NewzIntel.com

    • Checkout Page
    • Contact Us
    • Default Redirect Page
    • Frontpage
    • Home-2
    • Home-3
    • Lost Password
    • Member Login
    • Member LogOut
    • Member TOS Page
    • My Account
    • NewzIntel Alert Control-Panel
    • NewzIntel Latest Reports
    • Post Views Counter
    • Privacy Policy
    • Public Individual Page
    • Register
    • Subscription Plan
    • Thank You Page

Category: Military Intelligence

  • Vice Admiral CR Praveen Nair assumes charge as Controller Personnel Services

    Source: Government of India

    Source: Government of India (4)

    Vice Admiral CR Praveen Nair, AVSM, NM, has assumed charge as the Controller Personnel Services (CPS) at the Indian Navy on July 31. On taking over the new responsibility, the senior officer paid homage at the National War Memorial in New Delhi, honouring the sacrifices of India’s brave soldiers.

    Commissioned into the Indian Navy on July 1, 1991, Vice Admiral Nair is a specialist in Communications and Electronic Warfare. Over his distinguished career spanning more than three decades, he has held several key command, operational, and staff appointments.

    A Surface Warfare Officer, the Flag Officer’s sea tenures include service on INS Krishna, INS Kora, and INS Mysore. He has served as Fleet Electronic Warfare Officer and later as Fleet Communications Officer of the Western Fleet, during which he was awarded the Chief of the Naval Staff commendation for his contribution to the non-combatant evacuation of Indian nationals from Beirut during the Israel-Lebanon conflict in July 2006.

    Vice Admiral Nair has commanded INS Kirch (Missile Corvette), INS Chennai (Guided Missile Destroyer), and INS Vikramaditya (Aircraft Carrier). He has also served in various important shore appointments, including as Directing Staff at the Naval War College, Goa, Officer-in-Charge at Signal School, and Commodore (Personnel) at the Directorate of Personnel, Naval Headquarters. He was also a member of the Indian Naval Strategic and Operational Council (INSOC), the Indian Navy’s think tank.

    An alumnus of the Defence Services Staff College, Wellington, and the US Naval War College, Newport, USA, Vice Admiral Nair has been the recipient of several prestigious international awards, including the Robert E. Bateman International Award, Vice Admiral James H. Doyle Military Operations and International Law Prize, and the International Leadership Prize. He holds an M.Phil. in Defence and Strategic Studies from Mumbai University.

    He was awarded the Nao Sena Medal (Devotion to Duty) in 2000 and the Ati Vishisht Seva Medal in January 2025.

    Upon promotion to Flag rank, Vice Admiral Nair served as Assistant Chief of the Naval Staff (Policy and Plans), where he played a pivotal role in formulating the Maritime Capability Perspective Plan (MCPP 2022–37) and Maritime Infrastructure Perspective Plan (MIPP 2022–37). He subsequently commanded the Western Fleet in 2023–24 and led Operation Sankalp to safeguard India’s maritime interests in the region.

    Before assuming his current post, he served as the Commandant of the Indian Naval Academy.

    August 5, 2025
  • Lt Gen Pushpendra Singh assumes charge as Vice Chief of Army Staff

    Source: Government of India

    Source: Government of India (4)

    Lieutenant General Pushpendra Singh has taken over as the Vice Chief of the Army Staff. He assumed the new responsibility on July 31, 2025, following his tenure as Director General Operational Logistics & Strategic Movement at the Army Headquarters.

    Commissioned into the 4th Battalion of the Parachute Regiment (Special Forces) in December 1987, Lt Gen Pushpendra Singh brings with him over 38 years of rich experience in operational and strategic roles across the Indian Army.

    An alumnus of La Martiniere College, Lucknow University, and the Indian Military Academy, Dehradun, the General Officer has served in several key operations including OP PAWAN, OP MEGHDOOT, OP ORCHID, and multiple tenures in OP RAKSHAK.

    He has commanded a Special Forces unit in the Kashmir Valley and along the Line of Control, an Infantry Brigade, and a Mountain Division during OP SNOW LEOPARD along the Line of Actual Control. He also served as the General Officer Commanding (GOC) of a Corps based in Himachal Pradesh, responsible for sensitive areas including Jammu, Samba, and Pathankot.

