Category: Military Intelligence

  • MIL-OSI Security: Ten Chinese Nationals Charged with Large-Scale Hacking of U.S. and International Victims on Behalf of the Chinese Government

    Source: US FBI

    Eight Defendants Were Employees of i-Soon, a Chinese Company Hacking at the Direction of the Chinese Government, and Two Defendants are Chinese Officials Who Directed the Hacks

    Matthew Podolsky, the Acting United States Attorney for the Southern District of New York; Sue J. Bai, the Head of the U.S. Department of Justice’s National Security Division; and Leslie R. Backschies, the Acting Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced the unsealing of a two-count criminal Indictment charging 10 defendants with a years-long hacking scheme committed through the Chinese company i-Soon.  At the direction of the People’s Republic of China (“PRC”) government, i-Soon employees hacked and attempted to hack victims across the globe, including a large religious organization in the U.S., critics and dissidents of the PRC government, a state legislative body, U.S. government agencies, the ministries of foreign affairs of multiple governments in Asia, and news organizations. i-Soon’s victims were of interest to the PRC government because, among other reasons, they were prominent overseas critics of the PRC government or because the PRC government considered them threatening to the rule of the Chinese Communist Party.  The 10 defendants remain at large.

    Acting U.S. Attorney Matthew Podolsky said: “State-sponsored hacking is an acute threat to our community and national security. For years, these 10 defendants—two of whom we allege are PRC officials—used sophisticated hacking techniques to target religious organizations, journalists, and Government agencies, all to gather sensitive information for the use of the PRC. These charges will help stop these state-sponsored hackers and protect our national security. The career prosecutors of this Office and our law enforcement partners will continue to uncover alleged state-sponsored hacking schemes, disrupt them, and bring those responsible to justice.”

    National Security Division Head Sue J. Bai said: “The Department of Justice will relentlessly pursue those who threaten our cybersecurity by stealing from our government and our people. Today, we are exposing the Chinese government agents directing and fostering indiscriminate and reckless attacks against computers and networks worldwide, as well as the enabling companies and individual hackers that they have unleashed. We will continue to fight to dismantle this ecosystem of cyber mercenaries and protect our national security.”  

    Acting Assistant Director in Charge Leslie R. Backschies said: “The charges announced today expose the PRC’s continued attempts to spy on and silence anyone it deems threatening to the Chinese Communist Party. As alleged in the indictment, the Chinese government tried to conceal its efforts by working through a private company, but their actions amount to years of state-sponsored hacking of religious and media organizations, numerous government agencies in multiple countries, and dissidents around the world who dared criticize the regime. The FBI will continue to work tirelessly to disrupt our adversaries’ use of emerging technology to silence dissent and undermine the rule of law across the globe.”

    As alleged in the Indictment:[1]

    The PRC’s Ministry of State Security (“MSS”) had responsibility for the PRC’s domestic counterintelligence, non-military foreign intelligence, and aspects of the PRC’s political and domestic security. The PRC’s Ministry of Public Security (“MPS”) had responsibility for the PRC’s public and political security, including responsibility for law enforcement. To acquire information of interest to the PRC government in a manner that obscured their involvement, the PRC’s MSS and MPS used an extensive network of private companies and contractors in China to conduct unauthorized computer intrusions (“hacks”) in the U.S. and elsewhere.

    One of those private companies was i-Soon.  From approximately 2016 through 2023, i-Soon and its personnel engaged in the numerous and widespread hacking of email accounts, cell phones, servers, and websites at the direction of, and in close coordination with, the PRC’s MSS and MPS. i-Soon generated tens of millions of dollars in revenue and at times had over 100 employees.

    i-Soon’s primary customers were PRC government agencies.  It worked with at least 43 different MSS or MPS bureaus and charged the MSS and MPS between approximately $10,000 and $75,000 for each email inbox it successfully hacked.

    The victims of i-Soon’s hacking included:

    • A newspaper based in New York, New York, that publishes news related to China and is opposed to the Chinese Communist Party.
    • An additional newspaper based in New York, New York.
    • The U.S. Defense Intelligence Agency, an agency within the Department of Defense that specializes in defense and military intelligence.
    • The U.S. Department of Commerce and the International Trade Administration, an agency within the Department of Commerce that promotes U.S. exports and defends against unfair trade practices.
    • A religious organization based in the U.S. that has thousands of churches and congregations and millions of members.
    • A Texas-based organization founded by a prominent critic of the PRC government focused on promoting human rights and religious freedom in China.
    • A news service funded by the U.S. government that delivers uncensored domestic news to audiences in Asian countries, including China, and is headquartered in Washington, D.C.
    • A state research university in the U.S.
    • The New York State Assembly, a part of the legislature of the state of New York.
    • A religious leader who lived outside of China and the U.S.
    • A newspaper based in Hong Kong, China, that has actively covered the politics of Hong Kong and continues to do so today.
    • The foreign ministry of Taiwan.
    • The foreign ministry of India.
    • The foreign ministry of South Korea.
    • The foreign ministry of Indonesia.

    In many instances, the PRC government was particularly interested in these victims because they had criticized the PRC government.  In other instances, the PRC government was particularly interested in foreign ministries because those foreign ministries were in communication with the U.S.

    In some instances, i-Soon conducted its hacking at the direct request of the MSS or MPS. In other instances, i-Soon conducted hacks on its own initiative and then sold, or attempted to sell, the stolen data to different bureaus of the MSS or MPS.

    i-Soon also trained MPS employees how to hack independently of i-Soon and offered a variety of hacking methods for sale to its customers.  i-Soon touted what it called a “industry-leading offensive and defensive technology” and a “zero-day vulnerability arsenal” used to successfully hack computer systems.  One of i-Soon’s products was software called the “Automated Penetration Testing Platform.” i-Soon advertised the platform’s ability to send email phishing attacks, to create files with malware that could provide access to victims’ computers if opened, and to clone websites of victims in order to induce them to submit personal information. An image of the interface for the Automated Penetration Testing Platform is below:

    Another of i-Soon’s products was software that allowed the user to gain unauthorized access to online accounts or computer systems by deciphering passwords—also called “password cracking.” This platform was called the “Divine Mathematician Password Cracking Platform.” An image of the interface for the Divine Mathematician Password Cracking Platform is below:

    i-Soon also sold software specifically designed to target victim accounts on a variety of computer systems and applications, including Microsoft Outlook; Gmail, the email service provided by Google LLC; the social media network X, formerly known as Twitter; the cellphone operating system Android; and the computer operating systems Windows, Macintosh, and Linux. i-Soon advertised its bespoke software as being able to overcome the unique defenses of these systems.

    For example, with respect to Twitter, i-Soon sold software with the capability to send a victim a spear phishing link and then to obtain access to and control over the victim’s Twitter account. The software had the ability to access Twitter even without the victim’s password and to bypass multi-factor authentication. After a victim’s Twitter was compromised, the software could send tweets, delete tweets, forward tweets, make comments, and like tweets. The purpose of this software was to help i-Soon’s customers, including the PRC government, use hacked Twitter accounts to understand public opinion outside of China. For example, the software could be set to keep track of keywords appearing in tweets or messages. i-Soon referred to this software as its “Public Opinion Guidance and Control Platform (Overseas).” An image from the “Public Opinion Guidance and Control Platform (Overseas)” is below:

    The 10 defendants charged are WU HAIBO, a/k/a “shutd0wn,” a/k/a “Boss Wu,” a/k/a “吴海波,” the Chief Executive Officer, and leader, of i-Soon; CHEN CHENG, a/k/a “lengmo,” a/k/a “Chief C,” a/k/a “Jesse Chen,” a/k/a “陈诚,” the Chief Operating Officer of i-Soon; WANG YAN, a/k/a “crysolo,” a/k/a “王堰,” the leader of one of i-Soon’s “penetration testing” teams; WANG ZHE, a/k/a “ken73224,” a/k/a “王哲,” the Sales Director of i-Soon; ZHOU WEIWEI, a/k/a “nullroot,” a/k/a “周伟伟,” the leader of i-Soon’s “Technology Research and Development Center”; WANG LIYU, a/k/a “PICNIC350116,” a/k/a “王立宇,” an MPS officer based in Chengdu, China; and SHENG JING, a/k/a “sjbible,” “盛晶,” the defendant, an MPS officer based in Shenzhen, China.

    If you have information leading to the identification or location of these 10 defendants, please reach out to the Department of State at rewardsforjustice.net.

    *               *                *

    HAIBO, 43; CHENG, 40; GUODONG, 32; LI, 31; YAN, 35; ZHE, 44; WEIWEI, 37; LIANG, 28; LIYU, 36; and JING, 36, all nationals of China, are charged with conspiracy to commit computer intrusions, which carries a maximum sentence of five years in prison, and conspiracy to commit wire fraud, which carries a maximum sentence of 20 years in prison. 

    The maximum potential sentences are prescribed by Congress and are provided here for informational purposes only, as any sentencing of the defendants will be determined by a judge.

    Mr. Podolsky praised the outstanding work of the FBI.

    The case is being prosecuted by the Office’s Complex Frauds and Cybercrime Unit. Assistant U.S. Attorneys Ryan B. Finkel, Steven J. Kochevar, and Kevin Mead are in charge of the prosecution.  Trial Attorney Gregory J. Nicosia Jr. of the National Security Division’s National Security Cyber Section provided valuable assistance.

    The charges contained in the Indictment are merely accusations, and the defendants are presumed innocent unless and until proven guilty.


    [1] As the introductory phrase signifies, the entirety of the text of the Indictment, and the description of the Indictment set forth herein, constitutes only allegations, and every fact described therein should be treated as an allegation.

    MIL Security OSI

  • MIL-OSI Security: Columbus Man Sentenced to 25 Years in Prison for Sex Trafficking Women

    Source: US FBI

    COLUMBUS, Ohio – Terrael A. Alls, 29, of Columbus, was sentenced in federal court here today to 300 months in prison for sex trafficking and use of a facility of interstate commerce in aid of racketeering.

    According to court documents, the Central Ohio Human Trafficking Task Force first received a tip about Alls in February of 2022. Alls provided a business card advertising a modeling agency to a woman when she was staying at the Red Roof Inn on Renner Road in Columbus. The woman found the interaction suspicious and called law enforcement. The business card was for a company called Elite Diamond Studios and the advertised phone numbers were ultimately linked to Alls and various online sex escort advertisements.

    Alls, who is also known as “Rell” and “Ace,” recruited women under the guise of modeling for him as a photographer. He lured them in with promises of being “star players” who, as part of his team, would work with his marketing and advertising agency. In reality, Alls served as a manager for his victims, advertising them for sexual escort services on various websites and often filming their sexual exploitation.

    Alls controlled some of his victims with drugs, such as fentanyl and methamphetamine, then later used their drug dependency against them to continue profiting from their sexual exploitation. For other victims, Alls controlled them with physical violence and threats. He fired a gun near one victim’s head and threatened to pistol-whip her, punched the victims and slammed them onto tables.

    The defendant’s laptop had more than 42,000 sexually explicit images, videos and advertisements, including images and videos of the victims identified in this case. Alls used many of those videos to continue to earn money from the exploitation of his victims and revictimize them in the process.

    Alls was arrested in March 2023 and pleaded guilty in February 2024.

    Kenneth L. Parker, United States Attorney for the Southern District of Ohio, announced the guilty plea sentence imposed today by U.S. District Judge Michael H. Watson. Assistant United States Attorneys Emily Czerniejewski and Jennifer M. Rausch are representing the United States in this case.

    The case was investigated by the Central Ohio Human Trafficking Task Force, which was formed under Ohio Attorney General Dave Yost’s Ohio Organized Crime Investigations Commission, and includes resources from the Columbus Division of Police, Homeland Security Investigations, Delaware County Sheriff’s Office, Powell Police Department, Bureau of Criminal Investigations, The Ohio State University Police Department, Marysville Division of Police, Salvation Army, Southeast Healthcare, the Franklin County Prosecutor’s Office and the Delaware County Prosecutor’s Office.

    # # #

    MIL Security OSI

  • MIL-OSI Security: NATO Secretary General visits Norway’s High North in preparation for the Summit in The Hague

    Source: NATO

    NATO Secretary General Mark Rutte visited northern Norway on Thursday (22 May 2025), where he met Prime Minister Jonas Gahr Støre, Minister of Foreign Affairs Espen Barth Eide, and Minister of Defence Tore Sandvik. The Secretary General also observed a demonstration of NATO’s multidomain capabilities in the High North.

    Speaking alongside Prime Minister Gahr Støre aboard the Norwegian Coast Guard vessel Svalbard, the Secretary General praised Norway’s leadership and emphasised the strategic importance of the region. He said the visit was important not only for NATO and Norway, but also for understanding how Allies are working together to keep NATO territory safe.

    Secretary General Rutte underlined the value of coordination among the seven NATO countries with territory in the High North: Iceland, Norway, Finland, Denmark, Sweden, Canada and the United States. “With Norway being one of the seven High North countries, this is an important element of this vision to understand better what is the situation in the High North,” he said. “We are doing more and more together, and also NATO is getting more and more involved to see how we can best coordinate all those efforts. And we know that these sea lanes are opening up, that the Russians and the Chinese are more and more active here.”

    Turning to the NATO Summit in The Hague, the Secretary General noted the need to increase defence spending. He emphasised that Allies must invest in order to deliver the capabilities needed to defend NATO not only today, but in the years ahead, “knowing that Russia is actively reconstituting itself.” Mr Rutte also pointed to China’s military build-up and ongoing terrorist threats as examples of why NATO Allies will need to invest well above the 2% of GDP target. 

    The Secretary General also highlighted the importance of civil preparedness. “Norway is an absolute leader when it comes to a whole society approach,” he said. “We need the whole society to be involved if the Russians are a long term threat.”

    MIL Security OSI

  • MIL-OSI Security: Allies review progress with NATO cyber defence pledge, identify next steps to increase cyber resilience

    Source: NATO

    On 20-21 May 2025, NATO Allies and several Partner nations met in Poland for NATO’s annual Cyber Defence Pledge Conference.

    Held at the Polish Cyber Command in Legionowo, the Conference brought together representatives from NATO member states as well as from Azerbaijan, Georgia, Iraq, Ireland, Japan, the Republic of Korea, Switzerland, Ukraine and the European Commission and the European External Action Service. Commander of the Polish Cyber Command Major General Karol Molenda and NATO’s Assistant Secretary General for Innovation, Hybrid and Cyber, Ambassador Jean-Charles Ellermann-Kingombe co-chaired the event.

    The NATO Cyber Defence Pledge Conference provides a unique platform for Allies and, since 2023, for a selected group of Partners to share experiences and exchange best practices in implementing NATO’s Cyber Defence Pledge, a mechanism that helps guide national efforts to boost the cyber defences of their networks and infrastructures.

    At the 2023 NATO Summit in Vilnius, Allies took further steps to enhance the Pledge, including new national goals to further strengthen national cyber defences.

    At the 2025 Conference, participants reflected on national progress made to achieve greater cyber maturity for critical infrastructure, particularly for the energy, transport, communications and water sectors. They explored best practices for stronger cooperation between public institutions and the private sector, at both the national and international levels. They addressed challenges to increasing cyber resilience and underlined the importance of leveraging innovation for cyber defence.   

    Looking ahead, participants agreed on the need to increase information exchange, in order to increase national and collective cyber resilience.

    MIL Security OSI

  • MIL-OSI Security: Ontario Man Arrested on Complaint Alleging He Exported Shipments of Firearms, Ammunition, and Other Military Items to North Korea

    Source: US FBI

    LOS ANGELES – A San Bernardino County man was arrested today on a federal criminal complaint alleging that he exported to North Korea shipments of firearms, ammunition and other military items that were concealed inside shipping containers bound from Long Beach.

    Shenghua Wen, 41, of Ontario, is charged with conspiracy to violate the International Emergency Economic Powers Act, a felony that carries a statutory maximum sentence of 20 years in federal prison.

    Wen – a Chinese national illegally residing in the United States – was arrested this morning and is expected to make his initial appearance this afternoon in United States District Court in downtown Los Angeles. His arraignment is expected to occur in the coming weeks.

    “It is essential that we protect our country from hostile foreign states that have adverse interests to our nation,” said United States Attorney Martin Estrada. “We have arrested a defendant who allegedly acted at the direction of the North Korean government by conspiring to illegally ship firearms, ammunition, and other military equipment to North Korea. I am grateful to our law enforcement partners for stopping this threat and their tireless commitment to the security of our nation.”

    “The significance of this arrest and discovery of this scheme cannot be overstated,” said FBI Los Angeles Assistant Director in Charge Akil Davis. “Not only did the investigative team prevent additional restricted items going to the North Korean regime, but they gathered valuable intelligence for the United States and our allies. I’m proud of the hard work that went into building the case against Wen by dedicated agents and our partners who specialize in cases that involve illegal exports to foreign adversaries who evade sanctions and utilize weapons and technology for nefarious purposes.”

