Category: United States of America

  • MIL-OSI USA: Strickland Introduces Legislation To Boost Funding For Gun Violence Prevention Research 

    Source: United States House of Representatives – Congresswoman Marilyn Strickland (WA-10)

    Washington, D.C. – Today, Congresswoman Marilyn Strickland (WA-10), Senators Edward J. Markey (D-MA) and Elissa Slotkin (D-MI) re-introduced the bicameral Gun Violence Prevention Research Act, legislation to annually authorize $50 million over the next five years for gun violence prevent research at the Centers for Disease Control and Prevention (CDC). 

    “Make no mistake: gun violence is preventable. Republicans actively choose to watch children, mothers, fathers, and Americans gunned down in deference to the gun lobby,” said Strickland. “We must root out the gun violence crisis in our nation. This legislation will simply treat gun violence as the public health crisis it is, and allow us to research it so we can take steps toward saving lives.” 

    “Stopping the spread of our nation’s gun violence epidemic requires action on the reforms we know are essential and effective,” said Senator Markey. “We must invest more to study the root causes of violence and develop evidence-based solutions. This legislation would allow our nation’s top medical, scientific, and public health researchers to conduct studies that would save lives. It is critical that we chart a path out of this public health crisis.” 

    “Gun violence is a uniquely American crisis that continues to impact communities across Michigan and our country,” said Senator Slotkin. “As the first Member of Congress to have two mass shootings in my former House district—Oxford High School and Michigan State University—I’ve seen first-hand the devastating toll gun violence has on our communities. As elected officials, our most basic responsibility is to protect our children from the things that are truly harming them. We must treat this epidemic like the national security threat that it is. And that means using every tool in the toolbox. Let’s get this bill across the finish line.” 

    This legislation arrives at a critical time. The Trump Administration has effectively dismantled gun violence prevention efforts, decimating the staff at the CDC and terminating $158 million—more than half—of federal funding for gun violence prevention programs at the Department of Justice.  

    House co-sponsors include: Rep. Eleanor Holmes Norton (DC), Rep. Jim Costa (CA-21), Rep. Juan Vargas (CA-51), Rep. Shontel Brown (OH-11), Rep. Don Beyer (VA-08), Rep. Hank Johnson (GA-04), Rep. Ritchie Torres (NY-15), and Rep. Deborah Ross (NC-02). 

    This bill is endorsed by the following organizations: 

    • Brady United 
    • Everytown for gun Safety 
    • March For Our Lives 
    • GIFFORDS 

    You can read the full bill text here. 

    Congresswoman Marilyn Strickland (WA-10) serves on the House Armed Services Committee and the House Transportation and Infrastructure Committee. She is Whip of the New Democrat Coalition, Secretary of the Congressional Black Caucus, and is one of the first Korean-American women elected to Congress. 

    ### 

    MIL OSI USA News

  • MIL-OSI USA: ICYMI: Kennedy in Newsweek: Congress must hold NATO to its 5% defense spending commitment

    US Senate News:

    Source: United States Senator John Kennedy (Louisiana)

    WASHINGTON – Sen. John Kennedy (R-La.) penned this op-ed in Newsweek arguing that Congress needs to hold NATO member countries to their 5% defense spending commitments.

    Key excerpts of the op-ed are below:

    “On the surface, it appeared as though every member of NATO agreed to increase its defense spending to 5 percent of its GDP by 2035—and I’m confident that many of our allies intend to do just that.

    “But some of our friends in NATO have already begun to weasel their way out of this commitment.”

    . . .

    “I am introducing a resolution to commend our NATO allies who agreed to increase their defense spending to 5 percent and to strongly urge every member of NATO to follow through with this commitment sincerely. If we want to deter our adversaries, we need real investments in our defense, not bridges that have little, if anything, to do with national security.

    “NATO is one of the greatest defensive alliances in all of human history, but these loopholes make us weaker. The world needs to know we have each other’s backs, and that starts by putting your money where your mouth is.”

    Read Kennedy’s op-ed here.  

    The full text of the resolution is available here.

    MIL OSI USA News

  • MIL-OSI USA: As Famine Ravishes Gaza, Duckworth Votes Against Trump Administration’s Sales of American Weapons to Israel

    US Senate News:

    Source: United States Senator for Illinois Tammy Duckworth

    July 30, 2025

    [WASHINGTON, D.C.] – U.S. Senator Tammy Duckworth (D-IL) today issued the following statement after voting to disapprove of the Trump Administration’s proposed foreign military sales to Israel:

    “I’ve long pressed the Netanyahu Administration in public and private to take substantive steps to alleviate the suffering of innocent civilians. But conditions on the ground are getting worse, not better. Israel’s unacceptable choice to restrict humanitarian and food aid from entering Gaza—for months—is now causing innocent civilians, including young children, to starve to death. Ending this famine is not only a moral imperative, it is also in the best interests of both Israel’s and our own country’s long-term national security.

    “While I have always supported Israel’s right to defend itself and protect the Israeli people, these dire circumstances must end. My votes tonight reflect my deep frustration with the Netanyahu government’s abject failure to address humanitarian needs in Gaza and send a message to the Trump Administration that it must change course if it wants to help end this devastating war.”

    -30-



    MIL OSI USA News

  • MIL-OSI USA: Jayapal Demands Answers from DOJ on Efforts to Denaturalize U.S. Citizens

    Source: United States House of Representatives – Congresswoman Pramila Jayapal (7th District of Washington)

    SEATTLE, WA — U.S. Representative Pramila Jayapal (WA-07), Ranking Member of the Subcommittee on Immigration, Integrity, Security, and Enforcement, is leading dozens of Members of Congress in demanding answers from Attorney General Pam Bondi and the Department of Justice (DOJ) over an internal memo prioritizing the denaturalization of U.S. citizens.

    “It appears this Administration plans to weaponize denaturalization cases to further smear innocent people and go after its perceived enemies,” wrote the Members. “The Trump Administration’s denaturalization efforts are a threat to the safety of every single American, including the roughly 24.5 million naturalized citizens as well as natural-born citizens alike. If the Administration is attacking citizens for speaking out against them, no one in this country is safe from harassment and arrest.”

    Denaturalization, or the revocation of citizenship, has a dangerous history in this country. While it was used for good following World War II to remove former Nazis who lied about their crimes, it was weaponized in the McCarthy era when roughly 22,000 denaturalization cases were filed for political purposes. During that time, the Supreme Court intervened in the Afroyim v. Rusk case, ruling that denaturalization was only acceptable in cases of citizenship being gained through fraudulent means or if the individual posed a legitimate threat to national security.

    However, the DOJ seems to be pursuing denaturalization outside of those guidelines, even saying in their memo, “these categories do not limit the Civil Division from pursuing any particular case…the Civil Division retains the discretion to pursue cases outside of these categories as it determines appropriate.”

    President Trump has threatened baseless denaturalization against Zohran Mamdani, the Democratic nominee for the mayor of New York, as well as Rosie O’Donnell, an American-born comedian and actress. 

    The letter is also signed by Representatives Yassamin Ansari (AZ-03), Becca Balint (VT-At Large), Nanette Barragán (CA-44), Suzanne Bonamici (OR-01), Greg Casar (TX-35), Yvette Clarke (NY-09), Lou Correa (CA-46), Jasmine Crockett (TX-30), Veronica Escobar (TX-16), Jesús “Chuy” García (IL-04), Sylvia Garcia (TX-29), Val Hoyle (OR-04), Jonathan Jackson (IL-01), Henry C. “Hank” Johnson, Jr. (GA-04), Raja Krishnamoorthi (IL-08), Summer Lee (PA-12), Ted Lieu (CA-36), James P. McGovern (MA-02), Jerrold Nadler (NY-12), Eleanor Holmes Norton (DC), Ilhan Omar (MN-05), Delia Ramirez (IL-03), Deborah Ross (NC-02), Mary Gay Scanlon (PA-05), Adam Smith (WA-9), Darren Soto (FL-09), Shri Thanedar (MI-13), Rashida Tlaib (MI-12), and Jill Tokuda (HI-02).

    The full text of the letter can be read here.

    Issues: Civil Rights, Immigration

    MIL OSI USA News

  • MIL-OSI USA: Sherrill Statement on the Widespread Famine in Gaza and the Deepening Humanitarian Crisis

    Source: United States House of Representatives – Congresswoman Mikie Sherrill (NJ-11)

    Washington, D.C. — Representative Mikie Sherrill (NJ-11) today issued the following statement urging President Trump and the Israeli government to take immediate action to ensure that aid reaches innocent civilians in Gaza:

    “I am deeply concerned by the famine and perilous security situation in Gaza. In February 2024, I went to the Rafah Crossing in Egypt and saw the backlog of aid trucks being kept out of Gaza. I took my concerns about keeping aid from reaching civilians directly to Prime Minister Netanyahu and President Biden. Restricting life saving aid from reaching civilians was as dangerous then as it is today. Failure to take immediate action now will lead to the deaths of thousands of innocent civilians, including women and children, and the perpetuation of the war. 

    “I was encouraged to see the announcement earlier this week that increased humanitarian aid would be allowed to enter Gaza, but it is not enough. The previous system of distributing aid through the Gaza Humanitarian Foundation was ineffective and directly led to the deaths of civilians at aid sites within days of beginning the operation. It needlessly endangered civilian lives. I immediately called on President Trump to work with the Israeli government and humanitarian organizations operating in Gaza to develop a safer method of delivery aid, but no action was taken. 

    “It is unacceptable that Hamas walked away from the last round of ceasefire negotiations and rejected the proposal agreed to by Israel, the U.S., Egypt, and Qatar. I again urge both parties to return to the negotiating table immediately to reach a ceasefire and bring the hostages home. But that alone will not lead to the end of this conflict. For that to happen, the human suffering must end.

    “It is past time that President Trump stands up for American values and works with the Israeli government to ensure that aid reaches the innocent civilians who desperately need it. Limiting the delivery of aid has only allowed Hamas and criminal gangs to exploit the situation. Ending the humanitarian crisis in Gaza is vital to maintaining America’s values, weakening Hamas’s support, and permanently ending the conflict.”

    ###

    MIL OSI USA News

  • MIL-OSI USA: IAM District 4 Wins Voluntary Recognition for Maryland Veterans Home Nurses

    Source: US GOIAM Union

    In a significant development for healthcare workers at Charlotte Hall Veterans Home in Maryland, PruittHealth, the management company that runs the Home, has voluntarily recognized IAM District 4 as the official bargaining representative for approximately 80 Registered Nurses (RNs) and Licensed Practical Nurses (LPNs) employed at the facility.

    The decision came on July 9, 2025, just days before a union election was scheduled to take place. 

    IAM District 4 Organizer Kevin Gallegher had been in the process of bringing the group to a vote before IAM Eastern Territory International Representative Andrew Hounshell and the company’s legal counsel cordially agreed that PruittHealth would forgo a union election process. The company would instead voluntarily recognize IAM Union representation of the nurses based on a majority showing of support for the union through signed authorization cards.

    The bargaining unit includes all full-time and regular part-time RNs and LPNs at the veterans home, excluding managerial and certain supervisory roles. 

    IAM District 4 already represents multiple groups of workers at Charlotte Hall Veterans Home, including non-professional and service-related staff. Initial IAM representation at the facility started with maintenance staff, but the successful relationship between IAM Union and Charlotte Hall Veterans Home allowed for the IAM’s representation to grow to cover the entire facility’s non-managerial employees.

    “I’m very excited to see my home shop become completely unionized,” said IAM District 4 Business Representative Bonna McCarthy, who previously won voluntary recognition of drivers and the laundry and housekeeping staff with the company. “I’ve always believed we’re stronger together than divided like we have been for the past eight years. I look forward to preparing for negotiations and getting a fair contract so that the nurses’ voices can be heard.”

    Because of its strong presence at Charlotte Hall and its commitment to uplifting and supporting veterans, the IAM Union has put significant effort into bettering the veterans home to benefit all: In 2022, the IAM installed a new entry sign at the home after completely renovating and upgrading the communal courtyard space, all made possible with funds raised by the 2021 IAM International President’s Capital Classic Golf Tournament

    Additionally, IAM Veterans Services conducted collections of household and comfort items at IAM headquarters for Charlotte Hall veterans during the holiday season, and the IAM’s Winpisinger Center staff, which includes Local 4 members, host veterans from the home for lunch multiple times a year.

    “The recognition demonstrates a cooperative approach by PruittHealth to respect workers’ choices and avoid prolonged labor disputes,” said IAM District 4 Directing Business Representative Jay Wadleigh. “We’re proud to represent the staff at Charlotte Hall Veterans Home. We’re proud of the work they do, and we’re proud of the mutually beneficial relationship we have with management that ultimately leads to happy staff and well-cared-for veterans.”

    IAM District 4 now looks forward to entering negotiations with McCarthy at the helm to secure a first contract that reflects the needs and priorities of these dedicated nurses and new union members.

    “IAM District 4 is a strong force for good in Southern Maryland,” said IAM Eastern Territory General Vice President David Sullivan. “Their solidarity and union pride is strong, and we are pleased to welcome the rest of Charlotte Hall Veterans Home staff into our union. These are caregivers of our veterans, and we intend to make all of their lives better through the IAM.”