    Lt Gen Singh has undergone extensive training during his career, including the Staff Course at DSSC Wellington, Higher Defence Management Course at CDM Secunderabad, and the Advance Professional Programme in Public Administration at IIPA. He holds a Master’s in Management Studies from Osmania University and a Master’s in Philosophy from Punjab University.

    In recognition of his exemplary service, he has been decorated with the Ati Vishisht Seva Medal and a Bar to the Sena Medal.

     

    August 5, 2025
  • MIL-OSI Africa: Uganda Strengthens Emergency Response Capacity Through African Volunteers Health Corps (AVoHC) – Strengthening and Utilizing Response Groups for Emergencies (SURGE) Training

    Source: APO – Report:

    .

    With support from the Foreign, Commonwealth & Development Office (FCDO), the World Health Organization (WHO) is collaborating with the Government of Uganda to train 78 multidisciplinary One Health responders under the Strengthening and Utilizing Response Groups for Emergencies (SURGE) flagship programme.

    The AVoHC-SURGE training, a cornerstone of WHO’s Emergency Preparedness and Response (EPR) strategy, is designed and led by WHO to equip countries with skilled, coordinated teams capable of deploying rapidly during health emergencies. In Uganda, WHO has convened and facilitated a diverse group of participants from multiple sectors, including health, agriculture, internal affairs, animal and fisheries industries, and the Uganda Defence Forces, reflecting the One Health approach to managing threats at the human–animal–environment interface.

    “This training equips Uganda with the human capacity to respond quickly and decisively when emergencies occur. I commend the Ministry of Health for its leadership and commitment to strengthening emergency readiness,” said Dr Kasonde Mwinga, WHO Representative to Uganda.

    Through WHO’s technical guidance, the training immerses participants in intensive sessions covering outbreak investigation, risk assessment, coordination, Gender based violence and Prevention and response of sexual exploitation, abuse and Harassment and rapid deployment operations. Practical simulations and scenario-based exercises replicate the realities of emergency response, ensuring participants are ready for coordinated action in the field.

    For many participants, the experience is transformative: “I am honoured to attend the AVoHC-SURGE training by WHO Uganda. I gained critical skills in rapid response, coordination, and outbreak investigation, which empowers me to protect lives and build stronger, safer communities,” shared Dr Andama Adinani, one of the participants from the district local government.

    Others echoed similar sentiments, emphasizing how WHO’s training builds technical capacity and strengthens networks across ministries and disciplines; connections that are critical to a cohesive national response when emergencies strike.

    The inclusion of responders from multiple ministries underscores the Government of Uganda’s commitment to a multisectoral approach, supported by WHO’s technical expertise. Emergencies such as Ebola, Marburg, cholera, and zoonotic diseases require coordination between human health, animal health, and environmental sectors. By strengthening this integrated response capacity, Uganda, through WHO’s SURGE programme is better prepared to contain outbreaks before they escalate.

    “Preparedness is an investment in the future. Every skill gained here, every relationship built across ministries, will help us act faster, smarter, and more effectively to protect Ugandans,” Lubwama Benard, Deputy Incident Commander, Ministry of Health.

    The AvoHC-SURGE initiative, supported by FCDO and implemented by WHO across Africa, has been rolled out in several countries. So far 27 out of the 30 countries have completed their trainings and the details of the trained teams have been uploaded in the responders database.

    As health threats grow increasingly complex, WHO’s continued support to Uganda in strengthening its national response capacity offers a model for other countries in the region. With a trained cadre of 78 multidisciplinary responders ready for deployment, the country is poised to respond to public health emergencies with speed, precision, and confidence.

    Designed for impact, this training represents a best preparedness and readiness practice model to improve capacity to manage emergencies, disasters and other climate related emergencies on the African content.

    – on behalf of World Health Organization – Uganda.

    MIL OSI Africa –

    August 5, 2025
  • MIL-OSI Security: Around the Air Force: Emerald Warrior Department Level Exercise, Next-Gen Command and Control, New Cyber Office

    Source: United States Air Force

    In this week’s look around the Air Force, AFSOC hosts Emerald Warrior 25.2 as part of the DLE series, the TOC-Light capability gets an upgrade with the Major Release 2 prototype, and the DAF creates a new AF/A6 DCS office dedicated to warfighter comms. and cyber systems.