    According to an affidavit filed on November 26 with the complaint, Wen obtained firearms, ammunition, and export-controlled technology with the intention of shipping them to North Korea – a violation of federal law and United States sanctions against that nation. Wen and his co-conspirators allegedly exported shipments of firearms and ammunition to North Korea by concealing the items inside shipping containers that were shipped from Long Beach through Hong Kong to North Korea.

    On August 14, law enforcement seized at Wen’s home two devices that he intended to send to North Korea for military use: a chemical threat identification device and a hand-held broadband receiver that detects eavesdropping devices. On September 6, law enforcement seized approximately 50,000 rounds of 9mm ammunition that Wen allegedly obtained to send to North Korea.

    A review of Wen’s iPhone revealed to law enforcement that in December 2023, Wen smuggled items from Long Beach to Hong Kong with their destination being North Korea. Messages retrieved from Wen’s cellphones revealed discussions he had earlier this year with co-conspirators about shipping military-grade equipment to North Korea. Some of these messages include photographs that Wen sent of items controlled for export under the International Traffic in Arms Regulations. From January 2024 to April 2024, Wen sent emails and text messages to a U.S.-based broker about obtaining a civilian plane engine. There also were several text messages on Wen’s iPhone concerning price negotiation for the plane and its engine.

    Wen is a Chinese national who is illegally in the United States after overstaying his student visa and is therefore prohibited from possessing any firearms or ammunition. Wen lacks the required licenses from the U.S. government to export ammunition, firearms, and the other devices that law enforcement seized at his home to North Korea.

    “The results of today’s arrest and search warrants are a testament to HSI and our partner agencies commitment to national security and protecting our sensitive technology” said Homeland Security Investigations (HSI) San Diego Special Agent in Charge Shawn Gibson. “It is a federal crime to illegally obtain and export certain US technologies by foreign countries and those who seek to circumvent the law will be thoroughly investigated.”

    “Mr. Wen’s arrest is a significant advancement in our collective efforts towards protecting our national security, safeguarding sensitive U.S. technologies and other export-controlled items, and ensuring accountability for the alleged bad actions,” said Bryan D. Denny, Special Agent in Charge for the Department of Defense Office of Inspector General, Defense Criminal Investigative Service (DCIS), Western Field Office.       

    “The defendant’s alleged attempts to illicitly export firearms and military technology from the United States at the behest of the Democratic People’s Republic of Korea constitute an alarming violation of sanctions and export control laws,” said Special Agent in Charge Gregory Dunlap of the Office of Export Enforcement, Los Angeles Field Office. “OEE is committed to working with our federal partners to identify and disrupt illegal export schemes that undermine regional stability and our national security interests at home and abroad.”   

    A complaint contains allegations that a defendant has committed a crime. Every defendant is presumed to be innocent until and unless proven guilty in court.

    The FBI; Homeland Security Investigations; DCIS; the Bureau of Alcohol, Tobacco, Firearms and Explosives; and the Department of Commerce Bureau of Industry and Security are investigating this matter.  

    Assistant United States Attorney Sarah E. Gerdes of the Terrorism and Export Crimes Section and Trial Attorney Ahmed Almudallal of the U.S. Department of Justice National Security Division’s Counterintelligence and Export Control Section are prosecuting this case. 

    MIL Security OSI

  • MIL-OSI Security: Hudson County Convicted Felon Indicted for Possessing a Firearm and an Extended Magazine

    Source: US FBI

    NEWARK, N.J. – A Hudson County man has been indicted for a firearms offense, Acting U.S. Attorney Vikas Khanna announced.

    Richard Sharp, 25, of Bayonne, New Jersey and known on social media as “Famous Richard,” is charged with one count of possession of a firearm and ammunition by a convicted felon. He was arrested earlier today and appeared before U.S. Magistrate Judge André M. Espinosa in Newark federal court and was detained.

    According to documents filed in this case and statements made in court:

    On July 4, 2024, law enforcement responded to reports of an incident at a gas station in Bayonne, New Jersey. The investigation revealed that during an altercation at the gas station, Sharp had brandished a firearm with an extended magazine and threatened to shoot other people who were at the gas station. Several days later, Sharp posted a video on social media showing him dancing while holding a firearm equipped with an extended magazine.

    Subsequently, on July 12, 2024, following a judicially authorized search of Sharp’s residence and vehicle, law enforcement recovering a loaded Beretta M9 semi-automatic handgun with a defaced serial number and an extended magazine that contained approximately 24 rounds of ammunition.

    The count of being a felon in possession of a firearm and ammunition is punishable by a maximum of 15 years in prison and a fine of $250,000, or twice the gross gain or loss from the offense, whichever is greatest.

    Acting U.S. Attorney Khanna credited special agents of the Federal Bureau of Investigation, Newark Field Division under the direction of Special Agent in Charge Brian J. Driscoll, with the investigation. He also thanked the Hudson County Prosecutor’s Office, under the direction of Prosecutor Esther Suarez and the Bayonne Police Department under the direction of Police Chief Robert Geisler.

    The government is represented by Assistant U.S. Attorney Sean Nadel of the Narcotics/OCDETF Unit in Newark.

    The charges and allegations contained in the indictment are merely accusations, and the defendant is presumed innocent unless and until proven guilty.

                                                                 ###

    Defense counsel: Areeb Salim, Esq. 

    MIL Security OSI

  • MIL-OSI Security: Mercer County Man Charged with Illegally Possessing Firearms, Fentanyl, and Cocaine

    Source: US FBI

    TRENTON, N.J. – A Mercer County, New Jersey, man was arrested and charged with illegally possessing firearms and possessing with the intent to distribute fentanyl and cocaine, U.S. Attorney Philip R. Sellinger announced today.

    Jose Colon-Matos, 33, of Trenton, is charged by complaint with one count of being a previously convicted felon in possession of two firearms, one count of possession with the intent to distribute fentanyl, one count of possession with the intent to distribute cocaine, and one count of possession of firearms in furtherance of a drug trafficking crime. He made his initial appearance on January 6, 2025, before U.S. Magistrate Judge Tonianne J. Bongiovanni in Trenton federal court and was detained pending a detention hearing scheduled for January 10, 2025.

    According to documents filed in this case and statements made in court:

    On May 15, 2024, following an investigation into narcotics activity in Hamilton Township in Mercer County, law enforcement officers conducted a court-ordered search of an apartment used by Colon-Matos during which they recovered from a safe in the apartment two loaded firearms, including one with an obliterated serial number, distribution quantities of suspected fentanyl and cocaine, and approximately $9,000.00 in United States currency. The narcotics were subsequently tested by the New Jersey State Police forensic laboratory, which returned positive results for fentanyl and cocaine.

    The charge of being a convicted felon in possession of a firearm carries a potential maximum penalty of 15 years in prison and a fine of up to $250,000. The counts of possession with intent to distribute fentanyl and cocaine each carry a maximum penalty of 20 years in prison and a fine of up to $1 million. The charge of possession of a firearm in furtherance of a drug trafficking crime carries a mandatory minimum sentence of five years in prison, which must run consecutively to any other sentence imposed, and a maximum potential penalty of life imprisonment, and a fine of $250,000.

    U.S. Attorney Sellinger credited special agents of the Federal Bureau of Investigation, under the direction of Acting Special Agent in Charge Brian Driscoll in Newark, with the investigation leading to the charges. He also thanked the Hamilton Township Police Division, under the direction of Chief Kenneth R. DeBoskey, and the Mercer County Prosecutor’s Office, for their assistance in the investigation.

    The government is represented by Special Assistant U.S. Attorney Jonathan S. Garelick of the U.S. Attorney’s Office’s Criminal Division in Trenton.

    The charges and allegations contained in the complaint are merely accusations, and the defendant is presumed innocent unless and until proven guilty.

    Defense counsel: Andrea G. Aldana, Assistant Federal Public Defender, Office of the Federal Public Defender.

    MIL Security OSI

  • MIL-OSI Russia: Xi Jinping stresses need to promote high-quality cultural and ethical development

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, May 23 (Xinhua) — Chinese President Xi Jinping has stressed the need to promote high-quality cultural and ethical development to provide strong spiritual support for building a strong country and achieving national rejuvenation.

    Xi Jinping, also general secretary of the Communist Party of China Central Committee and chairman of the Central Military Commission, made the remarks while giving instructions on work to promote cultural and ethical progress. -0-

    MIL OSI Russia News

  • MIL-OSI Russia: South Korea and the United States have not discussed the issue of reducing the American military contingent

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    SEOUL, May 23 (Xinhua) — The Republic of Korea’s Defense Ministry said Friday that Seoul has not discussed with Washington the issue of withdrawing some U.S. troops from the Korean Peninsula.

    The ministry issued a statement in response to a US media report that Washington was considering withdrawing about 4,500 troops from the ROK.

    There are currently about 28.5 thousand American military personnel stationed in the Republic of Korea. –0–

    MIL OSI Russia News

  • MIL-OSI Security: U.S. Attorney’s Office Hosts Meeting of the Western District Health Care Fraud Working Group

    Source: US FBI

    Multi-Agency Partnership Continues Efforts to Combat Health Care Fraud and Protect Taxpayer Dollars

    CHARLOTTE, N.C. – U.S. Attorney Dena J. King announced today the annual meeting of the Western District’s Health Care Fraud Working Group, a partnership of federal and state agencies focused on combating health care fraud and protecting taxpayer dollars in the Western District of North Carolina.

    The working group comprises investigators, analysts, auditors, and attorneys from state and federal agencies, including the Federal Bureau of Investigation (FBI), the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG), the Food and Drug Administration’s Office of Criminal Investigations (FDA-OCI), the Internal Revenue Service Criminal Investigation (IRS-CI), the U.S. Department of Veterans Affairs Office of Inspector General (VA-OIG), the Department of Defense Office of Inspector General Defense Criminal Investigative Service (DCIS), the North Carolina Attorney General’s Medicaid Investigations Division, the North Carolina Department of Insurance, the South Carolina Medicaid Investigations Division, and the Office of Personnel Management.

    At today’s meeting, U.S. Attorney King reaffirmed the importance of collaboration among the partner agencies and recognized their contributions.

    “Health care fraud undermines public trust, exploits vulnerable patients, and siphons billions from taxpayer-funded programs,” said U.S. Attorney King. “By combining our expertise and resources we can detect, dismantle, and prosecute health care fraud schemes and protect vital government programs that so many North Carolinians rely upon for their health care needs. I am grateful to our partner agencies for their dedication to protect our health care system and hold perpetrators accountable.”

    The Health Care Fraud Working Group’s mission is to detect health care fraud through coordinated investigations, information sharing, identification of existing and emerging schemes, and case development. This includes uncovering schemes of fraudulent billing, COVID-19-related fraud, kickback schemes, and fraud targeting government health care programs like Medicare, Medicaid, and TRICARE. The working group also focuses on fraud committed by both corporate entities and individuals, including hospitals, telemedicine companies and providers, nursing home chains, pharmacies and pharmaceutical manufacturers, durable medical equipment suppliers, physicians, therapists, and affiliated health care professionals.

    If you suspect Medicare or Medicaid fraud, please report it by phone at 1-800-HHS-TIPS (1-800-447-8477), or via email at HHSTips@oig.hhs.gov.

    To report Medicaid fraud in North Carolina, call the North Carolina Medicaid Investigations Division at 919-881-2320 or fill out an online complaint form.

    TRICARE fraud can be reported here.

    Fraud against the U.S. Department of Veterans Affairs healthcare system can be reported at www.vaoig.gov/hotline.

    MIL Security OSI

  • MIL-OSI Security: U.S. Army Soldier Sentenced to 14 Years in Prison For Attempting to Assist ISIS to Conduct Deadly Ambush on U.S. Troops

    Source: US FBI

    U.S. Army Private First Class Provided Tactical Guidance in Attempt to Help ISIS Attack and Murder U.S. Service Members in the Middle East

    Cole Bridges, also known as Cole Gonzales, 24, of Stow, Ohio, was sentenced to 168 months in prison followed by 10 years of supervised release for attempting to provide material support to a designated foreign terrorist organization and attempting to murder U.S. military service members, based on his efforts to assist the Islamic State of Iraq and al-Sham (ISIS) to attack and kill U.S. soldiers in the Middle East.

    Bridges pleaded guilty to terrorism charges on June 14, 2023. According to court documents, Bridges joined the U.S. Army in approximately September 2019 and was assigned as a cavalry scout in the Third Infantry Division based in Fort Stewart, Georgia. Before he joined the Army, beginning in at least 2019, Bridges began researching and consuming online propaganda promoting jihadists and their violent ideology, and began to express his support for ISIS and jihad on social media. In or about October 2020, approximately one year after joining the Army, Bridges began communicating with an FBI online covert employee (the OCE), who was posing as an ISIS supporter in contact with ISIS fighters in the Middle East. During these communications, Bridges expressed his frustration with the U.S. military and his desire to aid ISIS. Bridges then provided training and guidance to purported ISIS fighters who were planning attacks, including advice about potential targets in New York City. Bridges also provided the OCE with portions of a U.S. Army training manual and guidance about military combat tactics, with the understanding that the materials would be used by ISIS in future attack planning.

    In or about December 2020, Bridges began to supply the OCE with instructions for the purported ISIS fighters on how to attack U.S. forces in the Middle East. Among other things, Bridges diagrammed specific military maneuvers intended to help ISIS fighters maximize the lethality of future attacks on U.S. troops. Bridges also provided advice about the best way to fortify an ISIS encampment to ambush U.S. Special Forces, including by wiring certain buildings with explosives to kill the U.S. troops. Then, in January 2021, Bridges provided the OCE with a video of himself in his U.S. Army body armor standing in front of a flag often used by ISIS fighters and making a gesture symbolic of support for ISIS. Approximately one week later, Bridges sent a second video in which Bridges, using a voice manipulator, narrated a propaganda speech in support of the anticipated ambush by ISIS on U.S. troops.

    The FBI’s New York Joint Terrorism Task Force investigated the case, with valuable assistance provided by the FBI field offices in Washington, Atlanta, and Cleveland; U.S. Army Counterintelligence, the U.S. Attorney’s Office for the Southern District of Georgia, Air Force Office of Special Investigations, U.S. Army Criminal Investigation Command, and U.S. Army Third Infantry Division.

    Assistant U.S. Attorneys Sam Adelsberg and Matthew Hellman for the Southern District of New York prosecuted the case, with assistance from Trial Attorney Michael Dittoe of the National Security Division’s Counterterrorism Section.

    MIL Security OSI

  • MIL-OSI USA: L3 Technologies Inc. Agrees to Pay $62,000,000 to Resolve False Claims Act Allegations arising from Submission of False Cost or Pricing Data on Defense Contracts

    Source: US Justice – Antitrust Division

    Headline: L3 Technologies Inc. Agrees to Pay $62,000,000 to Resolve False Claims Act Allegations arising from Submission of False Cost or Pricing Data on Defense Contracts

    L3 Technologies Inc., a corporation doing business in Utah, has agreed to pay the United States $62 million to settle allegations that its division, Communications System West, violated the False Claims Act and the Truth In Negotiations Act by knowingly making false statements and submitting and causing the submission of false claims by failing to disclose accurate, current, and complete cost or pricing data for communications equipment sold to various Department of Defense agencies, including the Air Force, Army, and Navy, and other government agencies. 

    MIL OSI USA News

  • MIL-OSI Security: L3 Technologies Inc. Agrees to Pay $62,000,000 to Resolve False Claims Act Allegations arising from Submission of False Cost or Pricing Data on Defense Contracts

    Source: United States Attorneys General 7

    L3 Technologies Inc., a corporation doing business in Utah, has agreed to pay the United States $62 million to settle allegations that its division, Communications System West, violated the False Claims Act and the Truth In Negotiations Act by knowingly making false statements and submitting and causing the submission of false claims by failing to disclose accurate, current, and complete cost or pricing data for communications equipment sold to various Department of Defense agencies, including the Air Force, Army, and Navy, and other government agencies.

    L3 manufactures communications equipment to operate unmanned vehicles and retrieve data and visuals for military operations and intelligence. The devices are known as remote operations video enhanced receivers (ROVER), Video-Oriented Transceivers for Exchange of Information (VORTEX), and Soldier Intelligence, Surveillance, and Reconnaissance (SIR) receivers.  The United States has purchased ROVER, VORTEX, and SIR products through sole source, fixed price contracts, and L3 also has supplied these products under subcontracts with other prime contractors who manufacture unmanned vehicles.

