we are validating today is an essential step toward reversing this trend. It seeks to gather, synthesise, and spotlight what works—real, evidence-based, scalable practices that have shown success across diverse African contexts. Whether it’s structured pedagogy in Uganda, mother-tongue based instruction in Ethiopia, or targeted instruction by learning level in Zambia, these are not only just case studies, but blueprints with promise for large-scale systemic change”, Prof. Saidou Madougou, Director of the Department of Education, Science, Technology and Innovation (ESTI).

    Across West, Central, East, and Southern Africa, an alarming 9 out of 10 children are unable to read and understand a simple sentence by the age of 10. While enrollment in primary and lower secondary education has increased significantly over the last two decades, millions of children attend school without acquiring the foundational skills they need. This persistent learning crisis is more than an educational challenge; it poses a threat to future economic prosperity.

    “This workshop is a significant step in creating a broader pathway of engagement for foundational learning and numeracy between educators, policy makers and practitioners to improve learning outcomes: learning from one another through the cross-fertilisation of successes, and more importantly, taking the lead in adapting scalable solutions and embedding them into national education sector plans, policies, and programmes”, emphasized Dr Laila Gad, UNICEF Representative to the African Union and UNECA

    The outcomes of this workshop will also contribute to the End Learning Poverty for All in Africa Campaign (ELPAf)—a four-year African Union–UNICEF initiative launched in September 2024 during the AU Year of Education. ELPAf aims to end learning poverty in Africa by strengthening foundational literacy and numeracy, which are the cornerstones of all further learning and skill acquisition. Foundational learning holds the most significant promise for overcoming Africa’s education challenges, laying the groundwork for lifelong learning, and empowering African children to thrive as engaged citizens and contributors to their communities and economies.

    Distributed by APO Group on behalf of African Union (AU).

    MIL OSI Africa

  • MIL-OSI: XA Investments Reports Record $227 billion in Managed Assets in its Second Quarter 2025 Market Update

    Source: GlobeNewswire (MIL-OSI)

    CHICAGO, July 22, 2025 (GLOBE NEWSWIRE) — XA Investments LLC (“XAI”), an alternative investment management and consulting firm, announced today that its Non-Listed Closed-End Funds Second Quarter 2025 Market Update shows accelerated growth in the market, a surge in fund launches, and a shift toward greater investor accessibility.

    “The non-listed CEF market continues to show record growth with 17% or 50 funds in the market reaching over $1 billion in assets under management and seven of those funds hitting the $1 billion milestone this quarter” stated Kimberly Flynn, the president of XAI. “As more assets continue to flow into the interval / tender offer fund market, we believe the market’s trajectory will remain positive, with significant opportunities for expansion throughout the rest of the year,” she added.

    The market update is a comprehensive research report detailing current market trends and industry highlights. The non-listed closed-end fund (CEF) market includes all interval and tender offer funds. The report highlights the removal of accredited investor suitability restrictions, divergence of positioning in the market, dominance of interval funds with a daily NAV and no suitability restrictions, increased performance coverage, and coverage of Specialty Structures.

    The non-listed CEF market reached a new peak with 288 interval and tender offer funds with a total of $196 billion in net assets and $227 billion in total managed assets, inclusive of leverage, as of June 30, 2025. The market includes 144 interval funds which comprise 59% of the total managed assets at $132.8 billion and 144 tender offer funds which comprise the other 41% with $93.9 billion in total managed assets.

    This is a significant change from previous quarters, as the number of interval funds has caught up to the total number of tender funds. In Q2 2025, 23 new funds entered the market, representing an increase of 13 funds compared to the 10 funds launched in Q2 2024. Market-wide net assets increased $15 billion in Q2 2025 from the prior quarter.

    In total, there are 150 unique fund sponsors in the interval and tender offer fund space, with 54 fund sponsors that have two or more interval and/or tender offer funds currently in the market. Additionally, there are 22 funds currently in the Securities and Exchange Commission registration process from fund sponsors looking to launch another fund.

    Displaying the growth of new funds in the market, the market share of the top 20 funds continues to decrease, falling to 59% in Q2 2025 from 60% in Q1 2025 and 65% in Q4 2024. Among the new funds launched in Q2 2025, there were nine new interval fund sponsors, including Corient, Coatue, and Select Equity Group.