    MIL Security OSI –

    August 5, 2025
  • MIL-OSI Security: Defense News in Brief: Around the Air Force: Emerald Warrior Department Level Exercise, Next-Gen Command and Control, New Cyber Office

    Source: United States Spaceforce

    In this week’s look around the Air Force, AFSOC hosts Emerald Warrior 25.2 as part of the DLE series, the TOC-Light capability gets an upgrade with the Major Release 2 prototype, and the DAF creates a new AF/A6 DCS office dedicated to warfighter comms. and cyber systems.

    MIL Security OSI –

    August 5, 2025
  • MIL-OSI United Kingdom: UK Chargé inaugurates new accommodation facility in Hamat

    Source: United Kingdom – Executive Government & Departments

    World news story

    UK Chargé inaugurates new accommodation facility in Hamat

    • English
    • العربيَّة

    The building, funded by the UK Ministry of Defence will support UK personnel to deliver a variety of training and support to Lebanese Armed Forces (LAF) units.

    UK-Lebanon military cooperation

    Ahead of Lebanese Army Day on 1 August the UK Chargé D’Affaires Victoria Dunne, accompanied by Defence Attaché Lt Col Charles Smith, inaugurated a new military accommodation facility in Hamat on Thursday 31 July.

    The building, funded by the UK Ministry of Defence will support UK personnel to deliver a variety of training and support to various Lebanese Armed Forces (LAF) units. This includes leadership development for junior officers and infantry skills courses, including for female LAF personnel.

    The UK continues to be a steadfast supporter of the LAF, the sole legitimate defender of Lebanon, supporting with training, kit and equipment.

    Chargé D’Affaires Victoria Dunne said:

    A huge congratulations to the LAF on their 80th anniversary whose bravery defending Lebanon internally and on the borders is admirable.

    I am thrilled to be in Hamat today to inaugurate this new accommodation facility.

    We are proud of our partnership with the LAF and ongoing support for the development of its capabilities, including through training.

    Defence Attaché Charles Smith said:

    Today is another milestone for UK-Lebanese defence cooperation.

    The provision of accommodation and facilities will assist UK personnel in delivering high-impact training to various LAF brigades and units, including to female officers and soldiers.

    It also demonstrates that the UK remains a proud and enduring partner to the LAF.

    Share this page

    The following links open in a new tab

    • Share on Facebook (opens in new tab)
    • Share on Twitter (opens in new tab)

    Updates to this page

    Published 1 August 2025

    MIL OSI United Kingdom –

    August 5, 2025
  • MIL-OSI USA: Around the Air Force: Emerald Warrior Department Level Exercise, Next-Gen Command and Control, New Cyber Office

    Source: United States Air Force

    Headline: Around the Air Force: Emerald Warrior Department Level Exercise, Next-Gen Command and Control, New Cyber Office

    In this week’s look around the Air Force, AFSOC hosts Emerald Warrior 25.2 as part of the DLE series, the TOC-Light capability gets an upgrade with the Major Release 2 prototype, and the DAF creates a new AF/A6 DCS office dedicated to warfighter comms. and cyber systems.

    MIL OSI USA News –

    August 5, 2025
  • MIL-OSI Analysis: Flawed notions of objectivity are hampering Canadian newsrooms when it comes to Gaza

    Source: The Conversation – Canada – By Gabriela Perdomo, Assistant Professor, Mount Royal University

    The response of Canada’s legacy news media to the Israeli government’s military action in Gaza for more than 640 days points to a problem within major Canadian news organizations, according to a new Canadian book, When Genocide Wasn’t News.

    In the book, journalists — some writing under pseudonyms — say their newsrooms have been severely hampered by a culture of fear and an adherence to a notion of objectivity that no longer serves the public.

    Israel’s relentless military actions in the Gaza Strip following the Oct. 7, 2023 attack and taking of 251 hostages by Hamas should be prominently featured news. The Israeli Defence Forces’ illegal attacks on children, hospitals and aid workers should also be making constant headlines. But news coverage on these attacks is scarce or misleading.

    I research and teach media, monitor the news and edit an online publication about journalism in Canada. My PhD thesis focused on Latin America and examined how the mandate to be objective can be confusing in times of war. I also explored questions about how journalists understand and apply objectivity in different contexts.

    I found journalists who support peace efforts can easily be accused of being “biased” in favour of those promoting peace.