    The settlement resolves allegations that, between October 2006 and February 2014, L3 failed to disclose accurate, complete, and current cost or pricing data relating to the labor, material, and other costs for manufacturing the ROVER, VORTEX, and SIR products, and each of their versions and kits, and falsely certified that it had done so in dozens of government contract proposals.  The United States alleged that this conduct violated the Truth in Negotiations Act, which requires a contractor to provide to the government at the time of an agreement on price the most current, complete, and accurate facts that could reasonably be expected to affect price negotiations significantly.  The United States further alleged that, by failing to disclose accurate, complete, and current cost or pricing data, L3 knowingly submitted or caused the submission of false claims in connection with the ROVER, VORTEX, and SIR contracts and subcontracts in violation of the False Claims Act.

    “The Department will vigorously pursue federal contractors who fail to provide truthful information during contract negotiations to ensure federal agencies do not overpay for products and services.” said Acting Assistant Attorney General Yaakov M. Roth of the Justice Department’s Civil Division.

    “Taking advantage of the resources that support the armed forces of the United States and other government agencies will not be tolerated,” said Acting United States Attorney Felice John Viti of the District of Utah. “The U.S. Attorney’s Office will continue to work with our law enforcement partners to investigate and hold accountable individuals and contractors who defraud the government.”

    “This $62 million settlement underscores the Air Force Office of Special Investigations (OSI) commitment to protecting national security and ensuring the integrity of Department of Defense acquisitions.,” stated OSI Special Agent Jeffery T.E. Herrin. “L3’s defective pricing in contract proposals for critical systems like ROVER, VORTEX, and SIR erodes public trust, and OSI, through robust law enforcement partnerships, will continue to uphold law and order within the defense industry.”

    “This settlement is the result of a collaborative effort to guard against fraud, waste, and abuse, demonstrating the commitment of the Army Criminal Investigation Division (CID) and our partner agencies to safeguard public funds,” said Special Agent in Charge Olga Morales of the Department of the Army CID Southwest Field Office. “Investigating companies that defraud the Army is crucial to maintaining the trust of the American public and upholding the integrity of government contracting.”

    The settlement resulted from a coordinated effort among the Civil Division’s Fraud Section and the U.S. Attorney’s Office for the District of Utah with assistance from the Defense Contract Management Agency, the Department of the Air Force, the Department of the Army, the Department of the Navy, and the Special Operations Command.  Senior Trial Counsel A. Thomas Morris and former Senior Trial Counsel Russell Kinner of the Civil Division’s Commercial Litigation Branch, Fraud Section, and Assistant U.S. Attorney Carra Cadman for the District of Utah handled the matter.

    The claims resolved by the settlement are allegations only and there has been no determination of liability.

    MIL Security OSI

  • MIL-OSI USA: Strong New Contract Ratified by IAM Local 2525 Members at South Dakota Military Base

    Source: US GOIAM Union

    Members of IAM Local 2525, working under the B1 Training Support SCA contract with AT2, LLC and Systems Application & Technologies, Inc. (SA-TECH), have unanimously ratified a new three-year collective bargaining agreement. The contract, effective through June 25, 2028, delivers significant improvements in wages, benefits, and retirement security for the bargaining unit based in Belle Fourche, S.D.

    Negotiations were led by IAM Aerospace Coordinator Stephen P. Jordan, who worked closely with District 5 Business Representative Steve Allard, whose leadership and professionalism were instrumental in achieving this agreement.

    The newly ratified contract includes an immediate $2 equity pay adjustment, along with 4% general wage increases each year of the agreement. Health and welfare contributions will increase annually. Additionally, the IAM National Pension Plan contributions will grow from $3 per hour to $3.75 per hour over the life of the contract.

    “I would like to acknowledge Business Representative Steve Allard for his great work and professionalism in achieving this agreement,” said Jordan. “Steve has a great mindset in doing what’s right in representing the membership. I would also like to acknowledge the shop committee Chay Ericks and Reggie Hunt for their work representing the bargaining unit.”

    The 100% ratification vote reflects the membership’s strong support for the agreement and the improvements it delivers.

    “With the support of IAM Aerospace Coordinator Stephen Jordan, contract negotiations for our members at SA-TECH went exceedingly well,” said IAM Midwest Territory General Vice President Sam Cicinelli. “We are proud of the bargaining committee’s efforts and the incredible contract they brought to Local 2525 members. My thanks to everyone involved and congratulations to these members on a great new agreement.”

    The post Strong New Contract Ratified by IAM Local 2525 Members at South Dakota Military Base appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI USA: New Best Practices Guide for Securing AI Data Released

    News In Brief – Source: US Computer Emergency Readiness Team

    This information sheet highlights the critical role of data security in ensuring the accuracy, integrity, and trustworthiness of AI outcomes. It outlines key risks that may arise from data security and integrity issues across all phases of the AI lifecycle, from development and testing to deployment and operation. 

    Defense Industrial Bases, National Security Systems owners, federal agencies, and Critical Infrastructure owners and operators are encouraged to review this information sheet and implement the recommended best practices and mitigation strategies to protect sensitive, proprietary, and mission critical data in AI-enabled and machine learning systems. These include adopting robust data protection measures; proactively managing risks; and strengthening monitoring, threat detection, and network defense capabilities. 

    As AI systems become more integrated into essential operations, organizations must remain vigilant and take deliberate steps to secure the data that powers them. For more information on securing AI data, see CISA’s Artificial Intelligence webpage. 

    MIL OSI USA News

  • MIL-OSI USA: AI Data Security: Best Practices for Securing Data Used to Train & Operate AI Systems

    News In Brief – Source: US Computer Emergency Readiness Team

    Executive summary

    This Cybersecurity Information Sheet (CSI) provides essential guidance on securing data used in artificial intelligence (AI) and machine learning (ML) systems. It also highlights the importance of data security in ensuring the accuracy and integrity of AI outcomes and outlines potential risks arising from data integrity issues in various stages of AI development and deployment.

    This CSI provides a brief overview of the AI system lifecycle and general best practices to secure data used during the development, testing, and operation of AI-based systems. These best practices include the incorporation of techniques such as data encryption, digital signatures, data provenance tracking, secure storage, and trust infrastructure. This CSI also provides an in-depth examination of three significant areas of data security risks in AI systems: data supply chain, maliciously modified (“poisoned”) data, and data drift. Each section provides a detailed description of the risks and the corresponding best practices to mitigate those risks. 

    This guidance is intended primarily for organizations using AI systems in their operations, with a focus on protecting sensitive, proprietary, or mission critical data. The principles outlined in this information sheet provide a robust foundation for securing AI data and ensuring the reliability and accuracy of AI-driven outcomes.

    This document was authored by the National Security Agency’s Artificial Intelligence Security Center (AISC), the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the New Zealand’s Government Communications Security Bureau’s National Cyber Security Centre (NCSC-NZ), and the United Kingdom’s National Cyber Security Centre (NCSC-UK). 

    The goals of this guidance are to: 

    1. Raise awareness of the potential risks related to data security in the development, testing, and deployment of AI systems;
    2. Provide guidance and best practices for securing AI data across various stages of the AI lifecycle, with an in-depth description of the three aforementioned significant areas of data security risks; and
    3. Establish a strong foundation for data security in AI systems by promoting the adoption of robust data security measures and encouraging proactive risk mitigation strategies.

    Download the PDF version of this report: 

    Introduction

    The data resources used during the development, testing, and operation of an AI1 system are a critical component of the AI supply chain; therefore, the data resources must be protected and secured. In its Data Management Lexicon, [1] the Intelligence Community (IC) defines Data Security as “The ability to protect data resources from unauthorized discovery, access, use, modification, and/or destruction…. Data Security is a component of Data Protection.” 

    Data security is paramount in the development and deployment of AI systems. Therefore, it is a key component of strategies developed to safeguard and manage the overall security of AI-based systems. Successful data management strategies must ensure that the data has not been tampered with at any point throughout the entire AI system lifecycle; is free from malicious, unwanted, and unauthorized content; and does not have unintentional duplicative or anomalous information. Note that AI data security depends on robust, fundamental cybersecurity protection for all datasets used in designing, developing, deploying, operating, and maintaining AI systems and the ML models that enable them.

    Audience and scope

    This CSI outlines potential risks in AI systems stemming from data security issues that arise during different phases of an AI deployment, and it introduces recommended protocols to mitigate these risks. This guidance builds upon the NSA’s joint guidance on Deploying AI Systems Securely [2] and delves deeper into securing the data used to train and operate AI-based systems. This guidance is primarily developed for organizations that use AI systems in their day-to-day operations, including the Defense Industrial Base (DIB), National Security System (NSS) owners, Federal Civilian Executive Branch (FCEB) agencies, and critical infrastructure owners and operators. Implementing these mitigations can help secure AI-enabled systems and protect proprietary, sensitive, and/or mission critical data.

    Securing data throughout the AI system lifecycle

    Data security is a critical enabler that spans all phases of the AI system lifecycle. ML models learn their decision logic from data, so an attacker who can manipulate the data can also manipulate the logic of an AI-based system. In the AI Risk Management Framework (RMF) [3], the National Institute of Standards and Technology (NIST) defines six major stages in the lifecycle of AI systems, starting from Plan & Design and progressing all the way to Operate & Monitor. The following table highlights relevant data security factors for each stage of the AI lifecycle: 

    Table 1: The AI System Lifecycle with key dimensions, necessary ongoing assessments, focus areas for data security, and particular data security risks covered in this CSI. [3] 
    AI Lifecycle Stage Key Dimensions Test, Evaluation, Verification, & Validation (TEVV) Potential Focus Areas for Data Security Particular Data Security Risks Covered in this CSI
    1) Plan & Design Application Context Audit & Impact Assessment Incorporating data security measures from inception, designing robust security protocols, threat modeling, and including privacy by design Data supply chain
    2) Collect & Process Data Data & Input Internal & External Validation Ensuring data integrity, authenticity, encryption, access controls, data minimization, anonymization, and secure data transfer Data supply chain,
    maliciously modified data
    3) Build & Use Model AI Model Model Testing Protecting data from tampering, ensuring data quality and privacy (including differential privacy and secure multi-party computation when appropriate and possible), securing model training, and operating environments   Data supply chain,
    maliciously modified data
    4) Verify & Validate AI Model Model Testing Performing comprehensive security testing, identifying and mitigating risks, validating data integrity, adversarial testing, and formal verification when appropriate and possible Data supply chain,
    maliciously modified data
    5) Deploy & Use Task & Output Integration, Compliance Testing, Validation Implementing strict access controls, zero-trust infrastructure, secure data transmission and storage, secure API endpoints, and monitoring for anomalous behavior Data supply chain,
    maliciously modified data,
    data drift
    6) Operate & Monitor Application Context Audit & Impact Assessment Conducting continuous risk assessments, monitoring for data breaches, deleting data securely, complying with regulations, incident response planning, and regular security auditing Data supply chain,
    maliciously modified data, data drift

    Throughout the AI system lifecycle, securing data is paramount to maintaining information integrity and system reliability. Starting with the initial Plan & Design phase, carefully plan data protection measures to provide proactive mitigations of potential risks. In the Collect & Process Data phase, data must be carefully analyzed, labeled, sanitized, and protected from breaches and tampering. Securing data in the Build & Use Model phase helps ensure models are trained on reliably sourced, accurate, and representative information. In the Verify & Validate phase, comprehensive and thorough testing of AI models, derived from training data, can identify security flaws and enable their mitigation. 

    Note that Verification & Validation is necessary each time new data or user feedback is introduced into the model; therefore, that data also needs to be handled with the same security standards as AI training data. Implementing strict access controls protects data from unauthorized access, especially in the Deploy & Use phase. Lastly, continuous data risk assessments in the Operate & Monitor phase are necessary to adapt to evolving threats. Neglecting these practices can lead to data corruption, compromised models, data leaks, and non-compliance, emphasizing the critical importance of robust data security at every phase.

    Best practices to secure data for AI-based systems

    The following list contains recommended practical steps that system owners can take to better protect the data used to build and operate their AI-based systems, whether running on premises or in the cloud. For more details on general cybersecurity best practices, see also NIST SP 800-53, “Security and Privacy Controls for Information Systems and Organizations.” [33]

    1. Source reliable data and track data provenance
    Verify data sources use trusted, reliable, and accurate data for training and operating AI systems. To the extent possible, only use data from authoritative sources. Implement provenance tracking to enable the tracing of data origins, and log the path that data follows through an AI system. [7],[8],[9] Incorporate a secure provenance database that is cryptographically signed and maintains an immutable, append-only ledger of data changes. This facilitates data provenance tracking, helps identify sources of maliciously modified data, and helps ensure that no single entity can undetectably manipulate the data.
    2. Verify and maintain data integrity during storage and transport
    Maintaining data integrity2 is an essential component to preserve the accuracy, reliability, and trustworthiness of AI data. [4] Use checksums and cryptographic hashes to verify that data has not been altered or tampered with during storage or transmission. Generating such unique codes for AI datasets enables the detection of unauthorized changes or corruption, safeguarding the information’s authenticity.

    3. Employ digital signatures to authenticate trusted data revisions
    Digital signatures help ensure data integrity and prevent tampering by third parties. Adopt quantum-resistant digital signature standards [5][6] to authenticate and verify datasets used during AI model training, fine tuning, alignment, reinforcement learning from human feedback (RLHF), and/or other post-training processes that affect model parameters. Original versions of the data should be cryptographically signed, and any subsequent data revisions should be signed by the person who made the change. Organizations are encouraged to use trusted certificate authorities to verify this process.
    4. Leverage trusted infrastructure
    Use a trusted computing environment that leverages Zero Trust architecture. [10] Provide secure enclaves for data processing and keep sensitive information protected and unaltered during computations. This approach fosters a secure foundation for data privacy and security in AI data workflows by isolating sensitive operations and mitigating risks of tampering. Trusted computing infrastructure supports the integrity of data processes, reduces risks associated with unverified or altered data, and ultimately creates a more robust and transparent AI ecosystem. Trusted environments are essential for AI applications where data accuracy directly impacts their decision-making processes.
    5. Classify data and use access controls
    Categorize data using a classification system based on sensitivity and required protection measures. [11] This process enables organizations to apply appropriate security controls to different data types. Classifying data enables the enforcement of robust protection measures like stringent encryption and access controls. [33] In general, the output of AI systems should be classified at the same level as the input data (rather than creating a separate set of guardrails).
    6. Encrypt data
    Adopt advanced encryption protocols proportional to the organizational data protection level. This includes securing data at rest, in transit, and during processing. AES-256 encryption is the de facto industry standard and is considered resistant to quantum computing threats. [12],[13] Use protocols, such as TLS with AES-256 or post-quantum encryption, for data in transit. Refer to NIST SP 800-52r2, “Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations” [14] for more details.
    7. Store data securely
    Store data in certified storage devices that enforce NIST FIPS 140-3 [15] compliance, ensuring that the cryptographic modules used to encrypt the data provide high-level security against advanced intrusion attempts. Note that Security Level 3 (defined in NIST FIPS 140-2 [16]) provides robust data protection; however, evaluate and determine the appropriate level of security based on organizational needs and risk assessments.
    8. Leverage privacy-preserving techniques 
    There are several privacy-preserving techniques [17] that can be leveraged for increased data security. Note that there may be practical limitations to their implementation due to computational cost.

    • Data depersonalization techniques (e.g., data masking [18]) involve replacing sensitive data with inauthentic but realistic information that maintains the distributions of values throughout the dataset. This enables AI systems to utilize datasets without exposing sensitive information, reducing the impact of data breaches and supporting secure data sharing and collaboration. When possible, use data masking to facilitate AI model training and development without compromising sensitive information (e.g., personally identifiable information [PII]).
    • Differential privacy is a framework that provides a mathematical guarantee quantifying the level of privacy of a dataset or query. It requires a pre-specified privacy budget for the level of noise added to the data, but there are tradeoffs between protecting the training data from membership inference techniques and target task accuracy. Refer to [17] for further details.
    • Decentralized learning techniques (e.g., federated learning [19]) permit AI system training over multiple local datasets with limited sharing of data among local instances. An aggregator model incorporates the results of the distributed models, limiting access on the local instance to the larger training dataset. Secure multi-party computation is recommended for training and inferencing processes.

    9. Delete data securely
    Prior to repurposing or decommissioning any functional drives used for AI data storage and processing, erase them using a secure deletion method such as cryptographic erase, block erase, or data overwrite. Refer to NIST SP 800-88, “Guidelines for Media Sanitization,” [20] for guidance on appropriate deletion methods.
    10. Conduct ongoing data security risk assessments
    Conduct ongoing risk assessments using industry-standard frameworks, such as the NIST SP 800-3r2, Risk Management Framework (RMF) [4][21], and the NIST AI 100-1, Artificial Intelligence RMF [3]. These assessments should evaluate the AI data security landscape, identify risks, and prioritize actions to minimize security incidents. Continuously improve data security measures to keep pace with evolving threats and vulnerabilities, learn from security incidents, stay up to date with emerging technologies, and maintain a robust security posture. 