    XAI also noted the emergence of Specialty Structures within the market. These funds are continuously offered, evergreen, semi-liquid private funds designed for accredited investors and qualified purchasers. They are exempt from the Investment Company Act of 1940 but still governed by federal securities laws. These evergreen funds provide access to alternative strategies while offering limited liquidity and reduced reporting obligations for the manager compared to registered funds.

    The current landscape of 13 Specialty Structures funds is dominated by large private equity firms including Blackstone, KKR, and Apollo. While Specialty Structures and interval / tender offer funds have some similarities, the fund structures differ in how they handle liquidity, investor eligibility, reporting obligations, and tax treatment.

    “Understanding Specialty Structures helps managers better align product design with strategy and audience, which is increasingly critical in a growing and competitive market” Flynn said.

    In this quarterly report, XAI covers the Q1 2025 net flows which are lagged by reporting cycles. In Q1 2025 funds had positive net flows, totaling over $13 billion, with 67% of funds reporting positive net flows. The majority of net flows in Q1 2025 went into daily NAV funds without suitability restrictions, attracting 58% of marketwide net flows.

    Two-thirds or 67% of net flows went into funds with no suitability restrictions, while 12% went into funds limited to accredited investors, and 21% went into funds limited to qualified clients. In aggregate, the top 20 largest interval/tender offer funds accounted for 50% of total net flows including many of the market leaders such as the Cliffwater Corporate Lending Fund, Partners Group Private Equity (Master Fund), LLC, and ACAP Strategic Fund.

    “The non-listed CEF market continues to grow with a total of 51 funds in the SEC registration process at the end of the first quarter,” Flynn noted. “While the SEC backlog decreased by seven funds from the end of Q1 2025 to the end of Q2 2025, we believe there will still be significant growth in the market this year. So far in 2025, there have been 46 new SEC filings, compared to 27 new filings from this point in 2024, representing a 70% increase in registrations” she added.

    Newly launched non-listed CEFs spent around six months in the SEC registration process, with the fund’s asset class continuing to be the main driver of time spent in the SEC review process. Tax-Free Bond funds were the quickest to launch, at 150 days on average spent in registration.

    At 53%, the majority of interval and tender offer funds do not have any suitability restrictions for investors imposed at the fund level — 27% of funds are available to accredited investors and 20% are only available to qualified clients. The amount of funds offered with no suitability restrictions is also predicted to increase with recent changes in a SEC Staff position. Following this change in position, many interval and tender offer funds have filed prospectus supplements removing accredited investor requirements.

    According to Flynn, “We expect more funds to reduce their suitability requirements in the near future and for many new funds to forgo accredited investor requirements.” Alternative funds without suitability restrictions also prove to be more accessible and have gathered more assets at $130.5 billion in managed assets or 57% of market-wide assets.

    For more information on the interval fund market and to read our full quarterly report on non-listed CEFs, please visit the CEF Market research page linked here and click ‘Subscribe’ for access to XA Investments’ online research portal and pricing information. In addition, please contact info@xainvestments.com or 888-903-3358 with questions.

    About XA Investments
    XA Investments LLC (“XAI”) is a Chicago-based firm founded by XMS Capital Partners in 2016. XAI serves as the investment adviser for two listed closed-end funds and an interval closed-end fund, respectively the XAI Octagon Floating Rate & Alternative Income Trust, the XAI Madison Equity Premium Income Fund, and the Octagon XAI CLO Income Fund. In addition to investment advisory services, the firm also provides investment fund structuring and consulting services focused on registered closed-end funds to meet institutional client needs. XAI offers custom product build and consulting services, including product development and market research, marketing and fund management. XAI believes that the investing public can benefit from new vehicles to access a broad range of alternative investment strategies and managers. For more information, please visit www.xainvestments.com.

    Note: Net flows are reported in Form NPORT-P (“NPORTs”), which are filed quarterly with the SEC. NPORT filings are typically lagged 60 days from the end of the reporting period. The net flows data in this report is as of 3/31/2025 and represents the latest publicly available data.

    Sources: XA Investments; CEFData.com; SEC Filings.

    Notes: All information as of 6/30/2025 unless otherwise noted. Total managed assets is inclusive of leverage. The non-listed CEF market is subject to lags in reporting and limited data availability. Data such as asset levels, net flows, and performance are delayed up to 90 days after quarter-end and are not available for all funds. All data in the report is the most current available. Please contact our team if you have any questions about the non-listed CEF marketplace.