    Not all wars covered equally

    Not all wars are covered the same. Noureddine Miladi, a media and communications professor at Qatar University, found Russia’s invasion of Ukraine in 2022 received far greater coverage in mainstream media than the war in Gaza. Part of this difference in coverage lies in the ability to send reporters to cover events first hand, which is impossible in the Gaza Strip, where outside journalists are banned from entry.




    Read more:
    The chilling effects of trying to report on the Israel-Gaza war


    Another major factor affecting coverage is how newsrooms understand and apply their norms, including objectivity. Journalism production is influenced and impacted by the dynamics of place and power that surround it.

    As Carleton University journalism professor Duncan McCue argues, an unexamined adherence to objectivity can perpetuate colonial points of view. University of British Columbia journalism professors Candis Callison and Mary Lynn Young, authors of a book about journalism’s racial reckoning in Canada, also make this argument.

    Accusations of antisemitism

    Accusations of bias can have an outsized impact on reporting and be used to silence journalists.

    According to some journalists, there is an atmosphere of fear when it comes to reporting on the Middle East in mainstream newsrooms in Canada. Some have self-censored in response to threats.

    Not only do journalists say they are facing threats, they also face a context in which governments, such as the province of Ontario, are adhering to definitions of antisemitism that equate it to criticism of Israel.

    In Canada, news organizations and individual journalists attempting to report on the violence in the Gaza Strip are being accused of antisemitism by groups such as Honest Reporting, according to the Canadian Press Freedom Project. This means almost anyone reporting on the Israeli government’s actions in Gaza will receive hundreds of messages claiming the report is antisemitic.

    Since many scholars and the United Nations Special Committee to investigate Israeli practices have called the Israeli government’s methods “consistent with genocide, including use of starvation as weapon of war,” urgent reporting is needed — and it’s not antisemitism to call out what experts have labelled global injustices.

    Left-wing bias?

    The culmination of decades of this type of criticism of news media has included a right-wing narrative that accuses media of a liberal bias. The trope of the liberal media as a threat has had a steady hold of the public imagination across North America since the Cold War.

    Reporters who focused on stories about human rights, questioned the tactics and budgets of the military industrial complex or challenged the mistreatment of socialist activists as being unpatriotic were accused of having a liberal, left-wing, even communist, slant.

    This isn’t a phemomenon limited to North America. Latin American politicians have a long history of using “left-wing bias” labels as a powerful tool to intimidate journalists.




    Read more:
    How news coverage influences countries’ emergency aid budgets – new research


    What do journalists owe peace?

    Research shows that audiences value objective journalism, or reporting that they deem non-partisan and keeps opinions at bay. But consumers also increasingly value journalism that is empathetic and emotionally resonant.

    After United States President Donald Trump was first elected in 2016, journalism scholars recognized that a major failure of news coverage during the presidential campaign was not calling things what they were. For example, journalists used euphemisms such as “he misspoke” instead of reporting that Trump was lying, contributing to a crisis of relevance in journalism.

    According to the Committee to Protect Journalists, the Israel-Gaza war has killed more journalistsr than in any other conflict it’s documented. But the allegedly deliberate targeting of journalists in Gaza, of whom at least 225 have been killed, has garnered little attention in newsrooms, despite calls by dozens of independent journalists to make the issue more visible.

    This is another unprecedented set of events that should be reported on for Canadian audiences.

    How will Canadian newsrooms do better? One idea could be that newsrooms join forces to fend off accusations of bias and antisemitism. They could start with reclaiming objectivity as a practice of information-gathering and moving away from objectivity as an ideal of dispassionate reporting.

    They could also embrace, instead of fear, journalism’s liberal roots and reclaim journalism from a standpoint of clarity where actions against the rule of law, abuses of power, war profiteering, crimes against humanity — any illiberal acts — clearly fall on the wrong side of the liberal-democratic balance and therefore demand to be denounced. As veteran CBC journalist Carol Off has said, we need to denounce illiberal acts as anti-democratic ideology.

    Every inhabitant of Gaza remains in imminent peril today, and the media have a responsibility to inform us about it.