    Data supply chain – risks and mitigations

    Relevant AI Lifecycle stages: 1) Plan & Design; 2) Collect & Process Data; 3) Build & Use Model; 4) Verify & Validate; 5) Deploy & Use; 6) Operate & Monitor

    Developing and deploying secure and reliable AI systems requires understanding potential risks and methods of introducing inaccurate or maliciously modified (a.k.a. “poisoned”) data into the system. In short, the security of AI systems depends on thorough verification of training data and proactive measures to detect and prevent the introduction of inaccurate material.

    Threats can stem from large-scale data collected and curated by third parties, as well as from data that is not sufficiently protected after ingestion. Data collected and/or curated by a third party may contain inaccurate information, either unintentionally or through malicious intent. Inaccurate material can compromise not only models trained using that data, but also any additional models that rely on compromised models as a foundation.  

    It is crucial, therefore, to verify the integrity of the training data used when building an AI system. Organizations that utilize third-party data must take appropriate measures to ensure that: 1) the data is not compromised upon ingestion; and 2) the data cannot be compromised after it has been incorporated into the AI system. As such, both data curators and data consumers should follow the best practices for digital signatures, data integrity, and data provenance that are described in detail above.

    General risks for data consumers3 

    The use of web-scale databases includes all of the risks outlined earlier, and one cannot simply assume that these datasets are clean, accurate, and free of malicious content. Third-party models trained on web-scraped data used to train a model for downstream tasks could also affect the model’s learning process and result in behavior that was unintended by the AI system designer.

    From the moment data is ingested for use with AI systems, the data acquirer must secure it against insider threats and malicious network activity to prevent unauthorized modification. 

    Mitigation strategies: 

    • Dataset verification: Before ingest, the consumer or curator should verify, as much as possible, that the dataset to be ingested is free of malicious or inaccurate material. Any detected abnormalities should be addressed, and suspicious data should not be stored. The dataset verification process should include a digital signature of the dataset at time of ingestion.
    • Content credentials: Use content credentials to track the provenance of media and other data. Content credentials are “metadata that are secured cryptographically and allow creators the ability to add information about themselves or their creative process, or both, directly to media content…. Content Credentials securely bind essential metadata to a media file that can track its origin(s), any edits made, and/or what was used to create or modify the content…. This metadata alone does not allow a consumer to determine whether a piece of content is ‘true,’ but rather provides contextual information that assists in determining the authenticity of the content.” [24]
    • Foundation model assurances: In the case where a consumer is not ingesting a dataset but a foundation model trained by another party, the developers of the foundation model need to be able to provide assurances regarding the data and sources used and certify that their training data did not contain any known compromised data. Take care to track the training data used in various model lineages. Exercise caution before using a model without such assurances.
    • Require certification: Data consumers should strongly consider requiring a formal certification from dataset and model providers, attesting that their systems are free from known compromised data before using third-party data and/or foundation models.
    • Secure storage: After ingest, data needs to be stored in a database that adheres to the best practices for digital signatures, data integrity, and data provenance that are described in detail above. Note that an append-only cryptographically signed database should be used where feasible, but there may be a need to delete older material that is no longer relevant. Each time a data element is updated (e.g., resized, cropped, flipped, etc.) for augmentation purposes in a non-temporary fashion, then the updated data should be stored as a new entry with documented changes. The database’s certificate should be verified at the time the database is accessed for a training run. If the database does not pass the certificate check, abort the training and conduct a comprehensive database audit to discover any data modifications. 

    2023 investigations by various industry professionals explored low-resource methods for introducing malicious or inaccurate material into web-scale datasets, and potential strategies to mitigate this risk.  [29] These vulnerabilities depend on the fact that curators or collectors do not have control over the data, as seen in cases of datasets curated by third parties (e.g., LAION) or datasets that are continually updated and released (e.g., Wikipedia). 

    Risk: Curated web-scale datasets

    Curated AI datasets (e.g., LAION-2B or COYO-700M) are vulnerable to a type of technique known as split-view poisoning. This risk arises because these datasets often contain data hosted on domains that may have expired or are no longer actively maintained by their original owners. In such cases, anyone who purchases these expired domains gains control over the content hosted on them. This situation creates an opportunity for malicious actors to modify or replace the data that the curated list points to, potentially introducing inaccurate or misleading information into the dataset. In many instances, it is possible to purchase enough control of a dataset to conduct effective poisoning for roughly $1,000 USD. In some cases, effective techniques can cost as little as $60 USD (e.g., COYO-700M), making this a viable threat from low-resource threat actors. 

    Mitigation strategies:

    • Raw data hashes: Data curators should attach a cryptographic hash to all raw data referenced in the dataset. This will enable follow-on data consumers to verify that the data has not changed since it was added to the list.
    • Hash verification: Data consumers should incorporate a hash check at time of download in order to detect any changes made to it, and the downloader should discard any data that does not pass the hash check.
    • Periodic checks: Curators should periodically scrape the data themselves to verify that the data has not been modified. If any changes are detected, the curator should take appropriate steps to ensure the data’s integrity.
    • Verifying data: Curators should verify that any changed data is clean and free from inaccurate or malicious material. If the content of the data has been altered in any way, the curator should either remove it from their list or flag it for further review.
    • Certification by curators: Since the data supply chain begins with the curators, the certification process must start there as well. To the best of their ability, curators should be able to certify that, at the time of publication, the dataset contains no malicious or inaccurate material. 

    Risk: Collected web-scale datasets

    Collected web-scale datasets (e.g., Wikipedia) are vulnerable to frontrunning poisoning techniques. Frontrunning poisoning occurs when an actor injects malicious examples in a short time window before websites with crowd-sourced content collect a snapshot of their data. Wikipedia in particular conducts twice-monthly snapshots of their data and publishes these snapshots for people to download. Since the snapshots happen at known times, it is possible for malicious actors to edit pages close enough to the snapshot time so that malicious edits will be captured and published before they can be discovered and corrected. Industry analysis demonstrated potential malicious actors would be able to successfully poison as much as 6.5% of Wikipedia. [29]

    Mitigation strategies:

    • Test & verify web-scale datasets: Be cautious when using web-scale datasets that are vulnerable to frontrunning poisoning. Check that the data hasn’t been manipulated, and only use snapshots verified by a trusted party.
    • (For web-scale data collectors) Randomize or lengthen snapshots: Collectors such as Wikipedia should defend against actors making malicious edits ahead of a planned snapshot by:
    1. Randomizing the snapshot order.
    2. Freezing edits to content long enough for edits to go through review before releasing the snapshot.

      These mitigations focus on increasing the amount of time a malicious actor must maintain control of the data for it to be included in the published snapshot. Any reasonable methods that increase the time a malicious actor must control the data are also recommended. 

      Note that these mitigations are limited since they rely on trusted curators who can detect malicious edits. It is more difficult to defend against subtle edits (e.g., attempts to insert hidden watermarks) that appear valid to human reviewers but impact machine understanding.

    Risk: Web-crawled datasets 

    Web-crawled datasets present a unique intersection of the risks discussed above. Since web-crawled datasets are substantially less curated than other web-scale datasets, they bring increased risk. There are no trusted curators to detect malicious edits. There are no original curated views to which cryptographic hashes can be attached. The unfortunate reality is that “updates to a web page have no realistic bound on the delta between versions which might act as a signal for attaching trust.” [29]

    Mitigation strategies:

    • Consensus approaches: Data consumers using web-crawled datasets should rely on consensus-based approaches, since notional determinations of which domains to trust are ad-hoc and insufficient. For example, an AI developer could choose to only trust an image-caption pair when it appears on many different websites to reduce susceptibility to poisoning techniques, since a malicious actor would have to poison a sufficiently large number of websites to be successful.
    • Data curation: Ultimately, it is incumbent on organizations to ensure malicious or inaccurate material is not present in the data they use. If an organization does not have resources to conduct the necessary due diligence, then the use of web-crawled datasets is not recommended until some sort of trust infrastructure can be implemented.

    Final note on web-scale datasets and data poisoning

    Both split-view and frontrunning poisoning are reasonably straightforward for a malicious actor to execute, since they do not require particularly sophisticated methodology. These poisoning techniques should be considered viable threats by anyone looking to incorporate web-scale data into their AI systems. The danger here comes not only from directly using compromised data, but also from using models which may themselves have been trained on compromised data. 

    Ultimately, data poisoning must be addressed from a supply chain perspective by those who train and fine-tune AI models. Proper supply chain integrity and security management (i.e., selecting reliable model providers and verifying the legitimacy of the models used) can reduce the risk of data poisoning and system compromise. The most reliable providers are those who assure that they do everything possible to prevent the influence and distribution of poisoned data and models. [34] 

    Every effort must be made by those building foundation models to filter out malicious and inaccurate data. Foundation models are evolving rapidly, and filtering out inaccurate, unauthorized, and malicious training data is an active area of research, particularly at web-scale. As such, is currently impractical to prescribe precise methods for doing so; it is a best-effort endeavor. Ideally, data curators and foundation model providers should be able to attest to their filtering methods and provide evidence (e.g. test results) of their effectiveness. Likewise, if possible, downstream model consumers should include a review of the security claims as part of their security processes before accepting a foundation model for use. 

    Maliciously modified data – risks and mitigations

    Relevant AI Lifecycle stages: 2) Collect & Process Data; 3) Build & Use Model; 4) Verify & Validate; 5) Deploy & Use; 6) Operate & Monitor

    Maliciously modified data presents a significant threat to the accuracy and integrity of AI systems. Deliberate manipulation of data can result in inaccurate outcomes, poor decisions, and compromised security. Note that there are also risks associated with unintentional data errors and duplications that can affect the security and performance of AI systems. Challenges like adversarial machine learning threats, statistical bias, and inaccurate information can impact the overall security of AI-driven outcomes.

    Risk: Adversarial Machine Learning threats

    Adversarial Machine Learning (AML) threats involve intentional, malicious attempts to deceive, manipulate, or disrupt AI systems. [7],[17],[22] Malicious actors employ data poisoning to corrupt the learning process, compromising the integrity of training datasets and leading to unreliable or malicious model behavior. Additionally, malicious actors may introduce adversarial examples into datasets that, while subtle, can evade correct classification, thereby undermining the model’s performance. Furthermore, sensitive information in training datasets can be indirectly extracted through techniques like model inversion4, posing significant data security risks.

    Mitigation Strategies:

    • Anomaly detection: Incorporate anomaly detection algorithms during data pre-processing to identify and remove malicious or suspicious data points before training. These algorithms can recognize statistically deviant patterns in the data, making it possible to isolate and eliminate poisoned inputs.
    • Data sanitization: Sanitize the training data by applying techniques like data filtering, sampling, and normalization. This helps reduce the impact of outliers, noisy data, and other potentially poisoned inputs, ensuring that models learn from high-quality, representative datasets. Perform sanitization on a regular basis, especially prior to each and every training, fine-tuning, or any other process that adjusts model parameters.
    • Secure training pipelines: Secure data collection, pre-processing, and training pipelines to prevent malicious actors from tampering with datasets or model parameters.
    • Ensemble methods / collaborative learning: Implement collaborative learning frameworks that combine an ensemble of multiple, distinct AI models to reach a consensus on output predictions. This approach can help counteract the impact of data poisoning, since malicious inputs may only affect a subset of the collaborative models, allowing the majority to maintain accuracy and reliability.
    • Data anonymization: Implement anonymization techniques to protect sensitive data attributes, keeping them confidential while allowing AI models to learn patterns and generate accurate predictions.

    Risk: Bad data statements

    Bad data statements5 [7][23], such as missing metadata, can significantly influence AI data security by introducing data integrity issues that can lead to faulty model performance. Error-free metadata provides valuable contextual information about the data, including its structure, purpose, and collection methods. When metadata is missing, it becomes difficult to interpret data accurately and draw meaningful conclusions. This situation can result in incomplete or inaccurate data representation, compromising AI system performance and reliability. If metadata is modified by a malicious actor, then the security of the AI system is also at risk.

    Mitigation strategies:

    • Metadata management: Implement strong data governance practices to help ensure metadata is well-documented, complete, accurate, and secured.
    • Metadata validation: Establish data validation processes to check the completeness and consistency of metadata before data is used for AI training.
    • Data enrichment: Use available resources, such as reference data and trusted third-party data, to supplement missing metadata and improve the overall quality of the training data.

    Risk: Statistical bias6 

    Robust data security and collection practices are key to mitigating statistical bias. Executive Order (EO) 14179 mandates that U.S. government entities “develop AI systems that are free from ideological bias or engineered social agendas.” [25] Note that “an AI system is said to be biased when it exhibits systematically inaccurate behavior.” [26] Statistical bias in AI systems can arise from artifacts present in training data that can lead to artificially slanted or inaccurate outcomes. Sampling biases or biases in data collection can affect the overall outcomes and performance of AI. Left unaddressed, statistical bias can degrade the accuracy and effectiveness of AI systems. 

    Mitigation strategies:

    • Regular training data audits: Regularly audit training data to detect, assess, and address potential issues that can result in systematically inaccurate AI systems.
    • Representative training data: Ensure that training data is representative of the totality of the information relevant to any given topic to reduce the risk of statistical bias. Also ensure that AI data is properly divided into training, development, and evaluation sets without overlap to properly measure statistical bias and other measures of performance.
    • Edge cases: Identify and mitigate edge cases that can cause models to malfunction.
    • Test and correct for statistical bias: Create a repository with instances of observed model output bias. Leverage that information to improve training data audits and with reinforcement learning to “undo” some of the measured bias.

    Risk: Data poisoning via inaccurate information

    One form of data poisoning (sometimes referred to as “disinformation” [27]) involves the intentional insertion of inaccurate or misleading information in AI training datasets, which can negatively impact AI system performance, outcomes, and decision-making processes. 

    Mitigation strategies:

    • Remove inaccurate information from training data: Identify and remove inaccurate or misleading information from AI datasets to the extent feasible.
    • Data provenance and verification: Implement provenance verification mechanisms during data collection to help ensure that only accurate and reliable data is used. This process can include methods such as cross-verification, fact-checking, source analysis, data provenance tracking, and content credentials.
    • Add more training data: Increasing the amount of non-malicious data makes training more robust against poisoned examples—provided that these poisoned examples are small in number. One way to do this is through data augmentation—the creation of artificial training set samples that are small variations of existing samples. The goal is to “outnumber” the poisoned samples so the model “forgets” them. Note that this mitigation can only be applied during training, and therefore does not apply to an already trained model. [28]
    • Data quality control: Perform quality control on data including detecting poisoned samples through integrity checks, statistical deviation, or pattern recognition. Proactively implement data quality controls during the training phase to prevent issues before they arise in production.

    Risk: Data duplications

    Unintended duplicate data elements [7] in training datasets can skew model performance and cause overfitting, reducing the AI model’s ability to generalize across a variety of real-world applications. Duplicates are not always exact; near-duplicates may contain minor differences like formatting, abbreviations, or errors, which makes detecting them more complex. Duplicate data often leads to inaccurate predictions, making the AI system less effective in real-world applications.

    Mitigation strategies:

    • Data deduplication: Implement deduplication techniques (such as fuzzy matching, hashing, clustering, etc.) to carefully identify and handle duplicates and near-duplicates in the data.

    Data drift – risks and mitigations

    Relevant AI Lifecycle stages: 5) Deploy & Use; 6) Operate & Monitor

    Data drift, or distribution shift, refers to changes in the underlying statistical properties of the input data to an operational AI system. Over time, the input data can become significantly different from the data originally used to train the model. [7],[8] Degradation caused by data drift is a natural and expected occurrence, and AI system developers and operators need to regularly update models to maintain accuracy and performance. Data drift ordinarily begins as small, seemingly insignificant degradations in model performance. Left unchecked, the degradation caused by data drift can snowball into substantial reductions in AI system accuracy and integrity that become increasingly difficult to correct. 

    It is crucial to distinguish between data drift and data poisoning attacks designed to affect an AI model. Continuous monitoring of system accuracy and performance provides important indicators based on the nature of the changes observed. If the changes are slow and gradual over time, it is more likely that the model is experiencing data drift. If the changes are abrupt and dramatic in one or more dimensions, it is more likely that an actor is trying to compromise the model. Cyber compromises often aim to manipulate the model’s performance quickly and significantly, leading to abrupt changes in the input data or model outputs.

    AI system operators and developers should employ a wide range of techniques for detecting and mitigating data drift, including data preprocessing, increasing dataset coverage of real-world scenarios, and adopting robust training and adaptation strategies. [30] Packages that automate dataset loading assist AI system developers in creating application-specific detection and mitigation techniques for data drift.