    The post IAM District 4 Wins Voluntary Recognition for Maryland Veterans Home Nurses appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI Security: Ohio Fugitive Wanted for Rape of a Juvenile Arrested in Massachusetts

    Source: US Marshals Service

    Boston, MA – The U.S. Marshals Service (USMS), District of Massachusetts Fugitive Task Force (MAFTF) announces the arrest of Webster Portalatin-Castro, 37, who was wanted for rape of a person under the age of 18. The warrant was issued on June 3, 2025, from the Cleveland Municipal Court in Cleveland, OH.

    On Thursday, July 31st, 2025, Portalatin-Castro was arrested in Lawrence, MA for a warrant for rape of a juvenile. The Cleveland Police Department in Ohio requested the assistance of the USMS Northern Ohio Violent Fugitive Task Force (NOVFTF) with locating Portalatin-Castro.

    The NOVFTF and the Cleveland Police Department worked collaboratively and provided investigative information to the MAFTF, as Castro was believed to be in Massachusetts. The MAFTF along with significant assistance from the MA State Police Violent Fugitive Apprehension Section (VFAS), Lawrence PD, Lowell PD, and the Middlesex County Sheriff’s Office tracked down Portalatin-Castro to Lawrence, MA, where he was placed under arrest.

    Castro is being charged as a Fugitive from Justice and will be arraigned in Massachusetts pending his extradition back to Ohio.

    Portalatin-Castro is unlawfully present in the United States and according to ICE, he entered the country illegally in 2023.

    If you have any information regarding the whereabouts of any state or federal fugitive please contact the United States Marshals Service, contact the USMS at 1-877-WANTED2 or submit information via the USMS Tips App.

    MAFTF participants include the USMS District of MA, MA State Police, Boston Police, Brockton Police, Cambridge Police, Hampden County Sheriff’s Department, Haverhill Police, Lowell Police, Middlesex Sheriff’s Department, New Bedford Police, Plymouth County Sheriff’s Department, Springfield Police, Worcester Police, West Springfield Police, Suffolk County Sheriff’s Department, Randolph Police, Quincy Police and the Bureau of Alcohol, Tobacco, Firearms & Explosives.

    MIL Security OSI

  • MIL-OSI Security: Cleveland Fugitive, Illegal Alien, Wanted for Rape of a Minor Arrested in Boston

    Source: US Marshals Service

    Boston, MA – Earlier this morning, the U.S. Marshals Service (USMS), District of Massachusetts Fugitive Task Force (MAFTF) arrested Webster Portalatin-Castro, 37, who was wanted for rape of a person under the age of 18. 

    The warrant was issued on June 3, 2025, from the Cleveland Municipal Court in Cleveland, OH. During the investigation into his whereabouts members of the Northern Ohio Violent Fugitive Task Force (NOVFTF) gathered information that Portalatin-Castro may have fled the Cleveland area and was possibly hiding near Boston, Massachusetts.

    Early this morning, The MAFTF along with significant assistance from the MA State Police Violent Fugitive Apprehension Section (VFAS), Lawrence PD, Lowell PD, and the Middlesex County Sheriff’s Office tracked Portalatin-Castro to an address in the 700 block of Haverhill St. in Lawrence, MA, where he was placed under arrest.  Lawrence is approximately 30 miles north of Boston. 

    Castro is being charged as a fugitive from justice and will be arraigned in Massachusetts pending his extradition back to Ohio. Additionally, Portalatin-Castro is unlawfully present in the United States and according to ICE, he entered the country illegally in 2023.  

    U.S. Marshal Pete Elliott stated, “The U.S. Marshals Service will track down violent sexual predators such as this whether they are in the city of Cleveland or have fled across the country.  There is nowhere for them to hide when the Marshals are looking for them.”

    Anyone with information concerning a wanted fugitive can contact the Northern Ohio Violent Fugitive Task Force at 1-866-4WANTED (1-866-492-6833), or you can submit a web tip. Reward money is available, and tipsters may remain anonymous.  Follow the U.S. Marshals on Twitter @USMSCleveland.

    The Northern Ohio Violent Fugitive Task Force – Cleveland Division is composed of the following federal, state and local agencies:  U.S. Marshals Service, Cleveland Police Department, Cuyahoga County Sheriff’s Office, Cuyahoga Metropolitan Housing Authority Police Department, Euclid Police Department, Ohio Adult Parole Authority, Ohio State Highway Patrol, Independence Police Department, Parma Police Department, Aurora Police Department, Solon Police Department, Cleveland RTA Police Department, Westlake Police Department, Bedford Police Department, Middleburg Heights Police Department, Newburgh Heights Police Department and the Metrohealth Police Department. 

    MIL Security OSI

  • MIL-OSI Security: President Trump Ends Unfair “De Minimis” Tariff Exemption, A Major Victory in Securing the Homeland

    Source: US Department of Homeland Security

    President Trump’s Executive Order empowers DHS to continue cracking down on smuggling and unfair trade practices

    WASHINGTON – President Trump signed an Executive Order suspending duty-free de minimis tariff exemptions for low-value shipments from all countries. His order empowers Homeland Security Secretary Kristi Noem to close this loophole which was used to avoid tariffs and smuggle deadly synthetic opioids like fentanyl into the United States.

    “For decades, bad actors have taken advantage of America’s de minimis process by smuggling in deadly narcotics, harmful products, and other contraband in hidden products,” said Department of Homeland Security Assistant Secretary Tricia McLaughlin. “This loophole led to the death of thousands of Americans, fueled the opioid crisis, and harmed U.S. consumers. This decision to end de minimis will save American lives, increase revenue, and protect the American consumer and entrepreneur.”

    Under the de minimis treatment, imported goods that are valued at or under $800 were exempt from tariff duties. Countries exploited this system to flood the American market with cheap goods that undercut American manufacturers and cost American jobs. This exemption also allowed drug cartels and other criminal organizations to smuggle drugs and other contraband into our country.

    Over the past decade the volume of de minimis shipments to the United States exploded, growing from 134 million shipments in 2015 to over 1.36 billion shipments in 2024. De minimis shipments accounted for 90% of all cargo seizures in FY 24. These shipments often broke the law with 98% of narcotics seized from cargo falling under the de minimis exemption, as well as 97% of counterfeit items seized.

    Now, thanks to President Trump’s Executive Order, this loophole is closed. U.S. Customs and Border Protection is empowered to enforce tariffs on these goods and can continue to protect the homeland from the smuggling of deadly synthetic opioids like fentanyl and counterfeit goods. This will save American lives, protect American jobs, and restore billions in lost revenue.

    # # #

    MIL Security OSI

  • MIL-OSI USA: VIDEO: Ricketts Fights for America’s Producers

    US Senate News:

    Source: United States Senator Pete Ricketts (Nebraska)

    WASHINGTON, D.C. – This week, during his weekly press call with Nebraska media, U.S. Senator Pete Ricketts (R-NE) discussed the One Big Beautiful Bill and his work to secure the future for those who feed and fuel America.

    Watch the video here.

    Agriculture is the heart and soul of what we do in Nebraska,” said Ricketts.  Family farms, ranches, and agri-businesses are the backbone of communities across our state.  The One Big Beautiful Bill helps producers today and lays the foundation for strong agricultural growth tomorrow. It grows our economy at home and will help gain new markets abroad.”

    TRANSCRIPT:

    Senator Ricketts: “Agriculture is the heart and soul of what we do in Nebraska. 

    “Family farms, ranches, and agri-businesses are the backbone of communities across Nebraska. 

    “The One Big Beautiful Bill helps producers today and lays the foundation for strong agricultural growth tomorrow.  

    “It grows our economy at home and will help gain new markets abroad. 

    “The One Big Beautiful Bill (OBBB) secures the future for those who feed and fuel America—and the world.  

    “The One Big Beautiful Bill backs our way of life. 

    “First of all, the bill avoided a $2,400 tax increase that would have hit the average Nebraska family. 

    “That’s $2,400 that Nebraskans can continue to spend on groceries, electric bills or to save for a family vacation.   

    “The bill also helps farmers plan for the next generation. 

    “Over 80% of Nebraska’s farms are family-owned. 

    “The 2017 Tax Cuts and Jobs Act cut in half the number of farm and ranch families that were going to be subject to the Death Tax. 

    “The Big Beautiful Bill ensures the Death Tax exemption will now be permanent and rise with inflation. 

    “This will ensure that over $200 billion in hard-earned family farm assets across the country will go to the next generation and not the government. 

    “Now, more farms will be passed down, not taxed away to Uncle Sam.  

    “The 45Z clean fuel production credit is another major win for Nebraska. 

    “Biofuels are a win for consumers who save money at the pump. 

    “It’s a win for the environment, because it helps clean up our environment, and it’s a win for our farmers and ranchers. 

    “Last year, Nebraskans saved $325 million using ethanol blends. 

    “Last time I fueled up at Hy-Vee with E10, I saved 55 cents per gallon. 

    “The 45Z credit boosts biofuel production and creates value for farmers and ranchers. 

    “It narrows eligible feedstock commodities to North America, protecting Nebraska farmers from foreign competition. 

    “Producers in Communist China should be prevented from receiving American tax subsidies. 

    “All of this boosts demand for row crops and renewable fuel production. 

    “That means more jobs and better prices. 

    “Nebraska’s 25 ethanol plants support 1,300 jobs and have a $6 billion impact. 

    “The credit gives investors the certainty they need to hire and expand. 

    “Nebraska agriculture feeds and fuels the world. 

    “When I was Governor, I led trade missions to places like Japan and Vietnam to build strong relationships between foreign importers and Nebraska producers. 

    “I launched an international trade council to discover new opportunities for overseas markets. 

    “Nebraska’s economy thrives when our producers can reach high-paying global markets. 

    “Recognizing this, the One Big Beautiful Bill strengthens the Supplemental Agricultural Trade Promotion Program. 

    “It provides $285 million annually to promote U.S. agricultural exports. 

    “It doubles funding for the Market Access Program and the Foreign Market Development program. 

    “That means more demand for Nebraska beef, corn, and soybeans abroad. 

    “Simply put, when agriculture thrives, so does the entire Nebraska economy. 

    “Maintaining current exports and opening up markets under the bill will help get better prices for their products for our producers.

    “The big beautiful bill gives critical support to young farmers and ranchers, as well, taking over the family business or starting out on their own.  

    “The Beginning Farmer and Rancher Development Benefit was extended from five years to ten years.  

    “That gives new producers access to critical risk management tools.   

    “The bill also supports educational access for rural students.   

    “It excludes agricultural assets from student financial aid calculations. 

    “That means farm kids will not be discriminated against when applying for financial aid.  

    “For young Nebraskans, the bill expands Pell Grant eligibility to short-term job training. 

    “That includes hands-on fields like welding, diesel tech, and irrigation systems. 

    “Now, a young Nebraskan in Scottsbluff, for example, can learn a trade and start working at places like Aulick Industries without piling up debt.  

    “The One Big Beautiful Bill helps Nebraska producers grow and reinvest. 

    “Full expensing is now permanent for property like tractors and other heavy machinery. 

    “A corn grower in Custer County will be able to fully write off a new, more efficient combine. 

    “Another provision in the bill boosts expensing for tools and equipment. 

    “This helps small businesses from welders to seed dealers invest to improve productivity. 

    “The Big Beautiful Bill gives producers needed updates to the farm safety net. 

    “Reference prices now reflect today’s markets. 

    “Drought aid under the Livestock Forage Program has been improved. 

    “Now, producers facing feed losses from grazing shortfalls will see faster relief. 

    “These updates give producers support, stability, and long-term certainty.  

    “Nebraska’s future depends on certainty for farmers, ranchers, and agri-business. 

    “The One Big Beautiful Bill supports agriculture today and protects the next generation of farmers and ranchers. 

    “That is how we keep producing the Good Life.” 

    MIL OSI USA News

  • MIL-OSI USA: 07.31.2025 Sen. Cruz Introduces Bill Safeguarding Schools From Influence by Foreign Adversaries

    US Senate News:

    Source: United States Senator for Texas Ted Cruz

    WASHINGTON, D.C. – U.S. Sens. Ted Cruz (R-Texas) and Cynthia Lummis (R-Wyo.) introduced the Transparency in Reporting of Adversarial Contributions to Education (TRACE) Act to enhance transparency for parents regarding foreign funding in K-12 schools.
    Sen. Cruz said, “The Chinese Communist Party spends vast resources to control what Americans see, hear, and ultimately think. Our foreign adversaries are actively targeting American educational institutions, and the TRACE Act will help protect our classrooms from foreign influence by providing parents with the transparency they deserve. I urge my colleagues to pass this legislation without delay.”
    Sen. Lummis said, “The Chinese Communist Party has spread its influence across American life, targeting our farmland, technology, and even school systems. Parents deserve peace of mind knowing their children are learning American values, not propaganda from our foreign adversaries. This legislation prioritizes transparency while protecting our children from harmful foreign agendas.”
    Companion legislation was introduced in the House by Rep. Aaron Bean (R-FL-04).
    Rep. Bean said, “American schools are for education, not espionage. We cannot allow our students—the future of our great nation—to be corrupted by foreign adversaries who are systematically and aggressively attempting to influence our nation’s K-12 schools. That’s why it’s crucial we parents understand the potential impact of foreign influence on our children’s classrooms and take concrete steps to prevent foreign nations from reaching America’s youth. I want to thank Senator Cruz for joining me in this critical effort and spearheading this legislation in the Senate.”
    This bill is supported by the Parents Defending Education Action and Heritage Action.
    Alfonso Aguilar, Director of Federal Affairs for Parents Defending Education Action said, “Senator Cruz’s TRACE Act is extremely necessary. Parents should know if a foreign government or entity is providing funding to their children’s schools, trying to influence what is taught to them or seeking to access important data and intellectual property. A 2023 investigation from our partner organization Defending Education uncovered Chinese Communist Party (CCP) influence in numerous public schools and school districts across the nation. Their research showed that entities with ties to the CCP such as the Confucius Institutes have provided curriculum content, funding and Chinese teachers to U.S. public schools. Disturbingly, they also found that the Chinese government efforts appeared to target school districts near over twenty American bases. Our investigation, however, only discovered some or the CCP’s growing involvement in our public schools. The TRACE Act would ensure that parents have a full and continuous accounting of China’s meddling in their children’s education.”
    Read the full text of the bill here.
    BACKGROUND
    The Transparency in Reporting of Adversarial Contributions to Education (TRACE) Act will:

    Require schools to allow parents the opportunity to review curriculum that has been provided by or purchased with foreign funds.
    Require that schools notify parents of any foreign contracts or financial transactions they partake in.
    Stipulate parents be notified of how many school employees are being compensated by another country or foreign adversary, and whether foreign nations have donated to the institution.