    The MIL Network

  • MIL-OSI: XA Investments Reports Record $227 billion in Managed Assets in its Second Quarter 2025 Market Update

    Source: GlobeNewswire (MIL-OSI)

    CHICAGO, July 22, 2025 (GLOBE NEWSWIRE) — XA Investments LLC (“XAI”), an alternative investment management and consulting firm, announced today that its Non-Listed Closed-End Funds Second Quarter 2025 Market Update shows accelerated growth in the market, a surge in fund launches, and a shift toward greater investor accessibility.

    “The non-listed CEF market continues to show record growth with 17% or 50 funds in the market reaching over $1 billion in assets under management and seven of those funds hitting the $1 billion milestone this quarter” stated Kimberly Flynn, the president of XAI. “As more assets continue to flow into the interval / tender offer fund market, we believe the market’s trajectory will remain positive, with significant opportunities for expansion throughout the rest of the year,” she added.

    The market update is a comprehensive research report detailing current market trends and industry highlights. The non-listed closed-end fund (CEF) market includes all interval and tender offer funds. The report highlights the removal of accredited investor suitability restrictions, divergence of positioning in the market, dominance of interval funds with a daily NAV and no suitability restrictions, increased performance coverage, and coverage of Specialty Structures.

    The non-listed CEF market reached a new peak with 288 interval and tender offer funds with a total of $196 billion in net assets and $227 billion in total managed assets, inclusive of leverage, as of June 30, 2025. The market includes 144 interval funds which comprise 59% of the total managed assets at $132.8 billion and 144 tender offer funds which comprise the other 41% with $93.9 billion in total managed assets.

    This is a significant change from previous quarters, as the number of interval funds has caught up to the total number of tender funds. In Q2 2025, 23 new funds entered the market, representing an increase of 13 funds compared to the 10 funds launched in Q2 2024. Market-wide net assets increased $15 billion in Q2 2025 from the prior quarter.

    In total, there are 150 unique fund sponsors in the interval and tender offer fund space, with 54 fund sponsors that have two or more interval and/or tender offer funds currently in the market. Additionally, there are 22 funds currently in the Securities and Exchange Commission registration process from fund sponsors looking to launch another fund.

    Displaying the growth of new funds in the market, the market share of the top 20 funds continues to decrease, falling to 59% in Q2 2025 from 60% in Q1 2025 and 65% in Q4 2024. Among the new funds launched in Q2 2025, there were nine new interval fund sponsors, including Corient, Coatue, and Select Equity Group.

    XAI also noted the emergence of Specialty Structures within the market. These funds are continuously offered, evergreen, semi-liquid private funds designed for accredited investors and qualified purchasers. They are exempt from the Investment Company Act of 1940 but still governed by federal securities laws. These evergreen funds provide access to alternative strategies while offering limited liquidity and reduced reporting obligations for the manager compared to registered funds.

    The current landscape of 13 Specialty Structures funds is dominated by large private equity firms including Blackstone, KKR, and Apollo. While Specialty Structures and interval / tender offer funds have some similarities, the fund structures differ in how they handle liquidity, investor eligibility, reporting obligations, and tax treatment.

    “Understanding Specialty Structures helps managers better align product design with strategy and audience, which is increasingly critical in a growing and competitive market” Flynn said.

    In this quarterly report, XAI covers the Q1 2025 net flows which are lagged by reporting cycles. In Q1 2025 funds had positive net flows, totaling over $13 billion, with 67% of funds reporting positive net flows. The majority of net flows in Q1 2025 went into daily NAV funds without suitability restrictions, attracting 58% of marketwide net flows.

    Two-thirds or 67% of net flows went into funds with no suitability restrictions, while 12% went into funds limited to accredited investors, and 21% went into funds limited to qualified clients. In aggregate, the top 20 largest interval/tender offer funds accounted for 50% of total net flows including many of the market leaders such as the Cliffwater Corporate Lending Fund, Partners Group Private Equity (Master Fund), LLC, and ACAP Strategic Fund.

    “The non-listed CEF market continues to grow with a total of 51 funds in the SEC registration process at the end of the first quarter,” Flynn noted. “While the SEC backlog decreased by seven funds from the end of Q1 2025 to the end of Q2 2025, we believe there will still be significant growth in the market this year. So far in 2025, there have been 46 new SEC filings, compared to 27 new filings from this point in 2024, representing a 70% increase in registrations” she added.

    Newly launched non-listed CEFs spent around six months in the SEC registration process, with the fund’s asset class continuing to be the main driver of time spent in the SEC review process. Tax-Free Bond funds were the quickest to launch, at 150 days on average spent in registration.