    There are many potential causes of data drift, including: 

    1. A change in the upstream data pipeline not represented in the model training data (e.g., the units of a particular data element change from miles to kilometers)
    2. The introduction of completely new data elements that the model had not previously seen (e.g., a new type of malware not recognized in the ML layer of an anti-virus product)
    3. A change in the context of how inputs and outputs are related (e.g., a change in organizational structure due to a merger or acquisition could lead to new data access patterns that might be misinterpreted as security threats by an AI system)

    The data associated with a given AI model should be regularly checked for any updates to help ensure the model still predicts as expected. [7],[8],[9] The interval for this update and check will depend on the particular AI system and application. For example, in high-stakes applications such as healthcare, early detection and mitigation of data drift are critical prior to patient impact. Thus, continuous monitoring of model performance with additional direct analysis of the input data is important in such applications. [30] 

    Mitigation strategies:

    • Data management: Employ a data management strategy in keeping with the best practices in this CSI to help ensure that it is easy to add and track new data elements for model training and adaptation. This management strategy enables identification of data elements causing drift for appropriate mitigation or action.
    • Data-quality testing: AI system developers should use data-quality assessment tools to assist in selecting and filtering data used for model training or adaptation. Understanding the current dataset and its impact on model behavior is critical to detecting data drift.
    • Input and output monitoring: Monitor the AI system inputs and outputs to verify the model is performing as expected. [9] Regularly update your model using current data. Utilize meaningful statistical methods that measure expected dataset metrics and compare the distribution of the training data to the test data to help determine if data drift is occurring. [7] 

    Data management tools and methods are currently an active area of research. However, data drift can be mitigated by incorporating application-specific data management protocols that include: continuous monitoring, retraining (regularly incorporating the latest data into the models), data cleansing (correcting errors or inconsistencies in the data), and using ensemble models (combining predictions of multiple models). Incorporation of a data management framework into the design of AI systems from the beginning is essential for improving the overall integrity and security posture. [31]

    Conclusion

    Data security is of paramount importance when developing and operating AI systems. As organizations in various sectors rely more and more on AI-driven outcomes, data security becomes crucial for maintaining accuracy, reliability, and integrity. The guidance provided in this CSI outlines a robust approach to securing AI data and addressing the risks associated with the data supply chain, malicious data, and data drift.

    Data security is an ever-evolving field, and continuous vigilance and adaptation are key to staying ahead of emerging threats and vulnerabilities. The best practices presented here encourage the highest standards of data security in AI while helping ensure the accuracy and integrity of AI-driven outcomes. By adopting these best practices and risk mitigation strategies, organizations can fortify their AI systems against potential threats and safeguard sensitive, proprietary, and mission critical data used in the development and operation of their AI systems. 

    References

    1 In this document, Artificial Intelligence (AI) has the meaning set forth in 15 U.S.C. 9401(3): 
    “… a machine-based system that can, for a given set of human-defined objectives, make predictions, recommendations, or decisions influencing real or virtual environments. AI systems use machine- and human-based inputs to:
      (A) Perceive real and virtual environments;
      (B) Take these perceptions and turn them into models through analysis in an automated manner; and
      (C) Use model inference to formulate options for information or action.”

    2 Data integrity is defined by the IC Data Management Lexicon [1] as “The degree to which data can be trusted due to its provenance, pedigree, lineage and conformance with all business rules regarding its relationship with other data. In the context of data movement, this is the degree to which data has verifiably not been changed unexpectedly by a person or NPE.”

    3 The term data consumers is defined as technical personnel (e.g. data scientists, engineers) who make use of data that they themselves did not produce or annotate to build and/or operate AI systems. 

    4 Model inversion refers to the process by which an attacker analyzes the output patterns of an AI system to reverse-engineer and uncover details about the training dataset, such as individual data points or patterns. This process can potentially expose confidential or proprietary information from the data that was used to train the AI models.

    5 “A data statement is a characterization of a dataset that provides context to allow developers and users to better understand how experimental results might generalize, how software might be appropriately deployed, and what biases might be reflected in systems built on the software.” [23] 

    6 “In technical systems, bias is most commonly understood and treated as a statistical phenomenon. Bias is an effect that deprives a statistical result of representativeness by systematically distorting it, as distinct from random error, which may distort on any one occasion but balances out on the average.” [26],[32] 

    Works cited

    [1] Office of the Director of National Intelligence. The Intelligence Community Data Management Lexicon. 2024. https://dni.gov/files/ODNI/documents/IC_Data_Management_Lexicon.pdf   
    [2] National Security Agency et al. Deploying AI Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems. 2024. https://media.defense.gov/2024/Apr/15/2003439257/-1/-1/0/CSI-DEPLOYING-AI-SYSTEMS-SECURELY.PDF  
    [3] National Institute of Standards and Technology (NIST). NIST AI 100-1: Artificial Intelligence Risk Management Framework (AI RMF 1.0). 2023. https://doi.org/10.6028/NIST.AI.100-1  
    [4] NIST. NIST Special Publication 800-37 Rev. 2: Guide for Applying the Risk Management Framework to Federal Information Systems. 2018. https://doi.org/10.6028/NIST.SP.800-37r2  
    [5] NIST. Federal Information Processing Standards Publication (FIPS) 204: Module-Lattice-Based Digital Signature Standard. 2024. https://doi.org/10.6028/NIST.FIPS.204  
    [6] NIST. FIPS 205: Stateless Hash-Based Digital Signature Standard. 2024. https://doi.org/10.6028/NIST.FIPS.205  
    [7] Bommasani, R. et al. On the Opportunities and Risks of Foundation Models. arXiv:2108.07258v3. 2022. https://arxiv.org/abs/2108.07258v3  
    [8] Securing Artificial Intelligence (SAI); Data Supply Chain Security. ESTI GR SAI 002 V1.1.1. 2021. https://etsi.org/deliver/etsi_gr/SAI/001_099/002/01.01.01_60/gr_SAI002v010101p.pdf  
    [9] National Cyber Security Centre et al. Guidelines for Secure AI System Development. 2023. https://www.ncsc.gov.uk/files/Guidelines-for-secure-AI-system-development.pdf  
    [10] NIST. NIST Special Publication 800-207: Zero Trust Architecture. 2020. https://doi.org/10.6028/NIST.SP.800-207  
    [11] NIST. NIST IR 8496 ipd: Data Classification Concepts and Considerations for Improving Data Protection. 2023. https://doi.org/10.6028/NIST.IR.8496.ipd  
    [12] Cybersecurity and Infrastructure Security Agency (CISA), NSA, and NIST. Quantum-Readiness: Migration to Post-Quantum Cryptography. 2023. https://www.cisa.gov/resources-tools/resources/quantum-readiness-migration-post-quantum-cryptography 
    [13] NIST. FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard. 2024. https://doi.org/10.6028/NIST.FIPS.203  
    [14] NIST. NIST SP 800-52 Rev. 2: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. 2019. https://doi.org/10.6028/NIST.SP.800-52r2  
    [15] NIST. FIPS 140-3, Security Requirements for Cryptographic Modules. 2019. https://doi.org/10.6028/NIST.FIPS.140-3    
    [16] NIST. FIPS 140-2, Security Requirements for Cryptographic Modules. 2001. https://doi.org/10.6028/NIST.FIPS.140-2  
    [17] NIST. NIST AI 100-2e2023: Trustworthy and Responsible AI, Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. 2024. https://doi.org/10.6028/NIST.AI.100-2e2023  
    [18] Adak, M. F., Kose, Z. N., & Akpinar, M. Dynamic Data Masking by Two-Step Encryption. In 2023 Innovations in Intelligent Systems and Applications Conference (ASYU) (pp. 1-5). IEEE. 2023 https://doi.org/10.1109/ASYU58738.2023.10296545    
    [19] Kairouz, P. et al. Advances and Open Problems in Federated Learning. Foundations and Trends in Machine Learning 14 (1-2): 1-210. arXiv:1912.04977. 2021. https://arxiv.org/abs/1912.04977  
    [20] NIST. NIST SP 800-88 Rev. 1: Guidelines for Media Sanitization. 2014. https://doi.org/10.6028/NIST.SP.800-88r1  
    [21] NIST. NIST Special Publication 800-3 Rev. 2: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. 2018. https://doi.org/10.6028/NIST.SP.800-37r2  
    [22] U.S. Department of Homeland Security. Preparedness Series June 2023: Risks and Mitigation Strategies for Adversarial Artificial Intelligence Threats: A DHS S&T Study. 2023. https://www.dhs.gov/sites/default/files/2023-12/23_1222_st_risks_mitigation_strategies.pdf  
    [23] Bender, E. M., & Friedman, B. Data Statements for Natural Language Processing: Toward Mitigating System Bias and Enabling Better Science. Transactions of the Association for Computational Linguistics (TACL) 6, 587–604. 2018. https://doi.org/10.1162/tacl_a_00041  
    [24] NSA et al. Content Credentials: Strengthening Multimedia Integrity in the Generative AI Era. 2025. https://media.defense.gov/2025/Jan/29/2003634788/-1/-1/0/CSI-CONTENT-CREDENTIALS.PDF  
    [25] Executive Order (EO) 14179: “Removing Barriers to American Leadership in Artificial Intelligence” https://www.federalregister.gov/executive-order/14179   
    [26] NIST. NIST Special Publication 1270: Framework for Identifying and Managing Bias in Artificial Intelligence. 2023. https://doi.org/10.6028/NIST.SP.1270  
    [27] NIST. NIST AI 600-1: Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile. 2023. https://doi.org/10.6028/NIST.AI.600-1  
    [28] Open Web Application Security Project (OWASP). AI Exchange. #Moretraindata. https://owaspai.org/goto/moretraindata/  
    [29] Carlini, N. et al. Poisoning Web-Scale Training Datasets is Practical. arXiv:2302.10149. 2023. https://arxiv.org/abs/2302.10149  
    [30] Kore, A., Abbasi Bavil, E., Subasri, V., Abdalla, M., Fine, B., Dolatabadi, E., & Abdalla, M. Empirical Data Drift Detection Experiments on Real-World Medical Image Data. Nature Communications 15, 1887. 2024. https://doi.org/10.1038/s41467-024-46142-w  
    [31] NIST. NIST Special Publication 800-208: Recommendation for Stateful Hash-Based Signature Schemes. 2020. https://doi.org/10.6028/NIST.SP.800-208  
    [32] The Organisation for Economic Cooperation and Development (OECD). Glossary of statistical terms. 2008. https://doi.org/10.1787/9789264055087-en  
    [33] NIST. NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations. 2020. https://doi.org/10.6028/NIST.SP.800-53r5 
    [34] OWASP. AI Exchange. How to select relevant threats and controls? risk analysis. https://owaspai.org/goto/riskanalysis/  

    Disclaimer of Endorsement

    The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring organizations’ cybersecurity missions, including their responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders. 

    Notice of Generative AI Use

    Generative AI technology was carefully and responsibly used in the development of this document. The authors maintain ultimate responsibility for the accuracy of the information provided herein.

    Contact 

    U.S. Organizations

    National Security Agency

    Australian organizations

    • Visit cyber.gov.au/report or call 1300 292 371 (1300 CYBER1) to report cybersecurity incidents and vulnerabilities.

    New Zealand organizations

    MIL OSI USA News

  • MIL-OSI USA: THE PCH IS REOPENING: Governor Newsom, local partners will reopen the iconic roadway ahead of schedule and in time for Memorial Day Weekend

    Source: US State of California 2

    May 22, 2025

    What you need to know: The Pacific Coast Highway, which was closed following the Palisades Fire, will reopen to public travel ahead of schedule this Friday in advance of Memorial Day Holiday. 

    LOS ANGELES – Following through on his commitment to reopen a critical stretch of highway that connects beach communities and businesses in Los Angeles in time for the busy summer season, Governor Gavin Newsom today announced that State Route 1/Pacific Coast Highway (PCH) will reopen to all drivers at 8 a.m. Friday, May 23, in time for the Memorial Day weekend. 

    The opening comes ahead of schedule for the “end of May” deadline set by the Governor last month and with up to two lanes in each direction available to travelers. The roadway had previously only been open to first responders, construction crews and local residents. 

    “In California, we get stuff done, period. We’re opening the PCH back up early, with more lanes before Angelenos hit the road this Memorial Day. We are able to do this thanks to the tireless work of hundreds of construction and road crews and with help from our partners at the Army Corps of Engineers.”

    Governor Gavin Newsom

    The race to reopen the highway and clear parcels along the Pacific Ocean was performed in close coordination with local partners from the City and County of Los Angeles. All parties worked urgently to support local businesses who rely on summer visitors and tourism for critical revenue. 

    A robust security presence will remain at the neighborhood level following the highway reopening. Los Angeles Mayor Karen Bass has directed LAPD to continue its increased deployment in the Palisades, including staffing check points 24 hours a day. 

    “The reopening of Pacific Coast Highway marks an important step forward in our recovery effort in the Palisades, which is on track to be the fastest in state history,” said Los Angeles Mayor Karen Bass. “I thank Governor Newsom, the U.S. Army Corps of Engineers, and partners at all levels of government for their partnership and collaboration as we work around the clock to get families home and businesses reopened. As Pacific Coast Highway reopens, we will continue to protect the safety and security of Palisades neighborhoods through a strict security plan established in coordination with the State. All of us have a shared goal – to ensure residents can safely and quickly rebuild and return to their community. We will continue working together toward that goal and recommit to clearing any barrier that stands in the way of recovery.” 

    Last month, the Governor directed his Office of Emergency Services and Caltrans to work closely with the United States Army Corps of Engineers (USACE) to prioritize the cleanup of parcels along PCH by surging additional crews into the area so that these parcels can be cleared of debris quickly. 

    With the busy summer months along the coast fast approaching, crews have worked around the clock – literally 24/7 – to demolish the damaged and collapsed homes, remove toxic ash and soot, repair the roadways, and install new utility equipment. 

    “I’m grateful to Governor Newsom and the State for their unwavering partnership in keeping the Pacific Palisades safe over the past four and a half months. The reopening of PCH marks an important milestone in our recovery, but the work is far from over. As we enter this next phase, safety must remain our top priority — for residents, workers, and everyone traveling along the coast. I look forward to continuing this collaboration as we accelerate our rebuilding work.” said Los Angeles City Councilwoman Traci Park, who represents the Palisades. 

    “Instead of having to hang a u-turn on PCH, Angelenos can now ‘hang ten’ with Malibu businesses and residents. I want to offer a big thanks to federal, state, and local partners who made this happen!” said Assemblymember Jacqui Irwin. 

    “I’m grateful for the men and women who have worked day-in and day-out to get us to this point and the support from the Administration and local partners that has helped make this recovery effort move quickly. The reopening of PCH is an important milestone that will relieve badly impacted businesses and help impacted communities get back on their feet,” said State Senator Ben Allen.

    “As we recover from the Palisades Fire, Governor Newsom’s reopening of PCH marks an important step in reconnecting our communities. Safety remains our top priority. Our Sheriff’s Department will have elevated patrols to ensure that both our unincorporated communities and the City of Malibu receive the public safety support needed during this transition. We must stay vigilant as debris removal and recovery efforts continue,” said Los Angeles County Supervisor Lindsey Horvath. 

    “I’m extremely proud of our teams and partners whose relentless dedication has led to the successful completion of more than 5,500 properties—representing over half of all currently eligible properties in both areas impacted by these devastating wildfires. Clearing critical areas along the Pacific Coast Highway has been particularly vital, given its sensitive ecological importance and its role as a lifeline for local communities. This effort exemplifies our unwavering commitment to environmental stewardship and community resilience,” said Brig. Gen. William Hannan, Commanding General, U.S. Army Corps of Engineers, Task Force Phoenix.

    “The reopening of Pacific Coast Highway marks an important step in Malibu’s ongoing recovery from the recent wildfires. While significant challenges remain, this development helps restore limited access for residents and travelers along the coast. We recognize the coordinated efforts by Governor Newsom’s office, Caltrans, the LA County Sheriff’s Department, the Army Corps of Engineers, and the National Guard in addressing fire debris removal. Their involvement has contributed to making this reopening possible, though much work lies ahead. The City remains focused on ensuring public safety as we enter the summer season, and we continue to monitor conditions closely,” said Malibu Mayor Marianne Riggins.

    “Pacific Palisades Chamber of Commerce is deeply grateful to Governor Newsom for hastening the cleanup and reopening of Pacific Coast Highway, and to the National Guard for protecting Malibu so diligently. Opening PCH will be like the sun finally rising after a long, dark night for Malibu’s remaining businesses, which have struggled valiantly to survive. Truly this is a moment of truth. Here’s hoping visitors will drive out, ready to enjoy the gorgeous beaches and take time to shop and dine. Malibu’s iconic town is counting on it,” said Malibu Pacific Palisades Chamber CEO Barbara Bruderlin.

    “The reopening of PCH is great news for Santa Monica and all beachfront businesses. The business community is ready to welcome back everyone to stunning ocean views, culinary delights at local restaurants, peaceful getaways at coastal hotels, and loads of fun on the Santa Monica Pier. Easy access to our vibrant coastal community is critical for businesses to thrive now more than ever,” said Santa Monica Chamber CEO Judy Kruger.