    Sen. Cruz first introduced this legislation in 2024.

    MIL OSI USA News

  • MIL-OSI USA: Kaine, Schumer, Shaheen, & Wyden Announce Intent to Challenge Trump’s Tariffs on Brazil

    US Senate News:

    Source: United States Senator for Virginia Tim Kaine

    WASHINGTON, D.C.—Today, U.S. Senator Tim Kaine (D-VA), Senate Minority Leader Chuck Schumer (D-NY), and U.S. Senators Jeanne Shaheen (D-NH) and Ron Wyden (D-OR) announced their intent to file privileged legislation to challenge President Donald Trump’s tariffs on goods from Brazil in response to steps Brazil is taking to hold friend of Trump and former Brazilian President Jair Bolsonaro accountable for attempting a coup. The additional tariffs announced by Trump will put the total Trump tariffs on Brazilian exports at 50 percent, raising costs for Americans on basic household goods.

    In an executive order issued yesterday, Trump invoked the International Emergency Economic Powers Act (IEEPA) to impose the tariffs. Any one senator can challenge the use of IEEPA with a privileged resolution, such as the one the lawmakers will file. That means the Senate will be required to vote on the legislation.

    “President Trump has no interest in lowering costs for the American people. If he did, he would not be imposing tariffs and starting senseless trade wars,” said the senators. “We’re particularly concerned about these tariffs on Brazil—which are being put into place to get the Brazilian Supreme Court to stop its prosecution of Trump’s longtime friend Jair Bolsonaro, Brazil’s former president who is facing criminal charges for inciting a violent coup. This is certainly not what tariffs are intended to be used for, and they will raise prices for Americans. That’s why we’ll be introducing legislation to challenge these reckless tariffs against Brazil.”

    Americans import more than $40 billion annually from Brazil, including nearly $2 billion’s worth of coffee. Trade between the U.S. and Brazil supports nearly 130,000 jobs in the U.S., and the U.S. actually has a trade surplus with Brazil. A trade war with Brazil would make life more expensive for Americans, harm both the American and Brazilian economies, and drive Brazil closer to China.

    Last week, Kaine and Shaheen led their colleagues in sending a letter to Trump urging him to end his threats of tariffs on Brazil.

    MIL OSI USA News

  • MIL-OSI USA: Kaine, Curtis, And Merkley Introduce Bipartisan Bill to Address Crimes in Brazilian Amazon and Strengthen Regional Stability

    US Senate News:

    Source: United States Senator for Virginia Tim Kaine

    WASHINGTON, D.C. – Today, U.S. Senators Tim Kaine (D-VA), John Curtis (R-UT), and Jeff Merkley (D-OR), senior members of the Senate Foreign Relations Subcommittee on the Western Hemisphere, introduced the Strengthening the Rule of Law in the Brazilian Amazon Act. The bipartisan legislation addresses crimes committed by transnational criminal organizations and drug trafficking groups, which are devastating communities in and around the Brazilian Amazon, upending the rule of law, and accelerating environmental degradation and deforestation. Violent deaths in the Brazilian Amazon are significantly higher than in other parts of the country. The bill would provide the U.S. government with more tools to support U.S.-Brazil efforts to address these crimes and prioritize identifying investment opportunities for U.S. companies in the Brazilian Amazon.

    “Addressing cartel violence and deforestation in the Brazilian Amazon is important to protecting our national security, promoting stability in the Western Hemisphere, and preserving the environment,” said Kaine, Ranking Member of the SFRC Subcommittee on the Western Hemisphere. “I’m proud to join with Senators Curtis and Merkley to introduce this bipartisan legislation to expand the United States’ role in cracking down on violence, forced displacement, and environmental degradation in the Amazon.”

    “Criminal networks thrive where the rule of law is weak—and when they do, both people and the planet suffer,” said Curtis, Chair of the SFRC Subcommittee on the Western Hemisphere. “This bill helps us partner with Brazil to crack down on lawlessness in the Amazon and support a model of conservation that is also rooted in economic opportunity.“

    “The Amazon provides sanctuary for countless wildlife, and the trees of this tropical forest support not only Brazil’s environment, but also the lungs of the planet,” said Merkley, a senior member of the Senate Foreign Relations Committee.?“As the impacts of climate chaos become deadlier and more frequent—threatening our health, planet, and future—the U.S. must support Brazil’s efforts to stand against the criminal and often violent efforts driving deforestation and environmental degradation in the Brazilian Amazon.”

    Specifically, the bipartisan Strengthening the Rule of Law in the Brazilian Amazon would:

    • Direct the U.S. Secretary of State, in coordination with other U.S. federal agencies, to prioritize supporting Brazil’s efforts to identify and disrupt transnational criminal networks committing environmental crimes.
    • Direct support to local communities and vulnerable areas in the Brazilian Amazon.
    • Recommend the U.S. International Development Finance Corporation (DFC) place an individual in Brazil responsible for identifying sustainable economic opportunities for U.S. businesses in the Brazilian Amazon.
    • Require the Secretary of State to submit a report to Congress regarding drivers of deforestation and environmental degradation in the Brazilian Amazon.
    • Advise the United States to encourage international financial institutions to prioritize promoting sustainable development in the Amazon and oppose loans or programs that would exacerbate environmental crimes in the region.

    Full text of the bill is available here.

    MIL OSI USA News

  • MIL-OSI USA News: ICYMI: “Trump nailed the biggest trade deal in American history and proved everyone wrong – again!”

    Source: US Whitehouse

    President Donald J. Trump’s trade deal with the European Union has been hailed as among the most consequential trade deals in history — securing massive investments, finally addressing the lopsided trade deficitsecuring new market access, and more.

    It’s just the latest example of just how wrong President Trump’s critics have been — a fact highlighted by the New York Post’s Miranda Devine in a new op-ed:

    “When President Trump nailed the biggest deal in history on Sunday with the European Union on trade, you could almost hear the sound of egg splattering all over the faces of experts across the Atlantic.

    Economists, Democrats and Never-Trumpers have confidently predicted economic doom and gloom, ever since the self-proclaimed Tariff Man declared April 2 as ‘Liberation Day,’ fulfilling his long-held personal theory that tariffs are key to economic wealth.

    Trade war! Recession! Stagflation! Skyrocketing inflation! Stock market crash!

    You name it, they predicted Trump’s tariffs would sink the economy.

    Trump was defying economic orthodoxy, so he just had to be wrong.

    But it’s turned out that the lofty group-thinkers were wrong, not that most of them will admit it.”

    Click here to read the full article.

    MIL OSI USA News

  • MIL-OSI USA: Attorney General Bonta Issues Consumer Alert Amid Increase in Reported Scams Targeting the Military Community

    Source: US State of California

    Thursday, July 31, 2025

    Contact: (916) 210-6000, agpressoffice@doj.ca.gov

    Does an offer seem too good to be true? Take a tactical pause to evaluate  

    OAKLAND — In recognition of Military Consumer Month, Attorney General Rob Bonta today issued a consumer alert to help protect California service members, veterans, and their family members from targeted common scams and fraud. The military community and their families are often targets for predatory scammers: According to the Federal Trade Commission, military consumers nationwide reported over 99,400 fraud complaints last year — an increase from 2023’s approximately 93,000 complaints — including 44,587 imposter scams that reportedly cost them and their families over $199 million.  

    “More and more often, service members, veterans, and their families are targets for predatory scammers promising everything from home loans to jobs, and continuing education. This is absolutely unacceptable. As part of our commitment to protect those who protect us, my office will continue to bring the full force of the law against those who seek to exploit California’s military community,” said Attorney General Bonta. “If you have fallen victim to a scam or suspect fraudulent activity, get help and share your story so that we can help your fellow service members. You can report fraud to your local military or civilian law enforcement agency, or to the California Department of Justice at oag.ca.gov/report.”

    Why is the Military Community Targeted? 

    Military service members, veterans, and their families are frequently targeted by scammers who want access to their pay and benefits, and who know that military members will often pay even fraudulent or over-stated debts to avoid security clearance issues or other disruptions to their military careers. In addition, the camaraderie that unites the military community is often exploited by impostors who claim to be veterans in attempts to perpetrate scams or access personal information for fraudulent purposes.   

    Common Scams Targeting the Military Community:

    Scammers use a variety of tactics to gain trust. Protect yourself by staying up to date on common military- and veteran-targeted scams. Beware of the following: 

    • Charity Scams: Just because a charity includes the word “veteran” in its name doesn’t mean that veterans are members of the group, or that veterans or their families will benefit from a donation. Scammers will use names that sound legitimate or those that mimic the names of well-known charities to create confusion. Take the time to make an informed decision and be wary of aggressive solicitations. Go to oag.ca.gov/charities, under the Resources & Tools section, and click on Registry Verification Search. If a charity is not listed, it should not be soliciting funds in California. If it is listed, you can view its financial reports, including the IRS Form 990 that the charity is required to file with DOJ’s Registry of Charitable Trusts.
    • Predatory Schools: The GI Bill and other military education programs offer you the chance to attend school and plan for your future, but for-profit schools sometimes target service members and veterans with false promises. Slow down and take the time you need to make the right decision. Predatory schools often use high-pressure sales tactics to try to get you to sign up. It’s important to ask for information about the programs, such as graduation rates, job placement, and graduate salary information. Offers that seem too good to be true generally are. Further, don’t forget that educational opportunities at the California Community Colleges, California State University, and University of California may be available to you. 
    • Home Loan Scams: Be aware of scammers that — through phone calls or fraudulent mailers — claim to be affiliated with the government, the Department of Veterans Affairs, or your home loan servicer. These fraudsters may attempt to convince you to agree to loan modifications, refinance your home, or make payments on your loans. Be cautious of any individual or lender that contacts you and asks you to pay fees upfront before receiving any services; tells you to cancel your mortgage payment and resend the funds elsewhere; tells you to make payments to someone other than your current loan servicer; or pressures you to sign papers you haven’t had a chance to read thoroughly or that you don’t understand — including asking you to sign over the title to your property. 
    • Identity Theft and Fraud: Some scammers will pretend to be from the Department of Defense, Department of Veterans Affairs, or other official organizations in order to get your personal information so that they can commit identity theft or fraud. Before you provide any information, always make sure a request is coming from an official organization by doing a quick search on the internet or consulting a trusted source to get the organization’s real contact information. Never trust the contact information given by the person that is asking for your personal information, as scammers often give out fake contact information. Be wary of letters and emails that have misspellings, look unprofessional, or send you to a non-government website for information or action, as these are almost always fake. Lastly, never give out your Social Security number to receive military or veteran discounts. Scammers often promise military or veteran discounts in order to obtain personal information. 
    • Job Scams: Service members looking for new career opportunities after leaving service are a target for scammers posting fictitious job listings with the goal of stealing their personal information and finances. Avoid becoming a victim of job scams by conducting thorough research on the company. Additionally, stick to well-known job search platforms and government career websites when looking for job opportunities. Remember, legitimate employers will never require you to pay fees for applications, interviews, or background checks. You should also look out for fake check scams, which occur when a scammer posing as an employer sends you a counterfeit check to deposit into your account. The scammer will then ask you to send a portion of the funds back to them or a third party, while letting you keep some as payment. Eventually, the bank reverses the fake check, leaving you stuck paying the money back to the bank. If something feels off or suspicious during the job search, trust your instincts and end communication immediately.
    • Pension Scams: Veterans ages 65 and over are targeted by scam financial advisers who try to persuade senior veterans to buy costly annuities or transfer their assets into trusts, or pay unnecessary and illegal fees for help with a veterans pension application. These “advisers” claim to help veterans qualify for Aid and Attendance or other veterans benefits, but may cause you to lose eligibility or access to pension, disability, or healthcare benefits. If you are interested in Aid and Attendance or other veterans benefits, you can get free help from your County Veterans Service Office here.
    • Affinity Fraud: Affinity scams target members of identifiable groups, including the military. The perpetrators are — or pretend to be — members of the targeted group, and use sales pitches that rely on group trust and loyalty. In the military community, this includes exploiting the trust that service members have for their fellow service members, and for veterans who previously served. Don’t make a significant purchase, or an investment decision, based on the salesperson’s supposed military service, or the claim that a business is military-friendly or endorsed by the Armed Forces. Take a tactical pause, and shop around for the best deal.
    • Debt Collection and Illegal Threats: Debt collectors may try to trick or scare service members into making payments on debts. It is illegal for debt collectors to do any of the following: revoke your security clearance; contact your command in order to collect a debt (unless they have your consent, given after the debt came due, to do so); discipline or demote you; or garnish your pay. If a debt collector is trying to collect a debt that you do not owe or have already paid, dispute the debt in writing. Tell the debt collector why you do not owe the debt, include copies of any evidence you have, and mail this dispute to the debt collector using registered mail so that you have proof that the collector received it — and make sure to keep copies of everything for yourself. If you dispute the debt within 30 days after the collector first contacted you, the collector must stop collection until it shows you written proof of the debt.
    • Rental Housing Scams: These scams target military personnel looking for housing near a base, especially prevalent during the Permanent Change of Station season. Scammers pretend to be real estate agents and post fake ads for rental properties on websites, sometimes promising military discounts and other incentives in order to get service members to send them money for fees and deposits upfront. If someone insists on receiving money or other payments before a property has been seen, it is likely a rental scam. Avoid wiring money to reserve apartments, and use your installation housing office or established property management companies to locate potential housing. 
    • Predatory Auto Sales and Financing: Car dealers located near military bases may try to lure service members with promises of special deals for military personnel. Often, these so-called deals conceal the terms of purchase for the vehicle and result in the service member drastically overpaying for both the vehicle and the cost of financing. For example, dealers may insist that military personnel will not qualify for financing unless they purchase overpriced and unnecessary add-ons. Other times, the dealer may tell a service member who just purchased a car that the initial financing fell through and insist on renegotiating for worse terms. You should not rely on oral promises, nor feel pressured to enter into any purchase, without first reading and understanding the contract. If you are looking to purchase a car, you should explore all of your options for financing — including by contacting your bank or credit union — before making a purchase.  