    Gabriela Perdomo does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. Flawed notions of objectivity are hampering Canadian newsrooms when it comes to Gaza – https://theconversation.com/flawed-notions-of-objectivity-are-hampering-canadian-newsrooms-when-it-comes-to-gaza-260552

    MIL OSI Analysis –

    August 5, 2025
  • MIL-OSI Security: NATO’s ‘eyes in the sky’ obtain air-to-air refuelling certification

    Source: NATO

    NATO’s Airborne Warning and Control System (AWACS) E-3A fleet, and its Multinational Multi-Role Tanker Transport A330 (MRTT) aircraft have demonstrated their ability to perform air-to-air refuelling. In July 2025, after successful test flights, the necessary airworthiness certification for mid-air fuel transfer procedures was obtained. As NATO strengthens its capabilities, this increases the Alliance’s strategic flexibility, interoperability and operational reach.

    Validating the technical compatibility and operational readiness of Boeing’s and Airbus’ aircraft systems enables future rapid deployments and sustained aerial surveillance missions. The linkage of AWACS and MRTT represents another example of cooperation among Allies, and European Allies stepping up, demonstrating transatlantic unity and resolve. NATO’s AWACS fleet is managed by the NATO Airborne Early Warning and Control Force (NAEW&CF), based in Geilenkirchen, Germany. The MRTT Fleet, primarily based out of Eindhoven, the Netherlands, is owned by NATO and managed by the NATO Support and Procurement Agency (NSPA). The Royal Netherlands Air Force (RNLAF) Flight Test Centre, the Multinational MRTT Unit (MMU), European Air Transport Command (EATC) and the Air Refueling Certification Agency (ARCA) provided support during the certification process.

    Following the historic decisions made by leaders at the NATO Summit in The Hague, Allies will continue to future-proof NATO’s ability to guard our skies and maintain vigilance wherever it is needed, meet the new ambitious capability targets and keep our one billion people safe. 

    MIL Security OSI –

    August 5, 2025
  • MIL-OSI China: Xi signs order to unveil flag patterns of four PLA branches

    Source: People’s Republic of China – State Council News

    BEIJING, July 31 — Xi Jinping, chairman of the Central Military Commission (CMC), has signed an order to unveil the flag patterns of four branches of the Chinese People’s Liberation Army (PLA), namely the aerospace force, cyberspace force, information support force and joint logistics support force.

    On the occasion of China’s Army Day that falls on Aug. 1, Xi extended festive greetings to service personnel of the PLA and the People’s Armed Police Force, civilian personnel posted in the military, and members of reserve forces and militia.

    The release of the branch flags marks the establishment of a military flag system of the people’s army in the new era, comprising the PLA flag, the flags of the army, navy, air force and rocket force, as well as the flags of the aerospace force, cyberspace force, information support force and joint logistics support force.

    The branch flags will be put into official use starting Aug. 1.

    The CMC has issued a decision to adjust the current trial regulations on the administration of military flags, revising provisions on the types and usage of military flags to standardize their management and safeguard their dignity through legal measures, according to the statement.

    MIL OSI China News –

    August 5, 2025
  • MIL-OSI China: Xi signs order to commend military units, individuals

    Source: People’s Republic of China – State Council News

    BEIJING, July 31 — Xi Jinping, chairman of the Central Military Commission, has signed an order to award citations for merit to two military units and five individuals.

    An office of Troop 63920 of the Chinese People’s Liberation Army (PLA) was honored with a first-class citation for merit, while Ding Yang from Troop 92853 of the PLA received a first-class citation for merit in defense-related science and technology.

    Troop 96712 of the PLA was awarded a second-class citation for merit.

    Wang Haidou from the former Army Academy of Armored Forces, Gao Yuqi from the Army Medical University, Yang Zichun from the Naval University of Engineering, and Chen Wei from the Institute of Military Medicine under the Academy of Military Sciences, were honored with third-class citations for merit in defense-related science and technology.

    MIL OSI China News –

    August 5, 2025
  • MIL-OSI USA: Illumina Inc. to Pay $9.8M to Resolve False Claims Act Allegations Arising from Cybersecurity Vulnerabilities in Genomic Sequencing Systems

    Source: US State of North Dakota

    Illumina Inc. has agreed to pay $9.8 million to resolve allegations that it violated the False Claims Act when it sold to federal agencies certain genomic sequencing systems with cybersecurity vulnerabilities. Illumina is a Delaware corporation, headquartered in California, that manufactured and sold genomic sequencing systems throughout the United States.