    This rapid pace of reopening PCH is part of a broader effort by the state to accelerate the cleanup and recovery from the devastating LA Fires. Previously, more than 9,000 properties were cleared of hazardous materials in record time and already more than 7,600 homes sites have been cleared of ash, soot and debris across Los Angeles and 5,600 lots have been signed off. The governor has also signed numerous executive orders to expedite the rebuilding process and cut red tape on permitting. 

    As part of the cleanup on PCH and in the Pacific Palisades more than 100 USACE crews (consisting of excavators, metal crushing equipment, and dump trucks) continue working to clear parcels damaged along the PCH removing nearly 1,284 truckloads of debris per day.

    What to Expect for Travelers 

    • Be aware that repairs will continue even after two lanes in both directions are opened to the public.
    • For the safety of repair crews and first responders, drivers are asked to please use caution while driving through the area, Move Over if possible, and slow down. A 25 mile per hour speed limit will remain in effect. 
    • Due to the volume of traffic expected over the holiday weekend and ongoing construction, drivers should expect delays on PCH. Please allow extra time for travel or find an alternate route to your destination.
    • Caltrans and CHP reminds drivers that traffic fines can be doubled in an active work zone.

    To stay up to date on the latest and track progress in wildfire recovery visit: https://www.ca.gov/LAfires/

    Press releases, Recent news

    Recent news

    News Sacramento, California – Governor Gavin Newsom today issued a proclamation declaring May 22, 2025, as “Harvey Milk Day.”The text of the proclamation and a copy can be found below: PROCLAMATIONToday, we honor Harvey Milk – a hero for not just his own community,…

    News SACRAMENTO – Governor Gavin Newsom today announced the following appointments:Armen Meyer, of San Francisco, has been appointed Senior Deputy Commissioner for the Division of Consumer Financial Protection at the California Department of Financial Protection and…

    News SACRAMENTO – Governor Gavin Newsom today announced the following appointments:Matthew Read, of Sacramento, has been appointed Chief Counsel at the Governor’s Office of Land Use and Climate Innovation. Read has been Acting Chief Counsel at the Governor’s Office of…

    MIL OSI USA News

  • MIL-OSI Security: U.S. Attorneys for Southwestern Border Districts Charge More than 1100 Illegal Aliens with Immigration-Related Crimes During the Third Week in May as part of Operation Take Back America

    Source: United States Attorneys General

    Since the inauguration of President Trump, the Department of Justice is playing a critical role in Operation Take back America, a nationwide initiative to repel the invasion of illegal immigration, achieve total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    Last week, the U.S. Attorneys for Arizona, Southern California, New Mexico, Southern Texas, and Western Texas charged more than 1100 defendants with Criminal violations of U.S. immigration laws.

    The Southern District of Texas filed a total of 209 cases in immigration and border security-related matters from May 9-15. As part of the cases, 78 face allegations of illegally reentering the country. The majority have prior felony convictions for narcotics, violent crime, sexual offenses, prior immigration crimes and more. A total of 124 people face charges of illegally entering the country, while seven cases allege various instances of human smuggling.

    The Western District of Texas filed 295 new immigration and immigration-related criminal cases from May 9 through May 15. Among the new cases, Mexican nationals Juan Jose Medrano-Escobedo and Rosendo Dominguez-Morales were arrested after allegedly entering the U.S. illegally through the Texas National Defense Area (Tx-NDA) less than half a mile west of the Paso Del Norte Port of Entry in El Paso. Medrano-Escobedo has been previously removed from the U.S. to Mexico twice, most recently July 30, 2024. He has been convicted of three felonies, including evading arrest in 2017 and aggravated assault with a deadly weapon in November 2023. Dominguez-Morales was last removed on Aug. 20, 2024, following an Aug. 18, 2024 felony conviction for assault while displaying a dangerous weapon. Medrano-Escobedo and Dominguez-Morales are each charged with two counts related to violating defense property security regulation and one count of illegal re-entry.

    The District of Arizona brought immigration-related criminal charges against 310 individuals. Specifically, the United States filed 125 cases in which aliens illegally re-entered the United States, and the United States also charged 170 aliens for illegally entering the United States. In its ongoing effort to deter unlawful immigration, the United States charged 15 individuals responsible for smuggling illegal aliens into and within the District of Arizona.

    The Southern District of California filed 153 border-related cases this week, including charges of assault on a federal officer, bringing in aliens for financial gain, reentering the U.S. after deportation, and importation of controlled substances. One of these cases included a man who was arrested and charged with illegal importation of cocaine. According to a complaint, Luque applied for entry through the Calexico, California East Port of Entry in a Kenworth truck towing a car hauler. Upon inspection of the trailer, Customs and Border Protection officers found 92.18kg (203.22 pounds) of cocaine concealed in the frame of the trailer.

    The District of New Mexico filed 212 criminal charges related to immigration and border security-related matters. 68 individuals were charged with Illegal Reentry After Deportation (8 U.S.C. 1326). 8 individuals were charged with Alien Smuggling (8 U.S.C. 1324). Three individuals were charged with Illegal Entry (8 U.S.C. 1325). And 133 individuals were charged with Illegal Entry (8 U.S.C. 1325) and 50 U.S.C. 797, violation of a military security regulation, arising from the newly established National Defense Area in New Mexico. Many of the defendants charged pursuant to 18 U.S.C. 1326 had prior criminal convictions for alien smuggling, drug possession, and DUI.

    We are grateful for the hard work of our border prosecutors in bringing these cases and helping to make our border safe again.

    MIL Security OSI

  • MIL-OSI USA: Rep. Clyde Applauds Reopening of Several USACE Parks & Boat Ramps at Lake Lanier

    Source: United States House of Representatives – Representative Andrew S. Clyde (R-GA)

    GAINESVILLE, GA — Today, Representative Andrew Clyde (GA-09) released the following statement after the U.S. Army Corps of Engineers (USACE) confirmed only 11 recreational sites on Lake Lanier operated by the USACE will be temporarily closed ahead of Memorial Day weekend, down from the previously planned 21 closures. Additionally, no boat ramps within open sites will be impacted by closures.

    “Upon being informed about the park and boat ramp closures on Tuesday, I pressed the U.S. Army Corps of Engineers to reach a more acceptable solution to safely increase access to sites on Lake Lanier,” said Clyde. “I’m pleased that more Lake Lanier boat ramps will be open, and only 11 recreational sites will be temporarily closed. This is a significant improvement from the previously planned total of 21 site closures, expanding residents and visitors’ safe access to parks. I encourage folks to plan ahead accordingly, stay safe, and enjoy Memorial Day weekend on Lake Lanier.”

    Background

    Earlier this week, 21 federal parks on Lake Lanier were closed due to staffing shortages and safety concerns. Following outreach from Rep. Clyde, the Army Corps provided additional rangers to safely open more boat ramps and additional recreational sites on Lake Lanier.

    Additional information on the temporary closures is available on the USACE’s website HERE.

    MIL OSI USA News

  • MIL-OSI: ESET participates in operation to disrupt the infrastructure of Danabot infostealer

    Source: GlobeNewswire (MIL-OSI)

    • ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure.
    • While primarily developed as an infostealer, Danabot also has been used to distribute additional malware, including ransomware.
    • Danabot’s authors promote their toolset through underground forums and offer various rental options to potential affiliates.
    • This ESET Research analysis covers the features used in the latest versions of the malware, the authors’ business model, and an overview of the toolset offered to affiliates.
    • Poland, Italy, Spain and Turkey are historically one of the most targeted countries by Danabot.

    PRAGUE and BRATISLAVA, Czech Republic, May 22, 2025 (GLOBE NEWSWIRE) — ESET has participated in a major infrastructure disruption of the notorious infostealer, Danabot, by the US Department of Justice, the FBI, and US Department of Defense’s Defense Criminal Investigative Service. U.S. agencies were working closely with Germany’s Bundeskriminalamt, the Netherlands’ National Police, and the Australian Federal Police. ESET took part in the effort alongside Amazon, CrowdStrike, Flashpoint, Google, Intel471, PayPal, Proofpoint, Team Cymru and Zscaler. ESET Research, which has been tracking Danabot since 2018, contributed assistance that included providing technical analysis of the malware and its backend infrastructure, as well as identifying Danabot’s C&C servers. During that period, ESET analyzed various Danabot campaigns all over the world, with Poland, Italy, Spain and Turkey historically being one of the most targeted countries. The joint takedown effort also led to the identification of individuals responsible for Danabot development, sales, administration, and more.

    “Since Danabot has been largely disrupted, we are using this opportunity to share our insights into the workings of this malware-as-a-service operation, covering the features used in the latest versions of the malware, the authors’ business model, and an overview of the toolset offered to affiliates. Apart from exfiltrating sensitive data, we have observed that Danabot is also used to deliver further malware, which can include ransomware, to an already compromised system,” says ESET researcher Tomáš Procházka, who investigated Danabot.

    The authors of Danabot operate as a single group, offering their tool for rental to potential affiliates, who subsequently employ it for their malicious purposes by establishing and managing their own botnets. Danabot’s authors have developed a vast variety of features to assist customers with their malevolent motives. The most prominent features offered by Danabot include: the ability to steal various data from browsers, mail clients, FTP clients, and other popular software; keylogging and screen recording; real-time remote control of the victims’ systems; file grabbing; support for Zeus-like webinjects and form grabbing; and arbitrary payload upload and execution. Besides utilizing its stealing capabilities, ESET Research has observed a variety of payloads being distributed via Danabot over the years. Furthermore, ESET has encountered instances of Danabot being used to download ransomware onto already compromised systems.

    In addition to typical cybercrime, Danabot has also been used in less conventional activities such as utilizing compromised machines for launching DDoS attacks… for example, a DDoS attack against Ukraine’s Ministry of Defense soon after the Russian invasion of Ukraine.

    Throughout its existence, according to ESET monitoring, Danabot has been a tool of choice for many cybercriminals and each of them has used different means of distribution. Danabot’s developers even partnered with the authors of several malware cryptors and loaders, and offered special pricing for a distribution bundle to their customers, helping them with the process. Recently, out of all distribution mechanisms ESET observed, the misuse of Google Ads to display seemingly relevant, but actually malicious, websites among the sponsored links in Google search results stands out as one of the most prominent methods to lure victims into downloading Danabot. The most popular ploy is packing the malware with legitimate software and offering such a package through bogus software sites or websites falsely promising users to help them find unclaimed funds. The latest addition to these social engineering techniques are deceptive websites offering solutions for fabricated computer issues, whose only purpose is to lure victims into execution of a malicious command secretly inserted into the user’s clipboard.

    The typical toolset provided by Danabot’s authors to their affiliates includes an administration panel application, a backconnect tool for real-time control of bots, and a proxy server application that relays the communications between the bots and the actual C&C server. Affiliates can choose from various options to generate new Danabot builds, and it’s their responsibility to distribute these builds through their own campaigns.

    “It remains to be seen whether Danabot can recover from the takedown. The blow will, however, surely be felt, since law enforcement managed to unmask several individuals involved in the malware’s operations,” concludes Procházka.

    For technical overview of Danabot and insight into its operation, check out ESET Research blogpost: “Danabot: Analyzing a fallen empire” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

    Worldwide Danabot detections as seen in ESET telemetry since 2018

    About ESET

    ESET® provides cutting-edge digital security to prevent attacks before they happen. By combining the power of AI and human expertise, ESET stays ahead of emerging global cyberthreats, both known and unknown— securing businesses, critical infrastructure, and individuals. Whether it’s endpoint, cloud, or mobile protection, our AI-native, cloud-first solutions and services remain highly effective and easy to use. ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24/7 real-time defense and strong local support, we keep users safe and businesses running without interruption. The ever-evolving digital landscape demands a progressive approach to security: ESET is committed to world-class research and powerful threat intelligence, backed by R&D centers and a strong global partner network. For more information, visit www.eset.com or follow our social media, podcasts and blogs.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/2306cbf1-1ef7-4040-8c12-ca8be3cc6689

    The MIL Network

  • MIL-OSI Video: 250 Years of Navy Medicine

    Source: United States Department of Defense (video statements)

    —————
    @USNavy Medicine celebrates 250 years of excellence delivering quality healthcare to warfighters ashore, on, below and above the sea.

    #DYK Navy Medicine represents more than 44,000 highly trained military and civilian healthcare professionals. Each year only about 600 applicants are invited to interview, and under 200 are accepted.

    For more on the Department of Defense, visit: http://www.defense.gov
    —————
    Keep up with the Department of Defense on social media!

    Like the DoD on Facebook: http://facebook.com/DeptofDefense
    Follow the DoD on Twitter: http://twitter.com/DeptofDefense
    Follow the DoD on Instagram: http://instagram.com/DeptofDefense
    Follow the DoD on LinkedIn: https://www.linkedin.com/company/DeptofDefense

    https://www.youtube.com/watch?v=1op3_GYTVE8

    MIL OSI Video

  • MIL-OSI USA: ICYMI: Ernst Releases Alarming Report on Tech Vulnerable to China

    US Senate News:

    Source: United States Senator Joni Ernst (R-IA)
    WASHINGTON – In case you missed it, U.S. Senate Committee on Small Business and Entrepreneurship Chair Joni Ernst (R-Iowa) released a report revealing that billions of dollars in sensitive American intellectual property are vulnerable to China, because the lack of a consistent due diligence standard in the Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) programs has left loopholes for America’s adversaries to exploit.
    To safeguard the technology that supports our national security, Chair Ernst is fighting to pass her INNOVATE Act and asked Secretary of Defense Pete Hegseth to investigate and potentially halt all funding to six companies mentioned in the report with troubling ties to China that received nearly $180 million from 2023 to 2024 in SBIR-STTR funding after a due diligence vetting system had been implemented by the agency.
    Here is some of the coverage of Ernst’s groundbreaking report:
    Bloomberg | Senator Flags China Ties in Program to Aid Defense Startups
    “The findings from Senator Joni Ernst add fuel to her campaign to overhaul the programs, which have awarded more than $75 billion since the first one began in 1982.”
    Politico | GOP report finds small business innovation grants still carry foreign risk
    “Senate Small Business Chair Joni Ernst (R-Iowa) released a report Wednesday that found that small business innovation program grant applicants flagged for foreign risk still received federal funding.”
    National Review | Small Business Grants Across Federal Government Vulnerable to Chinese Influence, Report Finds
    “Seeking to combat the problem, Ernst’s INNOVATE Act would clearly define “foreign risk” for due diligence reviews across agencies. The legislation would also create eligibility rules for applicants with foreign ties and codifies collaborations between agencies and the intelligence community on foreign risk reviews.”
    Politico Morning Defense | Red SBIR?
    “Congress previously rewrote SBIR and STTR rules to prevent funds from flowing to China after DOD discovered in 2021 that some SBIR awards had gone to companies linked to the Chinese military. The continued exploitation of the program, however, suggests that DOD may need to take further steps.”
    Federal News Network | SBIR/STTR awards remain vulnerable to foreign influence
    “Ernst’s investigation comes as Congress must reauthorize the SBIR/STTR programs. The 2022 update expires on Sept. 30. Ernst’s Innovate Act would extend the programs another three years to 2028 and continue to press agencies to address concerns over SBIR mills and foreign influence on awards.”

    MIL OSI USA News

  • MIL-OSI: RCF Opportunities Fund II L.P. Files Early Warning Report Regarding Common Shares of Defense Metals Corp.

    Source: GlobeNewswire (MIL-OSI)

    DENVER, May 22, 2025 (GLOBE NEWSWIRE) — RCF Opportunities Fund II L.P. (“RCF”) reports that it has filed an early warning report under National Instrument 62-103 – The Early Warning System and Related Take-Over Bid and Insider Reporting Issues in respect of the common shares (the “Common Shares”) in the capital of Defense Metals Corp. (the “Company”).

    On May 21, 2025, the Company issued an aggregate of 32,277,963 Common Shares to holders of secured convertible notes of the Company (the “Convertible Notes”), upon automatic conversion of the Convertible Notes at a price of C$0.125 per Common Share, and in full satisfaction of the accrued interest on the Convertible Notes (the “Conversion Issuance”). Of this amount, the Company issued an aggregate of 4,080,012 Common Shares to RCF upon the conversion of RCF’s C$500,000 Convertible Note, and in full satisfaction of the accrued interest thereon.

    On the same day, RCF subscribed for 1,720,370 units (the “Units”) of the Company at C$0.15 per Unit, for total proceeds of C$258,055.50, issued pursuant to a concurrent brokered and non-brokered private placement of the Company (the “Private Placement”, and together with the Conversion Issuance, the “Transactions”). The Company issued an aggregate of 36,841,068 Common Shares under the Private Placement. Each Unit is comprised of one Common Share and one-half of one Common Share purchase warrant (each whole warrant, a “Warrant”). Each Warrant entitles RCF to acquire one additional Common Share at a price of C$0.20 per Common Share, at any time on or before May 21, 2028.