    Protect Yourself from Scams:  

    • Bring a battle buddy when making big decisions, and take a tactical pause: Take your time with big decisions and get advice. A business that pressures you to make a quick decision or to not talk with your family, friends, a military financial counselor, or an officer or NCO that you trust may be out to scam you.
    • Take advantage of free annual credit reports: You are entitled to one free credit report every year from each of the three national credit bureaus: Equifax, Experian and TransUnion. Your credit history contains information from financial institutions, utilities, landlords, insurers, and others. By checking your credit reports at least once a year, you can identify signs of identity theft, as well errors in your report that could be raising the cost of your credit. Order your free annual credit reports by phone, toll-free, at 1-877-322-8228, or online at www.annualcreditreport.com.
    • Place a Fraud Alert: If your identity is stolen, put a fraud alert on your credit report by contacting the three main credit reporting agencies: Equifax, Experian, and TransUnion. Also, consider requesting a credit freeze, which will restrict access to your credit file, making it difficult for identity thieves to open new accounts in your name. Report identity theft right away and get a recovery plan at identitytheft.gov. Additionally, file a police report with your local sheriff or police department and keep a copy for your records.
    • Report Suspicious Activity: Never give out personal information to a lender or servicer that contacts you out of the blue. If you are feeling unsure, hang up and call your loan servicer directly at the number that is listed on your mortgage statement. Report suspicious activity to the Office of the Attorney General at oag.ca.gov/report and file a complaint with the FTC at reportfraud.ftc.gov.
    • Protect your online information and accounts with strong passwords: Protect yourself by using different, unique passwords for each of your online accounts. Make sure that the passwords you use are at least eight characters, including a mix of letters, numbers, and symbols.
    • Check your credit card bills and bank statements often: Look for unauthorized charges, withdrawals, or unexpected bills, and report irregular activity to your bank as soon as you see it. If you notice that a bill didn’t arrive on time, it may mean that someone has changed the contact information on your account in order to hide fraudulent charges. Don’t share personal information: Be careful about what personal information you share, such as your address or financial information.
    • Sign up for the Enhanced Homeowner Notification Program: If you reside in Los Angeles County, you may sign up to receive mailed copies of documents recorded against your home, allowing you to review recorded real estate documents so you are aware of actions taken against your property.

    If you believe you have been the victim or target of a scam, immediately contact your local police department or reach out to your base legal office. For the legal office’s contact information, ask your command or visit to legalassistance.law.af.mil/. California National Guard personnel can also obtain legal help at calguard.ca.gov. You may also file a complaint with the Office of the Attorney General at oag.ca.gov/report. For additional information on military-targeted scams, visit our website at oag.ca.gov/consumers/general/military.

    # # #

    MIL OSI USA News

  • MIL-OSI Security: Hays man sentenced to 4 years in prison on gun charges

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    BILLINGS – A Hays man who possessed illegal firearms was sentenced today to 48 months in prison to be followed by 3 years of supervised release, U.S. Attorney Kurt Alme said.

    Wylon Alfred Plainfeather, 54, pleaded guilty in March 2025 to one count of possession of an unregistered firearm and one count of possession of an unregistered silencer.

    U.S. District Judge Susan P. Watters presided.

    The government alleged in court documents that on December 27, 2022, law enforcement officers responded to a Billings residence to search for a probationer. The probationer was not present, but officers searched the house and found three firearms in the basement.

    As law enforcement was preparing to leave the residence following the search, Plainfeather pulled into the driveway. He admitted owning all three guns and acknowledged one was a sawed-off shotgun and another, a .22 caliber rifle, had a tube on it. Plainfeather said he fired the gun with the tube and claimed it was not very effective at making it quieter. He said he got all the firearms from the reservation and that he traded for them. Law enforcement officers confirmed the firearms were in operable condition but not registered to Plainfeather (or anyone else) in the National Firearms Registration and Transfer Record (NFRTR).

    Assistant U.S. Attorney Kelsey Hendricks prosecuted the case. The investigation was conducted by the ATF, Montana Division of Criminal Investigation, and Montana Probation and Parole.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    XXX

    MIL Security OSI

  • MIL-OSI Security: D.C. Guard Tests Skills With Jamaican, Barbadian Forces

    Source: United States SOUTHERN COMMAND

    Soldiers from the District of Columbia National Guard; Jamaica Defence Force, or JDF; Jamaica National Reserve; and Barbados Defence Force Reserves recently participated in the Caribbean Regional Training Camp 2025, a joint exercise aimed at bolstering regional security, enhancing disaster response capabilities and strengthening interoperability among the participating nations.

    MIL Security OSI

  • MIL-OSI USA: ICYMI: Congressman Nathaniel Moran Joins NewsNation to Discuss Israel, Trade with Europe and China

    Source: Congressman Nathaniel Moran (R-TX-01)

    In case you missed it, Congressman Nathaniel Moran (TX-01) joined NewsNation’s Morning in America to weigh in on key national and international issues, including the humanitarian situation in Gaza, trade negotiations with the EU and China.

    Congressman Moran, a member of the House Ways and Means Committee and the House Select Committee on the Chinese Communist Party, offered the following remarks:

    On the Gaza humanitarian crisis and Israel’s responsibility:

    “I’m glad to see more is being done to address the humanitarian crisis in Gaza. But let’s not forget that the cause of this crisis is Hamas. Hamas is the aggressor and a terrorist organization. It could end this overnight by laying down its arms and choosing peace—but it won’t.”

    On President Trump’s Trade Talks with the EU:

    “President Trump is being very effective. He’s shown power and prowess on the world stage. Because he’s engaged, so many countries are coming to the table. We’re getting closer and closer to finalizing deals that prioritize fair and reciprocal trade.”

    On Treasury-Led Talks with China:

    “I’m glad to see the U.S. Treasury engaging China directly. But we must remember: China sees us as an adversary. Any agreement must include strong enforcement mechanisms—because they will try to circumvent the rules and cheat to their advantage.”

    Watch the full interview HERE.

    ###

    MIL OSI USA News

  • MIL-OSI Security: U.S. Marshals Arrest Fugitive Charged with Killing 3 During 2024 Block Party

    Source: US Marshals Service

    Philadelphia, PA – Members of the U.S. Marshals Eastern Pennsylvania Violent Crimes Fugitive Task Force arrested Amir Jones, 32, in the 4900 block of Kershaw Street in Philadelphia. Jones was wanted by the Philadelphia Police Department for 3 counts of homicide in relation to a July 21, 2024, mass shooting in the 1200 block of N. Alden Street. Three people were killed and six injured during a gun battle between two group of males that occurred during a neighborhood block party. On July 23rd, a warrant was issued for Amir Jones, and the case was delegated to the Marshal’s Fugitive Task Force. 

    At 6:00 a.m., investigators from the Marshals Fugitive Task Force in Philadelphia executed a search warrant at an apartment in the 4900 block of Kershaw Street where investigators believed Jones was hiding. Jones initially refused to comply with commands but after 30 minutes of negotiating, Jones surrendered without incident. 

    “High profile shootings will always garner U.S. Marshals Service attention. Be assured, our relentless pursuit of those involved never ceases until the perpetrators of these crimes are captured” said Eric Gartner, United States Marshal for the Eastern District of Pennsylvania.

    The Eastern Pennsylvania Violent Crimes Fugitive Task Force is a team of law enforcement officers led by U.S. Marshals in Philadelphia and the surrounding counties. The task force’s objective is to seek out and arrest violent crime fugitives. Membership agencies include the Philadelphia Police Department, Pennsylvania State Parole Officers, Pennsylvania State Police, Pennsylvania Attorney General Agents, Immigration Customs Enforcement, Chester Police Department, Bucks County Sheriff’s Office, and Delaware County Sheriff’s Office.

    MIL Security OSI

  • MIL-OSI Security: CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization

    Source: US Department of Homeland Security

    Summary

    The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement. The purpose of this advisory is to highlight identified cybersecurity issues, thereby informing security defenders in other organizations of potential similar issues and encouraging them to take proactive measures to enhance their cybersecurity posture. This advisory has been coordinated with the organization involved in the hunt engagement.

    In 2024, CISA led a proactive hunt engagement at a U.S. critical infrastructure organization with the support of USCG analysts. During hunts, CISA proactively searches for evidence of malicious activity or malicious cyber actor presence on customer networks. The organization invited CISA to conduct a proactive hunt to determine if an actor had been present in the organization’s environment. (Note: Henceforth, unless otherwise defined, “CISA” is used in this advisory to refer to the hunt team as an umbrella for both CISA and USCG analysts).

    During this engagement, CISA did not identify evidence of malicious cyber activity or actor presence on the organization’s network, but did identify cybersecurity risks, including:

    • Insufficient logging;
    • Insecurely stored credentials;
    • Shared local administrator (admin) credentials across many workstations;
    • Unrestricted remote access for local admin accounts;
    • Insufficient network segmentation configuration between IT and operational technology (OT) assets; and
    • Several device misconfigurations.

    In coordination with the organization where the hunt was conducted, CISA and USCG are sharing cybersecurity risk findings and associated mitigations to assist other critical infrastructure organizations with improving their cybersecurity posture. Recommendations are listed for each of CISA’s findings, as well as general practices to strengthen cybersecurity for OT environments. These mitigations align with CISA and the National Institute for Standards and Technology’s (NIST) Cross-Sector Cybersecurity Performance Goals (CPGs), and with mitigations provided in the USCG Cyber Command’s (CGCYBER) 2024 Cyber Trends and Insights in the Marine Environment (CTIME) Report.

    Although no malicious activity was identified during this engagement, critical infrastructure organizations are advised to review and implement the mitigations listed in this advisory to prevent potential compromises and better protect our national infrastructure. These mitigations include the following (listed in order of importance):

    • Do not store passwords or credentials in plaintext. Instead, use secure password and credential management solutions such as encrypted password vaults, managed service accounts, or built-in secure features of deployment tools.
      • Ensure that all credentials are encrypted both at rest and in transit. Implement strict access controls and regular audits to securely manage scripts or tools accessing credentials.
      • Use code reviews and automated scanning tools to detect and eliminate any instances of plaintext credentials on hosts or workstations.
      • Enforce the principle of least privilege, only granting users and processes the access necessary to perform their functions.
    • Avoid sharing local administrator account credentials. Instead, provision unique, complex passwords for each account using tools like Microsoft’s Local Administrator Password Solution (LAPS) that automate password management and rotation.
    • Enforce multifactor authentication (MFA) for all administrative access, including local and domain accounts, and for remote access methods such as Remote Desktop Protocol (RDP) and virtual private network (VPN) connections.
    • Implement and enforce strict policies to only use hardened bastion hosts isolated from IT networks equipped with phishing-resistant MFA to access industrial control systems (ICS)/OT networks, and ensure regular workstations (i.e., workstations used for accessing IT networks and applications) cannot be used to access ICS/OT networks.
    • Implement comprehensive (i.e., large coverage) and detailed logging across all systems, including workstations, servers, network devices, and security appliances.
      • Ensure logs capture information such as authentication attempts, command-line executions with arguments, and network connections.
      • Retain logs for an appropriate period to enable thorough historical analysis (adhering to organizational policies and compliance requirements) and aggregate logs in an out-of-band, centralized location, such as a security information event management (SIEM) tool, to protect them from tampering and facilitate efficient analysis.

    For more detailed mitigations addressing the identified cybersecurity risks, see the Mitigations section of this advisory.