    The settlement resolves allegations that, between February 2016 and September 2023, Illumina sold government agencies genomic sequencing systems with software that had cybersecurity vulnerabilities, without having an adequate security program and sufficient quality systems to identify and address those vulnerabilities. Specifically, the United States contended that Illumina knowingly failed to incorporate product cybersecurity in its software design, development, installation, and on-market monitoring; failed to properly support and resource personnel, systems, and processes tasked with product security; failed to adequately correct design features that introduced cybersecurity vulnerabilities in the genomic sequencing systems; and  falsely represented that the software on the genomic sequencing systems adhered to cybersecurity standards, including standards of the International Organization for Standardization and National Institute of Standards and Technology.

    “Companies that sell products to the federal government will be held accountable for failing to adhere to cybersecurity standards and protecting against cybersecurity risks,” said Assistant Attorney General Brett A. Shumate of the Justice Department’s Civil Division. “This settlement underscores the importance of cybersecurity in handling genetic information and the Department’s commitment to ensuring that federal contractors adhere to requirements to protect sensitive information from cyber threats.”

    “This settlement demonstrates our continuing commitment to combat cybersecurity risks by ensuring that federal contractors protect private and sensitive government information.” said Acting U.S. Attorney Sara Bloom for the District of Rhode Island.

    “This settlement demonstrates our continued commitment to work with our law enforcement partners and the Department of Justice to ensure companies fulfill their contractual obligations,” said Acting Special Agent in Charge Christopher M. Silvestro of the Defense Criminal Investigative Service (DCIS) Northeast Field Office, the law enforcement arm of the Department of Defense’s Office of Inspector General. “Safeguarding the validity of Department of Defense research and data is vital to supporting the warfighter.” 

    “Significant damage can result from a failure to adhere to required cybersecurity standards, especially when the systems involved include sensitive genomic data,” said Special Agent in Charge Roberto Coviello of the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG). “HHS-OIG and our law enforcement partners remain dedicated to ensuring that entities who do business with the government uphold their cybersecurity obligations.”

    The settlement resolves a lawsuit filed under the whistleblower provisions of the False Claims Act, which permit private parties to sue on behalf of the government when a defendant has submitted false claims for government funds and receive a share of any recovery. The settlement in this case provides for the whistleblower, Erica Lenore, a former Director for Platform Management, On-Market Portfolio at Illumina, to receive $1,900,000 as her share of the settlement. The qui tam case is captioned United States ex. rel. Lenore v. Illumina Inc., No. 1:23-cv-00372 (D.R.I.).

    The resolution obtained in this matter was the result of a coordinated effort between the Justice Department’s Civil Division, Commercial Litigation Branch, Fraud Section, and the United States Attorney’s Office for the District of Rhode Island, with assistance from DCIS, the Army Criminal Investigation Division, the HHS Office of the Inspector General, and the Department of Commerce Office of the Inspector General.

    The matter was investigated by Trial Attorney Erin Colleran of the Justice Department’s Civil Division and Acting U.S. Attorney Sara Bloom of the District of Rhode Island.

    The claims resolved by the settlement are allegations only and there has been no determination of liability. 

    MIL OSI USA News –

    August 5, 2025
  • MIL-OSI Security: Illumina Inc. to Pay $9.8M to Resolve False Claims Act Allegations Arising from Cybersecurity Vulnerabilities in Genomic Sequencing Systems

    Source: United States Attorneys General

    Illumina Inc. has agreed to pay $9.8 million to resolve allegations that it violated the False Claims Act when it sold to federal agencies certain genomic sequencing systems with cybersecurity vulnerabilities. Illumina is a Delaware corporation, headquartered in California, that manufactured and sold genomic sequencing systems throughout the United States.

    The settlement resolves allegations that, between February 2016 and September 2023, Illumina sold government agencies genomic sequencing systems with software that had cybersecurity vulnerabilities, without having an adequate security program and sufficient quality systems to identify and address those vulnerabilities. Specifically, the United States contended that Illumina knowingly failed to incorporate product cybersecurity in its software design, development, installation, and on-market monitoring; failed to properly support and resource personnel, systems, and processes tasked with product security; failed to adequately correct design features that introduced cybersecurity vulnerabilities in the genomic sequencing systems; and  falsely represented that the software on the genomic sequencing systems adhered to cybersecurity standards, including standards of the International Organization for Standardization and National Institute of Standards and Technology.