    As a result of the issuances of Common Shares under the Transactions, RCF’s beneficial ownership in respect of the Common Shares, being the securities subject to the most recent report required to be filed by RCF in respect of the Company under National Instrument 62-104 – Take-Over Bids and Issuer Bids and National Instrument 62-103 – The Early Warning System and Related Take-Over Bid and Insider Reporting Issues (“NI 62-103”), fell below 10% of the issued and outstanding Common Shares.

    Immediately prior to the Transactions, RCF owned and controlled a total of 25,871,008 Common Shares, representing approximately 9.13% of the issued and outstanding Common Shares. Assuming the conversion in whole of its Convertible Note, RCF would have come to own an aggregate of 29,871,008 Common Shares, representing approximately 11.27% of the issued and outstanding Common Shares on a partially-diluted basis.

    As a result of and immediately following the Transactions, RCF held 31,671,390 Common Shares, representing approximately 9.58% of the issued and outstanding Common Shares. Assuming the exercise of the Warrants, RCF would come to own 32,531,575 Common Shares, representing approximately 9.81% of the issued and outstanding Common Shares on a partially-diluted basis.

    As RCF no longer holds 10% or more of the issued and outstanding Common Shares, RCF will no longer file early warning reports in respect of its ownership of Common Shares unless and until such time as RCF’s aggregate shareholdings exceed 10% of the issued and outstanding Common Shares on a non-diluted or partially-diluted basis.

    RCF acquired the Common Shares and Warrants in accordance with RCF’s investment policy to generate proceeds from its investment in the Company. RCF may from time to time acquire additional securities of the Company, dispose of some or all of the existing or additional securities or may continue to hold its securities in the Company.

    The Company’s head office is located at Suite 1020 – 800 West Pender Street, Vancouver, British Columbia V6C 2V6.

    To obtain a copy of the early warning report filed under applicable Canadian securities laws in connection with the transactions hereunder, please see the Company’s profile on the SEDAR+ website at www.sedarplus.ca.

    About RCF Opportunities Fund II L.P.

    RCF is a private investment fund existing under the laws of the Cayman Islands. RCF is ultimately controlled by RCF Management LLC. For further information and to obtain a copy of the early warning report, please contact:

    RCF Opportunities Fund II L.P.
    1400 Wewatta Street, Suite 850
    Denver, Colorado, 80202
    Telephone: (720) 946-1444
    Attn: Mason Hills

    The MIL Network

  • MIL-OSI USA: VIDEO: Senator Rosen Secures Air Force Commitment to Address Long-Overdue Veteran Benefits Issue for Toxic Exposures at Nevada Test and Training Range

    US Senate News:

    Source: United States Senator Jacky Rosen (D-NV)
    Watch Senator Rosen’s Exchange HERE.
    WASHINGTON, DC – During a Senate Armed Services Committee hearing, Senator Jacky Rosen (NV) secured a commitment from senior Air Force officials to take action to address critical gaps in care and benefits for veterans who were exposed to toxins and radiation at classified locations, including six in Nevada alone that the Department of Energy recognizes as exposure zones. Senator Rosen highlighted how servicemembers have been denied care because the Pentagon has neglected to similarly recognize their contaminated worksites as exposure zones, despite decades of nuclear testing and documented hazards.
    Earlier this week, Senator Rosen also urged immediate action in a letter to Secretary of Defense Pete Hegseth and top Pentagon officials imploring them to investigate the matter and ensure veterans receive the care they deserve. This follows an exchange she had on this topic with General Dan Caine in his nomination hearing earlier this year to be Chairman of the Joint Chiefs of Staff.
    “Several constituents have brought to my attention that they were exposed to radiation and toxic substances– including emissions from burn pits used to dispose of debris from developmental aircraft– while stationed at NTTR [Nevada Test and Training Range],” wrote Senator Rosen in the letter. “However, because of the classified nature of their assignments, they cannot substantiate their presence or exposure.”
    “I urge the Department to conduct a comprehensive review to determine whether veterans who served at classified or data-masked locations have portions of their medical records similarly classified or otherwise inaccessible to the VA,” she continued. “If such restrictions exist, I request that the Department develop a secure and efficient process– coordinated with the VA– to ensure that relevant health information can be shared for the purposes of care and benefits adjudication, while still protecting the sensitive nature of the veteran’s service. No veteran should be denied care because their records are locked behind classification barriers.”
    The full letter can be found HERE.
    Below is the transcript of Senator Rosen’s exchange with the Secretary of the Air Force during the hearing: 
    Senator Rosen: I have heard from constituents who served at such locations within the Nevada Test and Training Range, who believe they were exposed to radiation from our days of conducting explosive nuclear weapons testing, and to toxins from burn pits which disposed of classified waste. However, [the Department of Defense] does not classify the range as a place where exposure occurred – despite the Department of Energy providing a presumption of exposure for their personnel who served at these exact same locations within the range, such as the Tonopah Test Range. And, because their service records are Data Masked, these veterans can’t even prove to the VA that they were ever stationed there. Imagine that?
    All of this has prevented them from being able to receive the veterans’ benefits they deserve. Secretary Meink and General Allvin … will you work with me and this committee to ensure that the Department of the Air Force both provides a presumption of exposure at relevant Air Force locations, where the Department of Energy has done so for their personnel, and ensure that those who served—or are currently serving—at these sites receive sufficient documentation to support health-related claims, all while protecting the classified nature of their service? 
    Secretary of the Air Force Troy E. Meink: Yes, Senator, we take the health of our workforce seriously and we need to deal with this issue. 

    MIL OSI USA News

  • MIL-OSI USA: “We Will Not Forget:” Padilla Sends Strong Warning as Republicans Go Nuclear to Revoke California Clean Air Waivers

    US Senate News:

    Source: United States Senator Alex Padilla (D-Calif.)

    “We Will Not Forget:” Padilla Sends Strong Warning as Republicans Go Nuclear to Revoke California Clean Air Waivers

    WASHINGTON, D.C. — Today, U.S. Senator Alex Padilla (D-Calif.), Ranking Member of the Senate Committee on Rules and Administration and a member of the Senate Environment and Public Works Committee, blasted Republicans for their shortsighted revocation of California’s clean air waivers by overruling the nonpartisan Senate Parliamentarian’s decision and going nuclear on the Senate rulebook. Republicans defied their own promises and broke 30 years of precedent by moving forward with their cynical repeal of California’s Clean Air Act waivers with a 50-vote threshold under the Congressional Review Act (CRA), bypassing the filibuster and its 60-vote requirement by overruling the Senate Parliamentarian.
    Over the last few weeks, Padilla has spoken on the Senate floor repeatedly to sound the alarm on Senate Republicans’ revocations of these critical waivers.
    “Over the last 24 hours, Trump and radical Republicans have gone nuclear on the Senate rulebook, stopping at nothing to attack California for protecting the health of my constituents, for having the audacity to lead the clean energy economy. California became the fourth-largest economy in the world by leaning in to the clean energy transition, and we’ve proved that what’s good for the planet and our air is good for business. By denying California the ability to control our own toxic air and greenhouse gas emissions, Republicans are threatening the public health, environment, and economy for millions of my constituents and people around the country. And let me be clear: California has not and cannot force our emission standards on any other state in the nation.
    “It’s not just why Republicans are undermining California’s climate leadership. It’s how they did it. Republicans are effectively saying that whenever the Parliamentarian rules against them, they can simply disregard her to bypass the filibuster and pass legislation on a simple majority vote. So no, this isn’t some one-off change to the rules — this is throwing out the rulebook entirely — all to please Donald Trump and the Big Oil lobby. If they can ignore the Parliamentarian here, then why not on an upcoming tax bill, or to gut health care, or to revoke lifesaving vaccine approvals?
    “Republicans have crossed the red line and gone nuclear. As the saying goes, ‘what goes around comes around.’ And it won’t be long before Democrats are back in the driver’s seat again. When that happens, all bets will be off. Every agency action that Democrats don’t like — whether it’s a rule or not — will be fair game, from mining permits and fossil fuel projects to foreign affairs and tax policies.
    “We will not forget what happened here. History won’t forget. And California will not forget.”
    Senator Padilla has been a leading voice in pushing back against Republican attacks on California’s Clean Air Act waivers. Earlier this week, Padilla placed a hold on the four pending Environmental Protection Agency (EPA) nominees until Republicans stop their reckless attempts to overturn California’s clean air waivers. Padilla, along with Senator Sheldon Whitehouse (D-R.I.), and Democratic Leader Chuck Schumer (D-N.Y.) also led Democratic Ranking Members in strongly warning Majority Leader John Thune (R-S.D.) and Majority Whip John Barrasso (R-Wyo.) of the dangerous and irreparable consequences if Senate Republicans overrule the Senate Parliamentarian’s decision on California’s waivers.
    Last month, Padilla, Whitehouse, and Senator Adam Schiff (D-Calif.) welcomed the Senate Parliamentarian’s decision that the waivers are not subject to the CRA. Padilla also joined Whitehouse and Schiff in blasting Trump and EPA Administrator Lee Zeldin’s weaponization of the EPA after the Government Accountability Office’s (GAO) similar finding. Padilla and Schiff previously slammed the Trump Administration’s intent to roll back dozens of the EPA’s regulations that protect California’s air and water.
    Throughout the past several weeks, Padilla has made clear that these reckless revocations of California’s clean air waivers will lead to disastrous public health, environmental, and economic impacts for millions of Californians and people across the country. Inaction against the climate crisis costs Americans an average of $2,500 a year in medical bills and over $820 billion in total, according to estimates by the Natural Resources Defense Council.
    Padilla has consistently stressed the extreme consequences of Republicans ignoring the Parliamentarian, effectively blowing up the filibuster. While he and other Democrats supported lowering the threshold to pass a bill in 2022, Republicans defended the filibuster relentlessly — a dramatic contrast from their revocation of California’s waivers under a simple majority vote.
    Now that they’ve taken the nuclear option, the Trump Administration could make a series of dangerous moves in bogging down Congress with reviews from the past 30 years on items including vaccine approvals, broadcast licenses, merger approvals, and more, enabling President Trump’s political retribution. Padilla has warned multiple times that a future Democratic administration could come after Republican oil and gas priorities, including mining permits, fossil fuel projects, foreign policy, tax policies, and Department of Government Efficiency (DOGE) disruptions.
    In case you missed it, Senators Schumer, Whitehouse, Elizabeth Warren (D-Mass.), Martin Heinrich (D-N.M.), Ron Wyden (D-Ore.), Schiff, and Edward J. Markey (D-Mass.) also all came out strongly against Republicans’ reckless effort and warned of the consequences of setting this new precedent.

    MIL OSI USA News

  • MIL-OSI USA: Army Birthday Media Resources

    Source: United States Army

    By Army Media RelationsMay 22, 2025

    1 / 2 Show Caption + Hide Caption – (Photo Credit: U.S. Army) VIEW ORIGINAL
    2 / 2 Show Caption + Hide Caption – (Photo Credit: U.S. Army) VIEW ORIGINAL

    “This We’ll Defend” has been our Army’s motto since the Revolutionary War. It reminds us that our purpose is timeless and clear: to fight and win our nation’s wars. As we celebrate the 250th birthday of the United States Army, we reflect on the rich history and legacy of service, sacrifice and dedication.

    These cleared-for-publication materials are intended to support the media, content creators and community partners in amplifying the Army’s enduring impact and inspiring future generations. If you need help finding specific information that is not covered here, please send an email to OCPA with “Birthday” in the subject line.

    For information about the birthday festival on the National Mall or the parade, contact: OCPA Media Relations Division Press Desk <usarmy.pentagon.hqda-ocpa.mbx.mrd-press-desk@army.mil>

    To assist media and friends of the Army with questions about the U.S. Army’s 250th Birthday coverage, please find below data sheets and information.

    MIL OSI USA News

  • MIL-OSI USA: Murray Presses FDA Commissioner on Senseless and Inefficient Mass Firings, Conflicts of Interest at FDA & Trump Admin Laying the Groundwork to Rip Away Mifepristone

    US Senate News:

    Source: United States Senator for Washington State Patty Murray

    ICYMI: Murray Grills Trump’s FDA Nominee on Cancellation of Critical Vaccine Meeting, Upholding Science on Mifepristone, Contraception

    ***WATCH: Senator Murray Q&A with Commissioner Makary***

    Washington, D.C. — Today, at a Senate Appropriations Agriculture, Rural Development, Food and Drug Administration, and Related Agencies (Ag-FDA) Subcommittee hearing on the fiscal year 2026 budget request for the Food and Drug Administration (FDA), U.S. Senator Patty Murray (D-WA), Vice Chair of the Senate Appropriations Committee and a senior member and former Chair of the Senate Health, Education, Labor and Pensions (HELP) Committee, grilled FDA Commissioner Marty Makary on the Trump administration’s reckless and chaotic efforts to fire thousands of critical employees at the FDA, conflicts of interest at the agency, and the Trump administration’s attempts to lay the groundwork to rip away access to mifepristone based on discredited junk science from anti-abortion activists.

    In opening comments, Vice Chair Murray said:

    “Commissioner Makary, the FDA has a really important job to do. Lives literally are at stake. And that work requires the utmost diligence, and care, and commitment to following the science and upholding FDA’s gold standard. We all expect to walk into the drugstore and know that what we are buying has passed a safety and efficacy standard. And we have to be assured of that, and we have to be assured that the work’s been done—that we don’t have to question that.  

    “So, I don’t think it’s careful leadership when one-in-five people across the FDA are fired, only to frantically then bring some back—because you didn’t stop and think two seconds about whether these jobs were actually important.

    “We really, Mr. Chairman, cannot cheap out on the FDA, and expect to maintain the gold standard that means that people know that drugs are safe.

    “We can’t just cut, cut, cut and hope no one gets sick when you’re slow to issue a recall, or hope no one needs that medicine that had its approval delayed, or hope there isn’t another infant formula issue while your staff are getting fired, or getting rehired, or wherever they are.

    “This work really takes investments, this Committee knows that, and it expects expert staff—like the people that have been shoved out the door. Drug approvals are already getting delayed. Food and drug safety inspections are lagging behind.

    “We are going in the wrong direction, fast. We still have yet to see from you a full budget request from you. That is unacceptable.

    “You are now testifying that the budget proposes to slash FDA by more than 11 percent. That’s actually news to all of us—and I will tell you right now, that is not going to fly. It is reckless, and it is not going to happen as long as I have anything to say about it.”

    [FDA STAFFING]

    Senator Murray began her questioning by pressing Dr. Makary on the harm and inefficacy caused by the Trump administration’s mass layoffs and efforts to push out qualified employees across FDA, which have resulted in more than 4,000 staff leaving the agency since the beginning of the Trump administration. “Commissioner Makary, when it comes to your mass firing of FDA employees, in April, you said, ‘I can tell you there were no cuts to scientists or inspectors.’ Well that is not true,” Senator Murray said. “I think Senator Ossoff covered that, and I think the point here is that all of this firing and rehiring—I don’t see how that’s efficient. Frankly, it kind of shows that you don’t know what you’re doing—and you’re breaking things in the process here. So, let me ask you a question, and hopefully it is an easy one for you. Does it save taxpayer dollars to fire staff who work in centers that are fully funded by user fees—not taxpayer dollars—yes or no?”

    “You asked me to do an assessment of the staff when I came here for my confirmation hearing, and I hear that you’re criticizing me for bringing back some individuals after the cuts that I was not a part of,” replied Commissioner Makary.

    “That’s good—I’m just saying in the long run, this has been very inefficient,” Senator Murray replied. “But my question to you is not about that it, and I know you’ve covered it with several other members. So does it save taxpayer dollars to fire staff who work with centers that are fully funded by user fees, not taxpayer dollars. Is that efficient?”

    “The cuts were to HR, IT, communications—,” Commissioner Makary said.

    Senator Murray pressed, “They’re funded by user fees, it is not saving any money.”

    “In part,” Commissioner Markey interjected.

    But many of the staff you fired were in centers that are actually fully funded by user fees. You know that, correct?” Senator Murray clarified.

    Commissioner Makary continued to dodge.

    “I’m asking you a specific question about the centers that are fully funded by user fees,” Senator Murray continued.

    “That’s one center. That’s the tobacco center,” Commissioner Makary said. “You just said we can’t just keep cut and cut—we can’t keep hiring and hiring, the agency doubled since 2007. So, let me ask you, what is the right number of employees?”

    “No, you’re here to answer my questions here, and I’m going to ask some more,” Senator Murray replied. “Without critical support staff you fired, inspectors cannot plan their trips. They cannot do their jobs. I want to ask you, what percent of planned inspections has FDA missed since those April 1st firings?”