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See Appendix: MITRE ATT&CK Tactics and Techniques for a table of potential activity mapped to MITRE ATT&CK tactics and techniques.

    Overview

    Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard (USCG) analysts (collectively referred to as CISA in this report) conducted a threat hunt engagement at a critical infrastructure organization in 2024. During this hunt, CISA proactively searched for evidence of malicious activity or the presence of a malicious cyber actor on the customer’s network using host, network, industrial control system (ICS), and commercial cloud and open-source analysis tools. CISA searched for evidence of activity by looking for specific exploitation tactics, techniques, and procedures (TTPs) and associated artifacts.

    While CISA did not find evidence of threat actor presence on the organization’s network, the team did identify several cybersecurity risks. These findings are listed below in order of risk. Technical details of each identified cyber risk are included, along with the potential impact from threat actor exploitation of each risk (recommendations for mitigating each risk are listed in the Mitigations section below).

    Several of these findings align with those observed during similar engagements conducted by US Coast Guard Cyber Command (CGCYBER), which are documented in their 2024 Cyber Trends and Insights in the Marine Environment (CTIME) report. The authoring agencies encourage critical infrastructure organizations to review the CTIME report to understand trends in the techniques/attack paths threat actors are using to compromise at-risk organizations, and what mitigations organizations should implement to prevent a successful attack.

    Key Findings

    Shared Local Admin Accounts with Non-Unique Passwords Stored as Plaintext

    Details: CISA identified a few local admin accounts with non-unique passwords; these accounts were shared across many hosts. The credentials for each account were stored plaintext in batch scripts. CISA discovered these authorized scripts were configured to create user accounts with local admin privileges and then set identical, non-expiring passwords—these passwords were stored in plaintext in the script. One script was configured to create an admin account (set with a password stored in the script in plaintext) and automatically add to the admin group. The account was set as the local admin account on many other hosts.

    Potential Impact: The storage of local admin credentials in plaintext scripts across numerous hosts increases the risk of widespread unauthorized access, and the usage of non-unique passwords facilitates lateral movement throughout the network. Malicious actors with access to workstations with either of these batch scripts could obtain the passwords for these local admin accounts by searching the filesystem for strings like net user /add, identifying scripts containing usernames and passwords [T1552.001], and accessing these accounts to move laterally.

    For example, during a controlled security validation exercise (with explicit permission from the customer), CISA used the credentials found in one of the scripts to log into its associated admin account locally on a workstation [T1078.003], and then establish a Remote Desktop Protocol (RDP) connection to another workstation [T1021.001]. This demonstrated that the credentials allowed local login to an admin account and enabled lateral movement to any workstation with the account. While using this account, the user had local admin privileges on many workstations. Upon initiating the RDP session, the system issued out a notification that another user was currently logged in and that continuing the session would disconnect the existing user, confirming that the account can be accessed remotely via RDP.

    The uniform use of local admin accounts with identical, non-expiring passwords across numerous hosts, coupled with the storage of these credentials in plaintext within accessible scripts, elevates the risk of unauthorized access and lateral movement throughout the network.

    With local admin access, malicious cyber actors can:

    • Modify existing accounts or create new accounts [T1098], potentially escalating privileges or maintaining persistent access.
    • Install malicious browser extensions on compromised systems [T1112].
    • Communicate with compromised systems using standard application layer protocols [T1071], which may bypass certain security monitoring tools.
    • Modify local policies to escalate privileges or disable security features [T1484].
    • Alter system configurations or install software that executes at startup [T1547], ensuring continued access and persistence.
    • Hijack the execution flow of applications to inject malicious code [T1574].

    The widespread distribution of plaintext credentials and the use of identical passwords across hosts increases the risk of unauthorized access throughout the network. This vulnerability heightens the potential for attackers to conduct unauthorized activities, which may impact the confidentiality, integrity, and availability of the organization’s assets.

    Note: This finding was associated with workstations only; servers and other devices were not affected.

    Insufficient Network Segmentation Configuration Between IT and Operational Technology Environments

    Details: While assessing interconnectivity between the customer’s IT and operational technology (OT) environments, CISA identified that the OT environment was not properly configured. Specifically, standard user accounts could directly access the supervisory control and data acquisition (SCADA) virtual local area network (VLAN) directly from IT hosts.

    First, CISA determined it was possible to establish a connection via port 21 from a user workstation in the IT network to a system within the SCADA VLAN. The test established that a network path was available, the remote host was reachable, the port was open and listening for connections, and that the port was directly accessible between the IT and SCADA VLANs, with misconfigured network-level restrictions—for example, firewalls or access control lists (ACLs)—blocking the Transmission Control Protocol (TCP) connection on the port. This test was conducted using a standard user account on a regular IT workstation without administrative privileges [T1078].

    Second, CISA discovered that the customer did not have sufficient secured bastion hosts dedicated for accessing SCADA and heating, ventilation, and air conditioning (HVAC) systems. A bastion host­—sometimes referred to as a jump box or jump server—is a specialized, highly secured system (often a server or dedicated workstation) that serves as the sole access point between a network segment (such as an internal IT network) and a protected internal network (like an OT or ICS environment). By inspecting and filtering all inbound and outbound traffic, a bastion host is designed to prevent unauthorized access and lateral movement, ensuring that only authenticated and authorized users can interact with internal systems. Though several hosts were designated as bastion hosts for remote access to SCADA and HVAC systems, they lacked the enhanced security configuration, dedicated monitoring, and specialized scrutiny expected of bastion hosts.

    Potential Impact: Insufficient OT network segmentation configuration, network access control (NAC), and the ability of a non-privileged user within the IT network to use their credentials to access the critical SCADA VLAN [T1078] presents a security and safety risk. Given that SCADA and HVAC systems control physical processes, compromises of these systems can have real-world consequences, including risks to personnel safety, infrastructure integrity, and equipment functionality.

    Malicious actors could further exploit potentially unsecured workstations with access to OT systems, and insufficient network segmentation configuration between IT and OT systems, in the following ways:

    • Use RDP or Secure Shell (SSH) protocols to move laterally from compromised IT workstations to OT systems [T1021.001] [T1021.004].
    • Execute commands and scripts using scripting languages like PowerShell to attack OT systems [T1059].
    • Map network connections to identify paths to OT systems [T1049].
    • Gather information about network configurations to plan attacks on OT systems [T1016].

    By exploiting these weaknesses, attackers can potentially gain unauthorized access to critical OT systems, manipulate physical processes, disrupt operations, and cause harm.

    Insufficient Log Retention and Implementation

    Details: CISA was unable to hunt for every MITRE ATT&CK® procedure in the scoped hunt plan partly because the organization’s event logging system was insufficient for this analysis. For example, Windows event logs from workstations were not being forwarded to the organization’s security information event management (SIEM), verbose command line auditing was not enabled (meaning command line arguments were not being captured in Event ID 4688), logging in the SIEM was not as comprehensive as required for the analysis, and log retention did not allow for a thorough analysis of historical activity.

    Potential Impact: The absence of comprehensive and detailed logs, along with a lack of an established baseline for normal network behavior, prevented CISA from performing thorough behavior and anomaly-based detection. This limitation hindered the ability to hunt for certain TTPs, such as living-off-the-land techniques, the use of valid accounts [T1078], and other TTPs used by sophisticated threat actors. Such techniques often do not produce discrete indicators of compromise or trigger alerts from antivirus software, intrusion detection systems (IDS), or endpoint detection and response (EDR) solutions. Further, the lack of workstation logs in the organization’s SIEM meant CISA could not analyze authentication events to identify anomalous activities, such as unauthorized access using local administrator credentials. This gap exposes networks to undetected lateral movement and unauthorized access.

    Insufficient logging can prevent the detection of malicious activity by hindering investigations, which makes detection of threat actors more challenging and leaves the network susceptible to undetected threats.

    Additional Findings

    Misconfigured sslFlags on a Production Server

    Details: CISA used PowerShell to examine the ApplicationHost.config file[1]—a central configuration file for Internet Information Services (IIS) that governs the behavior of the web server and its applications and websites—on a production IIS server. CISA observed an HTTPS binding configured with sslFlags==“0”, which keeps IIS in its legacy “one-certificate-per-IP” mode. This mode disables modern certificate-management features, and because mutual Transport Layer Security (TLS) (client-certificate authentication) must be enabled separately in “SSL Settings” or by adding , the binding leaves the client-certificate enforcement off by default, allowing any TLS client to complete the handshake anonymously. Moreover, sslFlags does not control protocol or cipher selection, so outdated protocols or weak cipher suites (e.g., SSL 3.0, TLS 1.0/1.1) may still be accepted unless Secure Channel (Schannel)[2] has been explicitly hardened.

    Potential Impact: The misconfigured sslFlags could enable threat actors to attempt an adversary-in-the-middle attack [T1557] to intercept credentials and data transmitted between clients and the IIS server. Malicious actors could also exploit vulnerabilities in older Secure Sockets Layer (SSL)/TLS protocols, as well as weak cipher suites, increasing the risk for protocol downgrade attacks in which an attacker forces the server and client to negotiate the use of weaker encryption standards [T1562.010]. This compromises the confidentiality and integrity of data transmitted over this channel. Furthermore, the absence of client certificate enforcement meant the server did not validate the identity of the connecting clients beyond the basic SSL/TLS handshake. This deficiency exposed the server to risks where unauthorized or malicious clients could impersonate legitimate users, potentially gaining access to sensitive resources without proper verification.

    Misconfigured Structured Query Language Connections on a Production Server

    Details: CISA reviewed machine.config file on a production server and identified that it was configured with a centralized database connection string, LocalSqlServer, for both profile and role providers. This configuration implies that, unless overridden in each application’s web.config files, every ASP.NET site on the server connects to the same Structured Query Language (SQL) Express or aspnetdb database and shares the same credentials context.

    Additionally, CISA identified that the machine.config file set the minRequiredPasswordLength to be less than 15 characters, which is CISA’s recommended password length.

    Potential Impact: Using a centralized database approach increases risk, as a single breach or misconfiguration in this central SQL database server can compromise all applications dependent on the server. This creates a single point of failure and could be exploited by attackers aiming to gain broad access to the system.

    Additionally, setting the minimum password length to any password under 15 characters is more vulnerable to various forms of brute-force attacks, such as password guessing [T1110.001], cracking [T1110.002], spraying [T1110.003], and credential stuffing [T1110.004]. If a threat actor successfully cracked these weak passwords, they could gain unauthorized access to user or application accounts and leverage vulnerabilities within applications to further escalate privileges, potentially leading to unauthorized access to the backend SQL Server databases. This could result in data breaches, data manipulation, or a loss of database integrity.

    Mitigations

    CISA and USCG recommend that critical infrastructure organizations implement the mitigations below to improve their organization’s cybersecurity posture. Recommendations to reduce cyber risk are listed for each of CISA’s findings during this engagement and are ordered starting from the highest to lowest importance for organizations to implement. CISA and USCG also include general practices to strengthen cybersecurity for OT environments that are not tied to specific findings.

    These mitigations align with the Cross-Sector Cybersecurity Performance Goals jointly developed by CISA and the National Institute for Standards and Technology (NIST). The Cybersecurity Performance Goals (CPGs) provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful TTPs. Visit CISA’s CPGs webpage for more information.

    Many of these mitigations also align with recommendations made by CGCYBER in their 2024 CTIME report. The report provides relevant information and lessons learned about cybersecurity risks gathered through operations similar to this threat hunt engagement, and best practices to mitigate these risks. Please see the 2024 CTIME report for additional recommendations for critical infrastructure organizations to implement to harden their environments against malicious activity.

    Implement Unique Credentials and Access Control Measures for Administrator Accounts

    • Provision unique and complex credentials for local administrator accounts [CPG 2.C] on all systems. Do not use shared or identical administrative credentials across systems. Ensure service accounts/machine accounts have passwords unique from all member user accounts.
      • For example, organizations can deploy Microsoft LAPS (see Microsoft Learn’s Windows LAPS Overview for more information) to ensure each machine has a unique, complex local administrator password; passwords are rotated automatically within Microsoft Active Directory, reducing the window of vulnerability; and that password retrieval is limited to authorized personnel only.
    • Require phishing-resistant multifactor authentication (MFA) [CPG 2.H] in addition to unique passwords for all administrative access, including local- and domain-level administrator accounts, RDP sessions, and VPN connections.
    • Use privileged access workstations (PAWs) dedicated solely for administrative tasks and isolate them from the internet and general network to reduce exposure to threats and lateral movement.
      • Harden PAWs by applying CIS Benchmarks: limit software to essential administrative functions, disable unnecessary services and ports, and ensure regular updates and patches.
      • Enforce strict access controls to restrict PAW access to authorized administrators only.
    • Conduct continuous auditing of privileged accounts by regularly collecting and analyzing logs of administrative activities, such as login attempts, command executions, and configuration changes [CPG 2.T].
      • Configure automated alerts for anomalous behaviors, including logins outside standard hours, access from unauthorized locations, and repeated failed logins.
      • Periodically review all administrator accounts to confirm the necessity and appropriateness of access levels; align these auditing practices with NIST SP 800-53 Rev. 5 Controls AU-2 (Auditable Events) and AU-12 (Audit Record Generation).
    • Apply the principle of least privilege by limiting administrative privileges to the minimum required for users to perform their roles [CPG 2.E].
      • Create individual administrative accounts with unique credentials and role-specific permissions and disable or rename built-in local administrator accounts to reduce common attack vectors.
      • Avoid using shared administrator accounts to improve accountability and auditability, and ensure administrators use standard accounts for non-administrative tasks to minimize credential exposure.
      • Implement Role-Based Access Control (RBAC) to assign permissions based on job functions, as aligned with NIST SP 800-53 Rev. 5 Control AC-5 (Separation of Duties).
    • Identify and remove unauthorized or unnecessary local administrator accounts, maintain oversight by documenting and tracking all authorized accounts, and enforce strict account management policies by restricting account creation privileges and implementing approval workflows for new administrator accounts.