    “Companies that sell products to the federal government will be held accountable for failing to adhere to cybersecurity standards and protecting against cybersecurity risks,” said Assistant Attorney General Brett A. Shumate of the Justice Department’s Civil Division. “This settlement underscores the importance of cybersecurity in handling genetic information and the Department’s commitment to ensuring that federal contractors adhere to requirements to protect sensitive information from cyber threats.”

    “This settlement demonstrates our continuing commitment to combat cybersecurity risks by ensuring that federal contractors protect private and sensitive government information.” said Acting U.S. Attorney Sara Bloom for the District of Rhode Island.

    “This settlement demonstrates our continued commitment to work with our law enforcement partners and the Department of Justice to ensure companies fulfill their contractual obligations,” said Acting Special Agent in Charge Christopher M. Silvestro of the Defense Criminal Investigative Service (DCIS) Northeast Field Office, the law enforcement arm of the Department of Defense’s Office of Inspector General. “Safeguarding the validity of Department of Defense research and data is vital to supporting the warfighter.” 

    “Significant damage can result from a failure to adhere to required cybersecurity standards, especially when the systems involved include sensitive genomic data,” said Special Agent in Charge Roberto Coviello of the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG). “HHS-OIG and our law enforcement partners remain dedicated to ensuring that entities who do business with the government uphold their cybersecurity obligations.”

    The settlement resolves a lawsuit filed under the whistleblower provisions of the False Claims Act, which permit private parties to sue on behalf of the government when a defendant has submitted false claims for government funds and receive a share of any recovery. The settlement in this case provides for the whistleblower, Erica Lenore, a former Director for Platform Management, On-Market Portfolio at Illumina, to receive $1,900,000 as her share of the settlement. The qui tam case is captioned United States ex. rel. Lenore v. Illumina Inc., No. 1:23-cv-00372 (D.R.I.).

    The resolution obtained in this matter was the result of a coordinated effort between the Justice Department’s Civil Division, Commercial Litigation Branch, Fraud Section, and the United States Attorney’s Office for the District of Rhode Island, with assistance from DCIS, the Army Criminal Investigation Division, the HHS Office of the Inspector General, and the Department of Commerce Office of the Inspector General.

    The matter was investigated by Trial Attorney Erin Colleran of the Justice Department’s Civil Division and Acting U.S. Attorney Sara Bloom of the District of Rhode Island.

    The claims resolved by the settlement are allegations only and there has been no determination of liability. 

    MIL Security OSI –

    August 5, 2025
  • MIL-OSI: SABLE OFFSHORE SHAREHOLDER ALERT: CLAIMSFILER REMINDS INVESTORS WITH LOSSES IN EXCESS OF $100,000 of Lead Plaintiff Deadline in Class Action Lawsuits Against Sable Offshore Corp. – SOC

    Source: GlobeNewswire (MIL-OSI)

    NEW ORLEANS, July 31, 2025 (GLOBE NEWSWIRE) — ClaimsFiler, a FREE shareholder information service, reminds investors that they have until September 26, 2025 to file lead plaintiff applications in a securities class action lawsuit against Sable Offshore Corp. (NYSE: SOC), if they purchased the Company’s securities (1) between May 19, 2025 and June 3, 2025, both dates inclusive (the “Class Period”); and/or (2) pursuant and/or traceable to Sable’s May 21, 2025 secondary public offering (the “SPO”). This action is pending in the United States District Court for the Central District of California.

    Get Help

    Sable Offshore investors should visit us at https://claimsfiler.com/cases/nyse-soc-1/ or call toll-free (844) 367-9658. Lawyers at Kahn Swick & Foti, LLC are available to discuss your legal options.

    About the Lawsuit

    Sable Offshore and certain of its executives are charged with failing to disclose material information during the Class Period, violating federal securities laws.

    On June 4, 2025, the Company disclosed that “a Santa Barbara County Superior Court Judge granted ex parte requests from plaintiffs in Center for Biological Diversity, et al. v.
    California Department of Forestry and Fire Protection, et al. (25CV02244) and Environmental Defense Center, et al. v. California Department of Forestry and Fire Protection, et al. (25CV02247) for temporary restraining orders prohibiting Sable Offshore Corp. from restarting transportation of oil through the Las Flores Pipeline System pending the hearing on an order to show cause regarding a preliminary injunction scheduled for July 18, 2025. Sable is exploring all possible avenues available to address these preliminary rulings.”

    On this news, the price of Sable’s shares fell by $0.94 per share, or 3.91%, to close at $23.10 on June 4, 2025.  