    Commissioner Makary said, “In the 12 labs that we have that evaluate food products in the food inspection realm, there are no—as of last week, I just did a check—there are no backlogs. They are running at 100 percent efficiency. There are no drug approval delays despite the—you know, what people want to attribute—”

    “That is not what I’ve been told. I have been told—and I would like you to go back and check and report back to us, because we know that some of the planned inspections… that were supposed to take place have been missed. And, to me, why that’s so important, if there is not inspections, the public doesn’t have the information that they need. I am going to run out of time, so I want to move on,” Senator Murray replied.

    “There are no cuts to inspectors,” Commissioner Makary said.

    “Will you go back and check for me, please?” asked Senator Murray.

    “Absolutely,” replied Commissioner Makary.

    [CONFLICTS OF INTEREST]

    Senator Murray continued by asking about reports of eyebrow-raising conflicts of interest at FDA: “I understand that the FOIA staff producing documents related to ongoing litigation by the Children’s Health Defense—Secretary Kennedy’s organization—was shielded from the RIFs, while other FOIA staff are responsible for FOIA responses at other FDA centers were targeted for termination. Is that true?,” Murray asked.

    “That’s not true, senator, we have our FOIA staff. They continue to work at the FDA. I’ve made sure that all the FOIA staff at the FDA are doing their job. We are also using AI to reduce the burden on that staff,” responded Commissioner Makary.

    Senator Murray pressed, “Well for the record, my understanding is that the Children’s Health Defense FOIA staff were not fired when other ones were… And that seems like a real conflict of interest to me, considering that the Secretary’s extensive history with that organization, Children’s Health Defense, and his goal to remove authorizations for vaccines. So, I just want that on the record—”

    “It’s not true. Well, all FOIA staff are in place,” Commissioner Makary continued to claim.

    [MIFEPRISTONE]

    Senator Murray moved on to her next question, pressing Commissioner Makary on the Trump administration’s attempts to lay the groundwork to restrict access to medication abortion based on junk science being pushed by anti-abortion extremists. Murray asked: “If a study came out saying that people who took a certain medication experience a certain rate of ‘serious adverse events,’ but the study’s authors refused to say what they were counting as an adverse event—would raise some serious questions about the study’s validity?”

    “Yes, senator. So I have the natural inquisition of a scientist that’s done a lot of research. So, I would want to see the underlying data, yes,” replied Commissioner Makary.

    “I am, of course, talking about the recent sham ‘study’ from the Ethics and Public Policy Center—it’s an anti-abortion group, it’s bank-rolled by extremists, they fought to overturn Roe v. Wade,” Murray said. “And this ‘study,’ if you can call it that, is unsound and has been widely panned by medical experts. But, days after its release, you and Secretary Kennedy are now suggesting we need a ‘complete review’ on the safety of mifepristone.”

    “Now, to be clear: mifepristone has been proven safe and effective in more than 100 studies over three decades. And the people that are now pushing that bogus ‘study’ and saying mifepristone is dangerous for women are the exact same people who think that abortion is never necessary to save a woman’s life, and that 10-year-olds should somehow be forced into childbirth. I believe that this administration is laying the groundwork to rip away access to medication abortion across the country,” Murray said. This has not gotten enough attention. And I know you’d prefer to keep it that way, but I want you to know: I’m not going to let that happen.”

    “I have not seen that study, Senator, and you have not seen that study. So how can you call it a sham, bogus study? Neither of us have seen the study, the underlying data, or the methodology,” Commissioner Makary said.

    “Actually, that’s not true,” Murray replied. The Ethics and Public Policy Center is an anti-abortion advocacy group that was an advisory board member for Project 2025, has submitted amicus briefs to the Supreme Court opposing mifepristone, and does not believe in life-saving abortions—putting them far outside the medical mainstream. As the Washington Post fact-check of the ‘study’ points out, unlike most credible medical studies, the Ethics and Public Policy Center report did not undergo a formal external peer review before publication and “moreover, the report oddly does not reveal the database it used”—making it impossible for anyone to view the underlying data. That hasn’t stopped the anti-abortion Ethics and Public Policy Center from launching an activist campaign around the release of the data and even admitting the goal was to “eliminate” abortion pills.

    On May 14th in a HELP Committee hearing with Health and Human Services Secretary Robert F. Kennedy (RFK) Jr. Senator Josh Hawley (R-MO) secured a commitment from Secretary Kennedy that HHS and FDA would review what RFK Jr. referred to as “alarming” new data on mifepristone—referencing the EPCC study alone. “It’s alarming, and it indicates that at the very least, the label should be changed,” Secretary Kennedy said. “I’ve asked Marty Makary at the FDA to do a complete review and report back.” Senator Hawley secured the same commitment from President Trump’s nominee to serve as Deputy Secretary of Health and Human Services in a HELP Committee hearing on May 8th—again, based solely on the EPCC ‘study’ that has not been peer-reviewed or published in a medical journal and has attracted widespread scrutiny for appearing to dramatically overstate what it characterizes as “serious adverse effects” associated with the pill.

    ____________________________________

    As a longtime appropriator and former Chair of the Senate HELP Committee, Senator Murray has a long history of demanding accountability and careful oversight when it comes to the safety of products families use every day. At the end of 2022, Senator Murray passed legislation giving FDA new authority to, for the first time ever, regulate the safety of cosmetic products and force a recall when necessary—and she successfully fought to secure funding for this important work last year as Chair of the Senate Appropriations Committee. Senator Murray has also previously pressed FDA and industry for answers and action regarding asbestos in children’s make up kits, demanded answers from Johnson & Johnson regarding asbestos found in baby powder, and was a leading voice in holding FDA accountable and pushing for solutions following the infant formula contamination and shortage crisis in 2022.

    Senator Murray leads the Democratic caucus on reproductive health care and, throughout her career, has beat back countless Republican attempts to defund Planned Parenthood and other family planning services—and is widely credited with successfully pushing the Bush administration’s FDA to follow the science and make Plan B available over the counter. Senator Murray led the response in Congress to FDA v. Alliance for Hippocratic Medicine, a lawsuit brought by Republican anti-abortion extremists trying to rip away access to mifepristone, a safe and effective abortion medication that was approved by FDA in 2000—Murray led multiple amicus briefs, organized her colleagues, and raised the alarm at every turn. Last June, the Supreme Court dismissed the case on standing groups but Murray made clear that “the nationwide threat to medication abortion has not gone away—far from it. If Donald Trump and his anti-abortion allies return to power, they will do everything they can to rip away access to mifepristone and ban abortion nationwide.” Murray also spearheaded efforts in Congress urging the FDA to follow the science and review the application of Opill, the first over-the-counter birth control pill, after the FDA’s Advisory Committee voted unanimously to recommend FDA approval.

    In March, at Dr. Makary’s nomination hearing before the Senate HELP Committee, Senator Murray pressed Dr. Makary to commit to upholding the science on mifepristone and contraception—he refused to definitively answer her question.

    MIL OSI USA News

  • MIL-OSI USA: News 05/16/2025 Blackburn Leads Tennessee Delegation in Urging Air Force to Make McGhee Tyson ANG Base the Main Operating Base for KC-46 Aircraft

    US Senate News:

    Source: United States Senator Marsha Blackburn (R-Tenn)
    NASHVILLE, Tenn. – U.S. Senator Marsha Blackburn (R-Tenn.), Governor Bill Lee (R-Tenn.), U.S. Senator Bill Hagerty (R-Tenn.), and the entire Tennessee delegation sent a letter to U.S. Department of the Air Force Secretary Troy E. Meink urging him to make the McGhee Tyson Air National Guard (ANG) Base outside of Knoxville, Tennessee, the seventh main operating base for the KC-46 Pegasus.
    McGhee Tyson ANG Base Would Be Cost-Effective Choice with Rapid Access to Key Operational Areas
    “Strategically located in East Tennessee, McGhee Tyson ANGB provides rapid access to key operational areas within the continental United States and abroad. The 134th Air Refueling Wing boasts six decades of air refueling experience which would ensure a smooth, cost-effective transition to the KC-46. McGhee Tyson features a newly completed 10,000-foot runway and a purpose-built hangar to support the KC-46 aircraft, along with favorable airspace, secure infrastructure, and strong partnerships with regional military installations.”
    Airmen of 134th Refueling Wing Exemplify Excellence and Valor
    “The Airmen of the 134th Air Refueling Wing exemplify sustained excellence which has been recognized through their receipt of 16 Air Force Outstanding Unit Awards. The wing’s culture was most recently showcased through the awarding of eleven Distinguished Flying Crosses for valorous action over Israel in 2024. This dedication makes McGhee Tyson ANGB an ideal location for long-term mission success. Selecting McGhee Tyson also ensures a proportional distribution of next-generation air refueling capability across the Air National Guard, and with its cost-effectiveness, proven experience, and operational readiness, it stands as the optimal choice for MOB 7 for the KC-46 and the U.S. Air Force.”

    Click here to download this photo of Senator Blackburn with Airmen of Tennessee’s 134th Air Refueling Wing.
     BACKGROUND
    The KC-46A Pegasus is the U.S. Air Force’s newest aerial refueling aircraft, designed to replace the KC-135 Stratotanker, which first entered service in 1957.
    KC-46A offers advanced boom and drogue refueling, secure communications, defensive systems, and support for cargo, passengers, and aeromedical evacuation. Its expanded range and modern systems enable the Air Force to meet mission demands in today’s complex global environment.
    McGhee Tyson ANG Base boasts over 68 years of volunteer excellence and service to the Air Force. The unit has received a remarkable 16 Air Force Outstanding Unit awards and is one of the most decorated air refueling units in Air Force history. 
    Securing KC-46 aircraft for McGhee Tyson ANG Base will preserve over 1,500 jobs and $203 million annually for decades to come. 
    CO-SIGNERS
    Governor Bill Lee (R-Tenn.), U.S. Senator Bill Hagerty (R-Tenn.), and U.S. Representatives Chuck Fleischmann (R-Tenn.), Mark Green (R-Tenn.), Diana Harshbarger (R-Tenn.), Tim Burchett (R-Tenn.), John Rose (R-Tenn.), Scott DesJarlais (R-Tenn.), Andy Ogles (R-Tenn.), David Kustoff (R-Tenn.), and Steve Cohen (D-Tenn.) joined Senator Blackburn in sending this letter.
    Click here to view the full letter.

    MIL OSI USA News

  • MIL-OSI USA: News 05/20/2025 Blackburn, Moolenaar Call for Investigation Into Chinese EV Charging Startup

    US Senate News:

    Source: United States Senator Marsha Blackburn (R-Tenn)
    WASHINGTON, D.C. – U.S. Senator Marsha Blackburn (R-Tenn.) and U.S. Representative. John Moolenaar (R-Mich.), Chairman of the House Select Committee on China, sent a letter to U.S. Department of Commerce Secretary Howard Lutnick and U.S. Department of Defense Secretary Pete Hegseth urging an investigation into Autel Energy, a Chinese electric vehicle (EV) charging startup, and its connections to the Chinese Communist Party. Autel Energy represents a national security risk to the United States given its access to consumer data and critical grid infrastructure.
    Autel Energy Shares a Parent Company with Autel Robotics, a Company U.S. Government Recently Listed as National Security Concern
    “Autel Energy manufactures electric vehicle (EV) charging stations and is a wholly owned subsidiary of Autel Intelligent Transportation Corp.—the same parent company to Chinese drone maker Autel Robotics, which the U.S. government recently added to the Department of Commerce’s Entity List and the Chinese military companies list. We are concerned that Autel Energy’s products pose many of the same risks to U.S. economic and national security as those manufactured by Autel Robotics and its parent company, both of which are openly affiliated with the CCP and People’s Liberation Army.”
    Autel Energy Has Taken Steps to Hide Ties to Chinese-Controlled Parent Company
    “Autel Energy styles itself as Autel Intelligent Technology Corp. on its website but has otherwise taken steps to hide the company’s ties to its Chinese controlled parent corporation through new investments in the U.S., where affiliation with a strategic ally of the PRC is deliberately deemphasized. The company recently opened a new assembly facility in the United States and claims that it manufactures Build America, Buy America compliant products that are eligible for the federal government’s EV infrastructure support program. This follows the same playbook deployed by Autel Robotics, which previously advertised a ‘Made in USA’ drone for sale in American markets, targeted towards state and local governments, even though the drone utilized prohibited technology from ZTE and HiSilicon.”
    Blackburn, Moolenaar Push for Investigation into Autel Energy to Protect Consumer Data and National Security
    “And much like Autel Robotics, Autel Energy products have the capacity to access and collect significant sensitive consumer data that could be used for nefarious purposes. The company operates with few—if any—restrictions, even though the EV charging stations they manufacture, sell, and deploy in the U.S. can collect and transmit sensitive driver data generated by electric vehicles during a charging session. These products are also connected to critical electrical infrastructure, enhancing the risks posed to American economic and national security. For these reasons, we request that your agencies investigate whether Autel Energy meets the requirements for designation on the aforementioned lists.”
    Click here to read the full letter.

    MIL OSI USA News

  • MIL-OSI USA: Crapo Joins Resolution Reaffirming U.S.-Canada Partnership

    US Senate News:

    Source: United States Senator for Idaho Mike Crapo
    Washington, D.C.–The United States and Canada share three oceans and the world’s longest border.  About 400,000 people and more than $2.5 billion worth of goods and services move across the U.S.-Canada border each day.  The relationship between the two countries fosters one of the most significant bilateral trading relationships in the world.
    U.S. Senator Mike Crapo (R-Idaho) joined U.S. Senators Kevin Cramer (R-North Dakota) and Angus King (I-Maine) in introducing a resolution to recognize the U.S.-Canada partnership and its shared interests in economics, energy, critical minerals and national security.
    “Canada is America’s top trading partner and one of our strongest allies,” said Crapo.  “The almost $1 trillion exchanged in trade between the U.S. and Canada in 2023 powers 8 million U.S. jobs and 2.4 million Canadian workers.  Our two nations are inextricably linked economically and strategically–sharing deep historical and cultural ties.  This resolution reiterates our firm commitment to bolster the long-term, mutual relationship with our Canadian neighbors far into the future.”
    Idaho exports more products to Canada than any other country.  According to the Idaho Department of Commerce, in 2023, Idaho exported $1.5 billion in goods to Canada—more than a quarter of which were food and agricultural products.  Additionally, Idaho imported $360 million worth of Canadian food and agriculture goods.  Idaho’s largest import/export industries include:
    Agriculture and food;
    Wood, paper, pulp and printing;
    Electrical equipment and machinery;
    Mineral products; and
    Chemicals, cosmetics and fertilizers.
    Cramer and King serve as co-chairmen of the bipartisan, bicameral American Canadian Economy and Security (ACES) Caucus, and Senator Crapo is a member.
    “Representing a Northern border state, I recognize the importance of the unique partnership between the United States and Canada,” said Cramer.  “Not only are our neighbors to the north crucial economic and national security partners, but they are literally our closest ally.  This resolution celebrates our closeness and is a testament to the enduring strength, friendship and importance of the U.S.-Canada alliance across the country and the globe.”
    “The United States and Canada have always been closely tied; we share our economies, cultures, military interests and more.  In fact, in Maine, even our next door neighbor lives right across the border,” said King.  “I continue to be proud of the work we have achieved under the American-Canadian Economy and Security (ACES) Caucus alongside my Senate Co-Chair Kevin Cramer, but know that the current situation presents many unfortunate challenges.  While I am excited to reintroduce this resolution to reaffirm our two nations’ commitment to one another, we must acknowledge the close ties between our countries to resolve and mitigate any potential disruptions to our intertwined interests.  As close trade partners and allies, I look forward to strengthening this close alliance to tackle these shared challenges and seize new opportunities.”  
    Among other provisions, the resolution recognizes the relationship between the United States and Canada is critical to promoting peace, expanding global economic opportunity and being prepared to respond to unforeseen events.  It also reaffirms the bilateral and international alliance between the two nations, which allows both countries to face common threats together and uphold common values, including democracy, human rights and the rule of law. 
    Additionally, the resolution emphasizes the shared defense and security commitments between the two nations, including the modernization of the North American Aerospace Defense Command (NORAD), joint border security initiatives, and cooperation in combating transnational threats such as illegal migration and fentanyl trafficking.
    The resolution is also co-sponsored by U.S. Senators Marsha Blackburn (R-Tennessee), Susan Collins (R-Maine), Maggie Hassan (D-New Hampshire), Amy Klobuchar (D-Minnesota), Lisa Murkowski (R-Alaska), Mike Rounds (R-South Dakota) and Peter Welch (D-Vermont).  A similar resolution was introduced in the House by U.S. Representative Mark Amodei (R-Nevada).
    Click here for bill text.

    MIL OSI USA News