    Securely Store and Manage Credentials

    • Purge credentials from the System Center Configuration Manager (SCCM). Review SCCM packages, task sequences, and scripts to ensure that no plaintext credentials are embedded, and update or remove any configurations that deploy scripts with plaintext credentials.
    • Do not store plaintext credentials in scripts. Instead, store credentials in a secure manner, such as with a credential/password manager or vault, or other privileged account management solution [CPG 2.L].
    • Use encrypted communication. If scripts must retrieve credentials at runtime, use encrypted channels and protocols (e.g., TLS 1.3) to communicate with secure credential stores. Ensure that credentials are not written to disk or exposed in logs.
    • Use unique local administrator passwords, such as by deploying Microsoft LAPS. Set appropriate permissions on Active Directory attributes used by LAPS (ms-MCS-AdmPwd and ms-MCS-AdmPwdExpirationTime) per Microsoft’s security recommendations.

    Establish Network Segmentation Between IT and OT Environments

    • Assess the existing network architecture to ensure effective segmentation between the IT and OT networks [CPG 2.F]—this process should evaluate both logical and physical segmentation, ensuring clear boundaries between IT and OT assets.
      • Use NIST SP 800-82 Rev. 3 (Guide to OT Security) and International Electrotechnical Commission (IEC) 62443 standards as guides for network segmentation best practices.
      • Network segmentation is essential for containing breaches within isolated segments and preventing them from spreading across networks. Depending on your environment, consider implementing the following segmentation:
        • Implement VLAN segmentation with inter-VLAN access controls.
        • Create separate VLANs for IT and OT systems, specifically isolating OT components such as SCADA systems from IT network VLANs.
        • Configure inter-VLAN access controls, including Layer 3 ACLs, to restrict traffic between IT and SCADA VLANs.
        • Deploy firewalls with application-layer filtering capabilities to monitor and control data flow between the VLANs, ensuring that only authorized protocols and devices can communicate across segments.
    • Implement a demilitarized zone (DMZ) between IT and OT environments to provide an additional security layer.
      • Position firewalls at both the IT-DMZ and OT-DMZ boundaries to filter traffic and enforce strict communication policies.
      • Configure the DMZ to act as an intermediary, with only essential communications permitted between IT and OT networks.
      • Ensure the DMZ hosts shared services (e.g., bastion hosts, jump servers, or data historians) that require limited interaction with both environments, with access controls and monitoring in place.
    • Consider a full network re-architecture if current segmentation methods cannot effectively separate IT and OT networks.
      • Collaborate with cybersecurity and network experts to design an architecture that meets ICS-specific security requirements—this redesign may involve transitioning to a micro-segmented or zero trust architecture, which includes strict identity verification for all users and devices attempting to access OT assets.[3]
    • Implement unidirectional gateways (data diodes) where appropriate to prevent bidirectional communication.
    • Keep network diagrams, configuration files, and asset inventories up to date.
    • Regularly test segmentation controls to validate their effectiveness in restricting unauthorized access by conducting penetration testing and security assessments.
      • Include simulated breach scenarios to confirm that segmentation contains threats within isolated zones.
      • Ensure compliance with NIST SP 800-53 Rev. 5 Control AC-4 (Information Flow Enforcement) to align segmentation measures with best practices for controlled information flow.

    Prevent Unauthorized Access via Port 21

    • Disable File Transfer Protocol (FTP) services on SCADA devices and servers if they are not required. Replace FTP with secure alternatives, such as SSH FTP (SFTP) or FTP over TLS/SSL (FTPS).
    • Block inbound and outbound FTP traffic on port 21 using firewalls and ACLs.
      • Implement restrictive ACL policies at network boundaries to control FTP access across all network layers.
      • As outlined in CIS Control 9.2 (Limit Unnecessary Ports, Protocols, and Services), close any unused ports to strengthen network defenses.
    • Implement IDS/Intrusion Prevention System (IPS) technologies to monitor traffic between the IT network and SCADA VLAN, use signature and anomaly detection, and integrate IDS/IPS with a SIEM system for centralized monitoring.
    • Enhance authentication and encryption mechanisms. Require MFA for SCADA access, use secure remote access technologies when necessary, securely encrypt communications (using protocols such as TLS 1.2 or higher, preferably TLS 1.3), and establish VPN tunnels to communicate between IT networks and SCADA systems.
    • Perform network traffic filtering and deep packet inspection.
      • Use SCADA-aware firewalls capable of understanding SCADA protocols and inspecting and filtering traffic at the application layer.
      • Only allowlist authorized protocols and command structures to SCADA operations. Use one-way communication devices to prevent data from flowing back into the SCADA network.

    Establish Secure Bastion Hosts for OT Network Access

    • Ensure bastion hosts are dedicated secure access points exclusively used to access the OT network and deployed as exclusive management gateways for all devices within a network.
      • Make bastion hosts the single access points for conducting all administrative tasks, system management, and configuration changes; this centralizes access control and ensures any interaction with the OT system passes through a rigorously monitored and secure environment, minimizing the potential for unauthorized access.
    • Do not allow staff to use bastion hosts as regular workstations.
      • Provide staff with separate workstations for accessing email, internet browsing, etc., on the IT network.
      • Establish and enforce policies that prohibit non-administrative activities on bastion hosts, ensuring they remain dedicated to OT network access.
    • Regularly audit and monitor bastion hosts to maintain security integrity, prevent unauthorized use, and quickly address any vulnerabilities or policy non-compliance.
    • Configure comprehensive logging of all activities on bastion hosts, including authentication attempts, command executions, configuration changes, and file transfers. Aggregate logs into a SIEM.
    • Isolate bastion hosts from the IT network; bastion hosts should reside in a separate security zone with restricted communication pathways (see CISA’s infographic on Layering Network Security Through Segmentation).
      • Deploy bastion hosts in a DMZ, imposing physical and logical isolation from other networks.
      • Configure firewalls between the IT network, bastion hosts, and the OT network, enforcing strict access control policies to allow only necessary traffic.
    • Ensure secure configuration and hardening of bastion hosts: Comply with NIST SP 800-123 and CIS Benchmarks and CNSSI 4009-2015, remove nonessential applications and services to reduce the attack surface, configure system settings to be secure, conduct effective patch management, enforce the principle of least functionality, and disable unused ports and protocols.
    • Implement access control policies: remove any access permissions to the OT network from IT workstations and ensure only bastion hosts have access to the OT network.
      • Implement NAC solutions to enforce policy-driven access control decisions based on device compliance and user authentication to provide dynamic access control and real-time visibility into the devices on the network.
    • Equip each bastion host with robust authentication mechanisms, including phishing resistant MFA [CPG 2.H], to verify the identity of users accessing the network.
      • Align with AAL3 as defined in NIST SP 800-63B. AAL3 requires hardware-based authenticators and proof of possession of cryptographic keys through secure authentication protocols.
    • Implement stringent access controls that restrict access to authorized personnel only using RBAC principles, ensuring that personnel can only access information and perform tasks pertinent to their roles and duties. This reduces the risk of internal threats or lateral movement and prevents unauthorized access.
    • Securely configure remote access tools, including by using secure protocols and disabling remote access tools on IT workstations to the OT network, enforcing that all remote access occurs through bastion hosts.
      • Disable insecure protocols like Telnet and unencrypted VNC to prevent interception and unauthorized access.
      • Log all remote access sessions and monitor for unauthorized or anomalous activities.

    Implement Comprehensive Logging, Log Retention, and Analysis

    • Implement comprehensive and verbose (i.e., detailed) logging across all systems, including workstations, servers, network devices, and security appliances [CPG 2.T].
      • Enable logging of critical events such as authentication attempts, command-line executions with command arguments (Event ID 4688), and network connections.
    • Aggregate logs in an out-of-band, centralized location [CPG 2.U] where adversaries cannot tamper with them, such as a dedicated SIEM, in order to facilitate behavior analytics, anomaly detection, and proactive threat hunting [CPG 2.T, 2.U]. For more information on behavior- and anomaly-based detection techniques, see joint guidance Identifying and Mitigating Living off the Land.
    • Ensure comprehensive logging on bastion hosts for all activities. Capture detailed records of login attempts [CPG 2.G], commands executed (with command arguments enabled), configurations changed, and files transferred.
    • Continuously monitor logs for early detection of anomalous activities. Configure the SIEM to generate automatic alerts for suspicious activity and implement behavior analysis techniques to detect anomalies.
    • Securely store log backups and use tamper resistant storage [CPG 2.U] to prevent a threat actor from altering or purging logs to conceal malicious activity.

    For additional guidance on logging, see joint guidance Best Practices for Event Logging and Threat Detection.

    Securely Configure HTTPS Bindings and LocalSqlServer Connection String

    • Enforce both client certificate verification and secure renegotiation in IIS by configuring the sslFlags setting to “3” in the ApplicationHost.config file. Setting sslFlags=“3” requires clients to present valid X.509 certificates for authentication and implements the TLS Renegotiation Indication Extension (RFC 5746). To implement this, perform the following steps:
      • Locate the element for the HTTPS site within ApplicationHost.config.
      • Set the sslFlags attribute to “3”: .
      • Restart IIS to apply the changes: iisreset.
    • Restrict the server to use only secure and up-to-date SSL/TLS protocols and cipher suites.
      • Disable deprecated protocols like SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 to prevent protocol downgrade attacks that compromise the confidentiality and integrity of data.
    • Override the global settings in machine.config by modifying each application’s web.config file to define its own connection strings and providers. This isolates applications at the database level and allows for tailored security configurations for each application.
    • Create dedicated SQL Server database accounts for each application with permissions limited to necessary operations (e.g., SELECT, INSERT, UPDATE), and avoid granting excessive privileges.
      • Do not assign roles like db_owner or sysadmin to application accounts. This reduces the risk of privilege escalation and enhances accountability through segregated access logs.
    • Use machine.config only for configurations that must be applied globally across all applications on the server.
      • Audit the machine.config file to ensure no application-specific settings are present.

    Enforce Strong Password Policies

    • Implement a system-enforced policy that requires a minimum password length of 15 or more characters for all password-protected IT assets and all OT assets, when technically feasible [CPG 2.B].
      • Consider leveraging passphrases and password managers to make it easier for users to maintain sufficiently long passwords.
    • In instances where minimum password lengths are not technically feasible, apply and record compensating controls, such as rate-limiting login attempts, account lockout thresholds, and strong network segmentation. Prioritize these systems for upgrade or replacement.
    • Implement MFA [CPG 2.H] in addition to strong passwords (i.e., passwords 15 characters or longer).

    Additional Mitigation Recommendations to Strengthen Cybersecurity

    CISA and USCG recommend critical infrastructure organizations implement the following additional mitigations (not tied to specific findings from the engagement) to improve the cybersecurity of their IT and OT environments:

    • Secure RDP from the IT to OT environments by deploying dedicated VPNs for all remote interactions with the OT network. Using RDP without strong authentication practices can lead to credential theft. Additionally, RDP does not inherently segregate or closely monitor user sessions, which can allow a compromised session to affect other parts of the network.
      • Deploy VPNs with strong encryption protocols such as SSL/TLS or Internet Protocol Security (IPsec) [CPG 2.K] to safeguard data integrity and confidentiality; use MFA [CPG 2.H] at all VPN access points to ensure only authorized personnel can gain access.
      • Configure VPN gateways to perform rigorous security checks and manage traffic destined for the OT network, ensuring comprehensive validation of all communications through pre-defined security policies.
        • VPN gateways should function as the primary enforcement points for access controls, scrutinizing every data packet to detect and block unauthorized access attempts.
      • Align the VPN traffic monitoring with the DMZ’s capabilities to regulate and inspect the data flow between IT and OT environments.
      • As part of the broader network architecture review, ensure the VPN infrastructure is correctly segmented from other network resources [CPG 2.F] to prevent any spillover effects from the IT environment to the OT network, containing potential breaches within isolated network zones.
      • Within the VPN configuration, enforce strict routing rules that require all remote access requests to pass through the DMZ and be authenticated by bastion hosts. This minimizes the risk of unauthorized access and ensures that all remote interactions with the OT network are monitored and controlled.
    • If wireless technology is employed within the OT environment, implement Wi-fi Protected Access 3 (WPA3)-Enterprise encryption with strong authentication protocols like Extensible Authentication Protocol (EAP)-TLS to ensure data confidentiality and integrity.
      • Deploy and continuously monitor Wireless Intrusion Prevention Systems (WIPS) to detect, prevent, and respond to unauthorized access attempts and anomalous activities within the wireless network infrastructure.
      • Disable unnecessary features like Service Set Identifier (SSID) broadcasting and peer-to-peer networking, enable Media Access Control (MAC) filtering as an additional layer, and keep wireless firmware updated.