    At 53%, the majority of interval and tender offer funds do not have any suitability restrictions for investors imposed at the fund level — 27% of funds are available to accredited investors and 20% are only available to qualified clients. The amount of funds offered with no suitability restrictions is also predicted to increase with recent changes in a SEC Staff position. Following this change in position, many interval and tender offer funds have filed prospectus supplements removing accredited investor requirements.

    According to Flynn, “We expect more funds to reduce their suitability requirements in the near future and for many new funds to forgo accredited investor requirements.” Alternative funds without suitability restrictions also prove to be more accessible and have gathered more assets at $130.5 billion in managed assets or 57% of market-wide assets.

    For more information on the interval fund market and to read our full quarterly report on non-listed CEFs, please visit the CEF Market research page linked here and click ‘Subscribe’ for access to XA Investments’ online research portal and pricing information. In addition, please contact info@xainvestments.com or 888-903-3358 with questions.

    About XA Investments
    XA Investments LLC (“XAI”) is a Chicago-based firm founded by XMS Capital Partners in 2016. XAI serves as the investment adviser for two listed closed-end funds and an interval closed-end fund, respectively the XAI Octagon Floating Rate & Alternative Income Trust, the XAI Madison Equity Premium Income Fund, and the Octagon XAI CLO Income Fund. In addition to investment advisory services, the firm also provides investment fund structuring and consulting services focused on registered closed-end funds to meet institutional client needs. XAI offers custom product build and consulting services, including product development and market research, marketing and fund management. XAI believes that the investing public can benefit from new vehicles to access a broad range of alternative investment strategies and managers. For more information, please visit www.xainvestments.com.

    Note: Net flows are reported in Form NPORT-P (“NPORTs”), which are filed quarterly with the SEC. NPORT filings are typically lagged 60 days from the end of the reporting period. The net flows data in this report is as of 3/31/2025 and represents the latest publicly available data.

    Sources: XA Investments; CEFData.com; SEC Filings.

    Notes: All information as of 6/30/2025 unless otherwise noted. Total managed assets is inclusive of leverage. The non-listed CEF market is subject to lags in reporting and limited data availability. Data such as asset levels, net flows, and performance are delayed up to 90 days after quarter-end and are not available for all funds. All data in the report is the most current available. Please contact our team if you have any questions about the non-listed CEF marketplace.

    The MIL Network

  • MIL-OSI USA: Peters Leads Colleagues in Urging FAA to Expedite Delivery of Federal Resources for Michigan Airports

    US Senate News:

    Source: United States Senator for Michigan Gary Peters

    WASHINGTON, DC – U.S. Senator Gary Peters (MI) led a bipartisan group of his Senate colleagues in urging the Federal Aviation Administration (FAA) to expedite the disbursement of grant funding that helps upgrade airport infrastructure and makes air travel more efficient. In a letter to FAA Administrator Bryan Bedford, Peters expressed the importance of investments from both the Airport Improvement Plan (AIP) and Airport Infrastructure Grant (AIG) programs, which provide formula-based funding awards to nearly 3,300 public-use airports across the nation, including Michigan’s 18 commercial airports and nearly 70 additional public use airports across the state. Despite these investments being made annually, funding is often not available to airports until late June or July, which impacts some airports’ ability to fully leverage these investments.  

    “For small airports with limited resources and in states with truncated construction seasons due to severe weather, this delay poses significant challenges,” the senators wrote. “It results in project cancellations, increased costs, and makes each federal dollar less effective.”

    The Senators went on to highlight the role that airports play in stimulating economic growth and job creation, arguing that more timely investments from AIP and AIG would help improve economic development initiatives in communities across the country.

    The Senators continued: “Small and large airports alike are also critical arteries for interstate commerce, tourism travel, and local economic growth. Recent reports show U.S. commercial airports supported 12.8 million jobs and produced $1.8 trillion in economic output in 2024 and general aviation supported over 1.3 million jobs and $339.2 billion in total economic output in the U.S. We all have a vested interest in reducing red tape and maximizing the effectiveness of AIP and AIG entitlement funds. Doing so would ensure airports can deliver projects without unnecessary delays or cost escalations and provide greater benefits to the constituents we all serve.” 

    The letter is supported by the Michigan Department of Transportation, National Association of State Aviation Officials, the American Association of Airport Executives, and the Transportation Construction Coalition.

    The full text of the letter can be found here.

     

    MIL OSI USA News