    Validate Security Controls

    In addition to applying mitigations, CISA and USCG recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA and USCG recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 9).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program—including people, processes, and technologies—based on the data generated by this process.

    CISA and USCG recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Contact Information

    Critical infrastructure organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

    Additional Resources

    For more information on improving cyber hygiene for critical infrastructure IT and OT environments, please see the following additional resources authored by CISA, CGCYBER, and international partners:

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. CISA and USCG do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and USCG.

    Version History

    July 31, 2025: Initial version.

    Appendix: MITRE ATT&CK Tactics and Techniques

    See Table 1 to Table 9 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 1: Initial Access
    Technique Title ID Use
    Valid Accounts T1078 Malicious actors could use access to valid accounts for access to IT and OT networks.
    Valid Accounts: Local Accounts T1078.003 Threat actors could use credentials obtained for local administrator accounts to gain administrator access to workstations or services that use the account.
    Account Manipulation T1098 Malicious actors could modify existing accounts or create new accounts to maintain access or escalate privileges. 
    Table 2: Execution
    Technique Title ID Use
    Command and Scripting Interpreter  T1059 Malicious actors could use script interpreters like PowerShell to execute commands and scripts. 
    Table 3: Persistence
    Technique Title ID Use
    Boot or Autostart Execution T1547 Malicious actors could configure autostart execution paths to ensure persistence.
    Hijack Execution Flow T1574 Malicious actors could hijack the execution flow of applications and inject malicious code.
    Table 4: Privilege Escalation
    Technique Title ID Use
    Domain or Tenant Policy Modification T1484 Malicious actors could modify domain policies to escalate privileges or evade defenses.
    Table 5: Defense Evasion
    Technique Title ID Use
    Modify Registry T1112 Malicious actors could install malicious browser extensions on compromised systems.
    Impair Defenses: Downgrade Attack T1562.010 Malicious actors could exploit vulnerabilities in older systems to force a downgrade to a less secure mode of operation.
    Table 6: Credential Access
    Technique Title ID Use
    Unsecured Credentials: Credentials in Files T1552.001 Malicious actors could search for and exploit credentials stored in unsecured files. 
    OS Credential Dumping T1003 Malicious actors could extract credentials from memory or storage from unsecured workstations.
    Adversary-in-the-Middle T1557 Malicious actors could position themselves between networked devices to intercept credentials and other data. 
    Brute Force: Password Guessing T1110.001 Malicious actors could systematically guess possible passwords.
    Brute Force: Password Cracking T1110.002 Malicious actors could recover plaintext credentials after obtaining password hashes or other similar credential material.
    Brute Force: Password Spraying T1110.003 Malicious actors could attempt to use a common password against different accounts to try to obtain account access. 
    Brute Force: Credential Stuffing T1110.004 Malicious actors could try to use credentials gained from an unrelated account to gain access to a desired account in the victim’s environment. 
    Table 7: Discovery
    Technique Title ID Use
    System Network Connections Discovery T1049 Malicious actors could map network connections to identify paths to OT systems from an unsecured IT workstation with access to the OT network. 
    System Network Configuration Discovery T1016 Malicious actors could use an unsecured workstation to discover network configurations.
    Table 8: Lateral Movement
    Technique Title ID Use
    Remote Services: Remote Desktop Protocol T1021.001 Malicious actors could use valid credentials to establish an RDP connection to access a workstation. 
    Remote Services: SSH T1021.004 Malicious actors could use valid accounts to establish an SSH connection to a workstation.
    Table 9: Command and Control
    Technique Title ID Use
    Application Layer Protocol T1071 Malicious actors could use application layer protocols to communicate with systems they compromised while blending in with existing network traffic. 

    MIL Security OSI

  • MIL-OSI USA: Congressman Jonathan L. Jackson Commemorates the Illustrious Career of Congressman Danny Davis

    Source: United States House of Representatives – Representative Jonathan Jackson – Illinois (1st District)

    FOR IMMEDIATE RELEASE

    Congressman Jonathan L. Jackson Commemorates the Illustrious Career of Congressman Danny Davis

    WASHINGTON, D.C. – Congressman Jonathan L. Jackson today issued the following statement regarding Congressman Danny Davis’s announcement that he will not seek reelection, marking the conclusion of a truly remarkable career in public service:

    “It is with profound respect and admiration that we acknowledge the impending retirement of my esteemed colleague, Congressman Danny Davis. For decades, Congressman Davis has served the people of Illinois’ 7th Congressional District with unparalleled dedication, embodying a spirit of advocacy that deeply mirrors the African experience of perseverance and progress.

    Chicago is fortunate to call Danny Davis our very own. His journey, beginning in a one-room schoolhouse in Arkansas, is a testament to his extraordinary grit and determination. Rising from such humble beginnings to earn a Ph.D. and become a revered legislator in the halls of Congress, his story is an inspiration to us all. He holds the unique distinction as the only Black person from Arkansas to be in Congress, a powerful symbol of breaking barriers and achieving the impossible.

    Congressman Davis has consistently been a champion for civil rights, affordable housing, prison reentry, and healthcare. His unwavering commitment to his constituents has made him a highest vote getter time and again, reflecting the deep trust and affection he has earned from those he serves. He carries a profound legacy of greatness, built on tireless work and a genuine desire to uplift communities.

    Beyond his legislative achievements, Congressman Davis has always conducted himself with immense grace and undeniable charm. He has been a mentor, a leader, and a beacon of hope for countless individuals. His presence in Congress will be deeply missed, but his impact will resonate for generations.

    We extend our deepest gratitude to Congressman Davis for his exceptional service and wish him all the best in his well-deserved retirement. His contributions to our nation and to the city of Chicago are indelible.”

    ###

    MIL OSI USA News

  • MIL-OSI USA: Sens. Budd, Heinrich Introduce Amendment to Crack Down on Illicit Anti-Obesity Drugs Entering the U.S. from China

    US Senate News:

    Source: United States Senator Ted Budd (R-North Carolina)

    Bipartisan amendment would help ensure FDA can utilize existing statutory authority to protect Americans from counterfeit, unapproved drugs from unregistered facilities in China

    Washington, D.C. — U.S. Senators Ted Budd (R-N.C.) and Martin Heinrich (D-N.M.) recently introduced an amendment to the 2026 Agriculture, Rural Development, Food and Drug Administration, and Related Agencies Appropriations Act to ensure the Food and Drug Administration (FDA) can activate regulatory and enforcement authorities to prevent the importation of illicit weight loss drugs and Active Pharmaceutical Ingredients (API) from the Republic of China and other foreign countries.

    These illicit products, which include unregulated versions of ingredients used in name-brand GLP-1 medicines, are often produced in facilities in China that are not always registered with the FDA and pose serious risks to American consumers, with sometimes fatal consequences.

    “The Chinese Communist Party has proven time and again that it is willing to exploit our supply chain and endanger American lives to advance its own interests,” said Senator Budd. “That includes flooding our country with counterfeit, unapproved weight-loss drugs made in unregulated facilities. It is critically important that the United States maintains the gold standard for safe, effective medicines and we must act decisively to protect American patients. I am glad to partner with Senator Heinrich on this important issue, and I look forward to working with Commissioner Makary and Secretary Kennedy to help ensure the FDA can shut the door on these dangerous products at our borders and hold bad actors accountable.”

    “We have a responsibility to protect Americans from dangerous, counterfeit drugs entering our country,” said Senator Heinrich. “Too many of these unapproved weight-loss drugs are being produced in unregistered facilities in China with no oversight and no regard for safety. That’s why I’m introducing bipartisan legislation with Senator Budd to ensure the FDA can crack down on these illicit imports and keep American consumers safe.”

    BACKGROUND

    A recent Federal Bureau of Investigation (FBI) public service announcement warned that counterfeit weight loss products have been found to contain both “drugs with high levels of impurities” and “unsafe or unapproved drugs” with misbranded or adulterated packaging. To protect America’s supply chain from these potential threats, actions from the FDA may include refusing the entry of illicit drugs and API, issuing warning letters to foreign suppliers, and initiating civil enforcement actions.

    This amendment follows a bipartisan letter Representative Richard Hudson (R-N.C.-09) led in sending to FDA Commissioner Marty Makary, which urged immediate action against the rising threat of illegal, counterfeit anti-obesity medications entering the United States.

    MIL OSI USA News

  • MIL-OSI USA: Lee Introduces Protecting American Jobs Act

    US Senate News:

    Source: United States Senator for Utah Mike Lee

    WASHINGTON – U.S. Senator Mike Lee (R-UT) introduced legislation today to ensure unbiased due process for American workers and businesses in labor practice complaints. The Protecting American Jobs Act blocks the National Labor Relations Board (NLRB) from prosecuting and adjudicating cases – returning adjudicatory power to the U.S. Courts where it belongs and eliminating biased court decisions.

    “Business disputes should be given a fair trial – not biased decisions from federal bureaucrats cosplaying as judges,” said Senator Mike Lee. “The NLRB should never be allowed to adjudicate the very cases it is prosecuting. My legislation will restore the right to a fair trial for workers and businesses as outlined by the Constitution, providing them due process and protection from biased bureaucrats.” 

    Background:

    The National Labor Relations Board (NLRB) currently investigates and adjudicates union representation disputes, unfair labor practice complaints, and contract disputes with federal court review only allowed in limited circumstances. This means that the NLRB acts as investigator, prosecutor, and judge with an unelected and unaccountable membership that turns over every few years – a structure poorly suited to ensure due process for either employees or employers. This bureaucratic and political mess results in delayed complaint resolutions, a damaged economy, and stalled business decisions which in turn stunt job growth.

    Congress should return the adjudicatory functions of the NLRB to the U.S. Courts as designed by the Constitution and revoke the Board’s power to prosecute unfair labor practice charges. Under this system, victims of unfair labor practices could still bring forth complaints for the NLRB to investigate, but the power to hear and adjudicate complaint cases would remain with the U.S. Court system, as in the adjudication of all other disputes between private parties. 

    Removing the influence of a politically charged federal agency would remove the “thumb on the scale” in these proceedings, providing both workers and businesses with a simplified and unbiased method for resolving disputes and a consistent set of regulations to follow.

    The Protecting American Jobs Act:

    • Removes the NLRB General Counsel’s power to issue complaints related to unfair labor practices.
    • Limits the Board’s rulemaking authority to rules concerning the internal functions of the Board.
    • Removes the Board’s power to bring charges of unfair labor practices and to adjudicate those charges and instead provides the Board with the authority to investigate unfair labor practices.
    • Moves relief of unfair labor practices to the courts where an aggrieved party may bring a civil action.
    • Requires the NLRB to review and revise its regulations to comply with these changes.

    MIL OSI USA News

  • Trump wants deal to end Russia’s war in Ukraine by August 8, US tells UN

    Source: Government of India

    Source: Government of India (4)

    U.S. President Donald Trump has made clear that he wants a deal to end Russia’s war in Ukraine by August 8, the United States told the United Nations Security Council on Thursday.

    “Both Russia and Ukraine must negotiate a ceasefire and durable peace. It is time to make a deal. President Trump has made clear this must be done by August 8. The United States is prepared to implement additional measures to secure peace,” senior U.S. diplomat John Kelley told the 15-member council.

    Trump said on Tuesday that the United States would start imposing tariffs and other measures on Russia “10 days from today” if Moscow showed no progress toward ending its war in Ukraine.

    Kyiv and Moscow have held three rounds of talks in Istanbul this year that yielded exchanges of prisoners and bodies, but no breakthrough to defuse the more than three-year conflict.

    “We intend to continue the negotiations in Istanbul,” Russia’s deputy U.N. Ambassador Dmitry Polyanskiy told the council, but he added: “Despite the meetings in Istanbul, in the West, the war party did not go away … We continue hearing voices of those who think that diplomacy is just a way of criticizing Russia and exerting pressure on it.”

    Ukraine’s deputy U.N. Ambassador Khrystyna Hayovyshyn said Russia must be confronted with “unity, resolve and action.”

    “We seek a comprehensive, just and lasting peace grounded in the principles of the U.N. Charter and nothing less. We repeat – a full, immediate and unconditional ceasefire is essential. It is the first step to halting Russia’s war of aggression against Ukraine,” she told the council.

    (Reuters)

  • MIL-OSI USA: LEADER JEFFRIES STATEMENT ONRETIREMENT ANNOUNCEMENT OFREP. DANNY DAVIS

    Source: United States House of Representatives – Congressman Hakeem Jeffries (8th District of New York)

    Today, Democratic Leader Hakeem Jeffries released the following statement after Congressman Danny Davis announced he would not seek another term in the House of Representatives:

    Throughout his historic career as an educator and community organizer and later as a distinguished public servant, Congressman Davis has never wavered in his commitment to serving those back home. Whether on the Cook County Board of Commissioners, the Chicago City Council or in the United States Congress, Congressman Davis has been a tremendous champion for racial, social and economic justice and a fierce fighter for the people he is privileged to represent in Chicago. 

    For more than three decades in the Congress, including as a Member of the exclusive Ways and Means Committee and the top Democrat on the Worker and Family Support Subcommittee, Danny has worked to ensure our tax code lifts up the least, lost and left-behind in Chicago and across our nation. He introduced and ushered through the transformative Second Chance Act to help returning citizens with services to rebuild their futures. Danny has been a co-chair and leader of the Congressional Caucus on Black Men and Boys where he advocated for solutions to systemic racism, police brutality and income inequality.  

    Danny forged a remarkable legacy and made clear his commitment to public service. The House Democratic Caucus family will miss Danny deeply and wish him and his family the best in this next chapter. 

    ###

    MIL OSI USA News

  • MIL-OSI USA: Early-Career Spotlight: From Astrophysics to Applied Artificial Intelligence, Hilary Egan Charts a Creative Path Through Science

    Source: US National Renewable Energy Laboratory


    Welcome to the Materials, Chemical, and Computational Science (MCCS) Early-Career Spotlight, a monthly feature showcasing NREL’s early-career researchers’ interests, motivations, and achievements. This month, features Hilary Egan, who has been a data scientist at NREL since 2020.

    When not in the lab solving AI problems, Hilary Egan enjoys outdoor activities like paddleboarding, climbing, and biking. Photo by Hilary Egan, NREL

    For Hilary Egan, a data scientist at NREL, a career in science was not a straight line but rather one shaped by curiosity, adaptability, and a deep interest in computational problem-solving.

    “I was born in Germany to Canadian parents, and we moved around a lot throughout Canada and the United States,” Egan said. “When it came time for college, I landed at Michigan State University, majoring in physics with minors in math and computer science. I dabbled in experimental physics and worked in a laser lab early on, but honestly, I was a little too clumsy for it. I wanted something that connected all my interests.”

    That desire to connect the dots led Egan to computational physics, where she found her stride.

    “I started working at the high-performance computing center on campus and eventually joined an astronomy lab doing computational research—I absolutely loved it,” she said. That experience inspired her to pursue a Ph.D. in astrophysics and planetary science at the University of Colorado Boulder, with a strong focus on computation.

    From Fellowship to National Laboratory Career

    Egan’s graduate work was supported by the U.S. Department of Energy Computational Science Graduate Fellowship, a pivotal experience that introduced her to the national laboratory system.

    “Through the fellowship, I had the opportunity to intern at NREL. I wanted to challenge myself and get outside my comfort zone, and NREL’s mission really resonated with me,” she said. “I was also curious about artificial intelligence (AI), which was just starting to gain momentum. During my internship, I worked on using AI to predict data center loads and align them with renewable energy availability. It was a great experience, and I was lucky to come back to NREL after finishing my Ph.D. I’ve been here ever since.”

    Today, Egan applies her expertise in AI and computational science to a wide range of energy challenges.

    “My work spans applied AI and computational methods across NREL’s mission space—from enhancing energy efficiency in data centers to using AI to accelerate building retrofits to developing autonomous laboratory systems,” she said.

    This year, she is on detail to the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy, where she is helping coordinate an agencywide AI strategy.

    Embracing Growth, in Science and Beyond

    What Egan enjoys most about her work is the constant opportunity to learn.

    “I love getting to be a bit of a scientific dilettante,” she said. “I wasn’t interested in narrowing my focus to one small corner of science for my entire career. At NREL, I get to explore new areas and work with incredibly smart, passionate people who care deeply about the mission. It’s really inspiring.”

    Egan credits strong communication skills as one of the most valuable tools in her professional toolkit.

    “To me, scientific communication means understanding your audience, writing clearly, and giving compelling presentations,” she said. “I’ve developed those skills through everything from taking writing-focused liberal arts courses in college to writing science blogs and even doing community theater. Getting feedback from different audiences is key—it teaches you where the message isn’t landing and why.”

    Outside the lab, Egan brings the same curiosity and enthusiasm to her free time.

    “I’m definitely a serial hobby picker-upper,” she said. “I love climbing, mountain biking, birding, and paddleboarding. I also read constantly, and I’ve spent years playing and coaching competitive ultimate frisbee. Lately, I’ve been sewing and just started pottery classes. I kind of run my free time like a kid at summer camp!”

    From astrophysics to AI-driven energy solutions, Egan exemplifies the spirit of scientific exploration and innovation that drives NREL forward.

    Learn more about NREL’s computational science and AI research.

    MIL OSI USA News

  • MIL-OSI Security: Drug Trafficker Sentenced to More Than 15 Years for Trafficking Methamphetamine

    Source: US FBI

    Jacksonville, Florida – U.S. District Judge Wendy W. Berger has sentenced Kevin Ray Marcano (37, Cambridge, MA) to 15 years and 8 months in federal prison for conspiracy to distribute controlled substances, specifically 500 grams or more of a mixture and substance containing methamphetamine. Marcano pleaded guilty on April 22, 2025. 

    According to court documents, in March 2022, Marcano began supplying methamphetamine across the country by shipping multi-pound packages to known customers, including an individual in Jacksonville. From March 2022 to July 2023, Marcano sent approximately 5 packages each containing about 10 pounds of methamphetamine to the Jacksonville customer. In September 2023, the same individual called Marcano and ordered another shipment of four pounds of methamphetamine in exchange for $4,900. Within five days of placing the order from Marcano, the four-pound shipment of methamphetamine arrived.

    “This criminal was responsible to shipping large quantities of methamphetamine across the country, fueling addiction and poisoning communities far beyond his own,” said Homeland Security Investigations Jacksonville Assistant Special Agent in Charge Tim Hemker. “Thanks to the dedicated efforts of HSI and FBI special agents, this individual’s nationwide narcotics distribution network has been dismantled.”

    This case was investigated by the Federal Bureau of Investigation and Homeland Security Investigations. It was prosecuted by Assistant United States Attorney Kelly S. Milliron. 

    MIL Security OSI

  • MIL-OSI USA: Rep. Dan Goldman Convenes Section 8 & 9 Townhall to Discuss Trump Administration’s Threats to Affordable Housing

    Source: US Congressman Dan Goldman (NY-10)

    Goldman Joined by Representatives from NYCHA, NYC Housing Preservation and Development, and New York State Homes and Community Renewal  

     

    View a Recording of the Event Here 

    New York, NY – Congressman Dan Goldman (NY-10) hosted a Section 8 & 9 townhall at Grand St. Settlement to discuss how the Trump administration’s policies are affecting Section 8 and 9 housing in New York and help inform tenants on how city and state housing agencies may be impacted. The Congressman was joined by representatives from the New York City Housing Authority (NYCHA), New York City Housing Preservation and Development, and New York State Homes and Community Renewal. 

    “Programs like Section 8 and 9 are a vital lifeline for over one million New York residents who are already struggling to make ends meet, and as the Trump administration slashes funding and fires critical staff, I was proud to bring local officials together and give tenants a platform to ask questions and get answers,” Congressman Dan Goldman said. “With New York City set to remain in this administration’s cross-hairs, I will continue working at all levels of government to protect Section 8 and 9 tenants and ensure every single one has the safe, dignified, and affordable housing that they deserve.”  

    Since taking office, the Trump Administration has proposed sweeping changes to federal housing programs like Section 8 and Section 9 that would devastate low-income households. While they have not yet succeeded in enacting the most extreme policies, they’ve already caused serious harm, most notably by gutting HUD’s workforce by 30%. The administration’s budget proposals have called for drastic cuts to rental assistance, a two-year cap on support for able-bodied adults, and expanded work requirements that would jeopardize housing for thousands of working families, caregivers, and students. These changes, if implemented, would lead to mass evictions, overwhelming paperwork burdens, and a significant increase in homelessness—particularly in high-cost areas like New York City. Fortunately, Congress has so far rejected many of these proposals, but the threat remains real and ongoing. 

    In March, Goldman led 13 of his New York Delegation colleagues in sending a letter to Housing and Urban Development Secretary Scott Turner demanding that he reverse the Trump Administration’s decision to drastically reduce staffing at regional HUD field offices. The Administration’s “fork in the road” scheme and their potentially illegal firing of probationary workers had already left HUD field offices short-staffed and vulnerable. 

    ### 

    MIL OSI USA News

  • MIL-OSI USA: Rep. Dan Goldman’s Bipartisan Legislation Supporting Families of Fallen Law Enforcement Officers Passes Senate

    Source: US Congressman Dan Goldman (NY-10)

    Senate Adoption Tees Up Final Passage by the House in the Fall 

    ‘Chief Herbert D. Proffitt Act’ Ensures Those Who Give the Ultimate Sacrifice Are Not Unjustly Denied Benefits 

    Read the Bill Here 

    Washington, D.C. – Congressman Dan Goldman (NY-10) today celebrated the Senate’s passage of his bipartisan ‘Chief Herbert D. Proffitt Act,’ which would ensure the families of law enforcement officers who are killed as a result of their work on behalf of their communities are not unjustly denied benefits due to arbitrary retirement status restrictions. Under current law, families of officers who have retired but are later targeted and killed because of their past service are denied death benefits under the Public Safety Officers’ (PSOB) program. The unanimous Senate vote sets the legislation on a glide path to final passage by the House when members come back in session in September. Congressman Goldman introduced the legislation with Congressman Barr (KY-06) in February.  

    “We have an obligation to care for those who pay the ultimate price while serving in the line of duty, even after they have retired,” Congressman Dan Goldman said. “At a time when partisan gridlock is grinding Congress to a halt, I’m encouraged that both parties came together to pass this commonsense legislation honoring our fallen heroes. I urge Republican leadership to bring this bill to the House Floor in September and ensure that any law enforcement officers killed or injured in the line of duty receive the benefits they deserve—regardless of retirement status.” 

    Chief Herbert D. Proffitt dedicated his life to serving others, first as a U.S. Army veteran of the Korean War and then as a law enforcement officer for 55 years before retiring in 2009 as Chief of the Tompkinsville, Kentucky Police Department. On August 28, 2012, Chief Proffitt was tragically shot and killed in his driveway by an individual he had arrested a decade earlier. Although his murder was a direct retaliation for his service in uniform, his family was denied benefits under the PSOB program simply because he had retired. 

    Congressman Dan Goldman has made safeguarding public safety officers and first responders a key priority of his time in office.   

    In the Winter of 2024, Goldman publicly condemned the House Republican’s rejection of the bipartisan budget bill, which would have fully funded the World Trade Center Health Program (WTCHP).  
    In the Summer of 2024, Goldman, alongside other New York lawmakers, introduced a bipartisan, bicameral bill to address any funding gap or shortfall for World Trade Center Health Program. The ‘9/11 Responder and Survivor Health Funding Correction Act of 2024’ intended to secure permanent and mandatory funding for the WTCHP, to prevent any future funding shortfall.   
    In the Fall of 2023, Goldman joined Congressman Bill Pascrell (NJ-09), Senator Amy Klobuchar (D-MN), and Senator Kevin Cramer (R-ND) in introducing the ‘Honoring Our Fallen Heroes Act’ (Honor Act). This legislation would recognize occupational cancer deaths as line-of-duty deaths, and ensure fire fighters, police, and EMS personnel receive benefits under the Public Safety Officers’ Benefits (PSOB) program. 

    ### 

    MIL OSI USA News

  • MIL-OSI USA: Ciscomani Urges U.S. Air Force to Bring New Space Force Mission to Fort Huachuca

    Source: United States House of Representatives – Congressman Juan Ciscomani (Arizona)

    SIERRA VISTA, AZ – In a letter to U.S. Secretary of the Air Force Troy Meink, Congressman Juan Ciscomani (R-AZ) and two of his House colleagues say there is no better place for this U.S. Space Force mission than Fort Huachuca.

    The lawmakers are urging the Department of the Air Force to select Fort Huachuca in Cochise County, Arizona, as the site of a new U.S. Space Force mission aimed at enhancing space domain awareness and early threat detection.

    Ciscomani is joined on the letter by Rep. Andy Biggs (AZ-05) and Rep. Abe Hamadeh (AZ-08).

    “Fort Huachuca provides a strategically sound, operationally ready, and cost-effective location for this critical Space Force capability,” they wrote in the letter. “Unlike other locations, the Fort already has the supporting infrastructure, quality of life, with the opportunity for joint operations. We respectfully urge your full consideration as the Department moves forward with its basing process.”

    Community leaders echoed Ciscomani’s call for a new Space Force mission.

    “Bringing a new U.S. Space Force mission to Fort Huachuca would be a game-changer for Sierra Vista and our surrounding region. This mission would not only strengthen our national defense posture but also create high-quality jobs, attract new talent, and reinforce our city’s long-standing partnership with the Department of Defense. I appreciate Congressman Ciscomani’s advocacy and leadership in championing Fort Huachuca as the right place for this important investment for our future.”

    — Clea McCaa, Mayor of Sierra Vista 

    Congressman Ciscomani’s leadership in advocating for Fort Huachuca as a site for a new U.S. Space Force mission reflects a clear understanding of Arizona’s strategic value to our nation’s defense. Fort Huachuca’s unique capabilities, geographic advantages, and history of supporting joint operations make it an ideal choice. The University of Arizona has long collaborated with Fort Huachuca and is recognized nationally for its expertise in space science and astronomy, optics, and space domain awareness. Together with the unique advantages Southern Arizona offers for innovation in astronomy and space science, this initiative aligns directly with our research strengths and our commitment to advancing U.S. leadership in space security.”

    —  Dr. Tomás Díaz de la Rubia, Senior Vice President of Research and Innovation at The University of Arizona 

     

    View full letter here.

     

    On July 15, 2025, Ciscomani announced his strong support for Fort Huachuca’s selection as the U.S. Department of the Air Force considers basing a new space mission at one of four installations nationwide.

    MIL OSI USA News