    The case is Johnson v. Sable Offshore Corp., et al., No. 25-cv-6869.

    About ClaimsFiler

    ClaimsFiler has a single mission: to serve as the information source to help retail investors recover their share of billions of dollars from securities class action settlements. At ClaimsFiler.com, investors can: (1) register for free to gain access to information and settlement websites for various securities class action cases so they can timely submit their own claims; (2) upload their portfolio transactional data to be notified about relevant securities cases in which they may have a financial interest; and (3) submit inquiries to the Kahn Swick & Foti, LLC law firm for free case evaluations.

    To learn more about ClaimsFiler, visit www.claimsfiler.com.

    The MIL Network –

    August 5, 2025
  • MIL-OSI USA: Chairman McConnell Opening Statement at FY26 Defense Appropriations Markup

    US Senate News:

    Source: United States Senator for Kentucky Mitch McConnell

    WASHINGTON, D.C. – U.S. Senator Mitch McConnell (R-KY), Chairman of the Senate Appropriations Defense Subcommittee, delivered an opening statement at this morning’s full Senate Appropriations Committee markup of the FY26 Defense bill. Below is the opening statement as prepared for delivery:

    I’d like to thank Ranking Member Coons, and our combined staff for their dedicated, and often exhausting, work to produce the FY26 Defense Appropriations bill.

    And I’d like to thank our fellow members of the Subcommittee, who I know share our sense of duty to provide for the common defense, year after year. Just briefly, I’ll sum up the rationale behind this year’s legislation.

    First, the Senate bill recognizes the Administration’s intention to restore peace through strength, the Department of Defense’s desire to achieve “drone dominance”, and the President’s interest in having more missiles than any other country.

    It reflects the need to build more ships for a Navy that must compete with China. It acknowledges that America’s adversaries are increasingly aligned and investing more heavily in undermining our interests… and that America must take the risk of simultaneous conflict in multiple theaters seriously.

    But ultimately, our topline allocation of $852.5 billion – which sits higher than either the President’s budget request or the House’s mark – underscores that we cannot seriously address these challenges while artificially constraining our resources.

    We can’t build a Golden Dome… or restock our munitions magazines… or bring back American shipbuilding… without sustained, increasing investments in our national defense.

    And we can’t treat reconciliation like a cure-all. I was glad to vote for the One Big Beautiful Bill. But let’s not kid ourselves – it was not the additive defense spending some of us had hoped for. Moving must-pay bills for major long-standing programs from base to reconciliation still makes little sense to me.

    And somehow, the process seems to have also allowed important programs to slip through the cracks. In fact, senior Pentagon officials have already come to me and the Ranking Member to report that they’re still billions of dollars short on programs that we were told reconciliation would address. 

    There is no substitute for robust, full-year defense appropriations. And this is a strong, bipartisan bill that proves we can do our job, and keep our commitments to the men and women of the U.S. military. They deserve no less.

    Here are a few of the items we address:

    First, recent operations in the Middle East illustrates how quickly modern warfare can exhaust our arsenal of critical munitions.

    The Administration’s request did not fully maximize production capacity for certain critical munitions, so we added $5.2 billion to buy larger quantities of air-defense interceptors, long-range fires, and other key munitions. We also added $2.1 billion to expand production capacity of munitions, and included some important initial investments in restoring America’s organic industrial base.

    Second, we’ve also added $4.6 billion to address growing demand for more extensive air and missile defenses. But developing a more layered missile defense shield that can protect the homeland and our forces abroad from growing threats is going to take years of sustained resources.

    Third, we’ve tried to help the Department meet requirements that the final reconciliation bill and the FY26 base budget request left unfunded, including advanced procurement for Virginia- and Columbia-class submarines, cost-to-compete for surface vessels, major renovations to dilapidated Marine Corps barracks, and ship operations costs for our Navy.

    We also included more funding for destroyer construction, shipyard infrastructure, and workforce development to help fix our ailing shipbuilding industry and get production back on track.

    Fourth, we invest in ally and partner militaries. We know that confronting Chinese aggression will require collective deterrence. Helping grow our friends’ capacity to defend themselves in the Indo-Pacific – as in Europe or the Middle East – enhances deterrence and helps our allies share more of the burden.

    It also means more investment in interoperable, U.S-made systems and lower risks for U.S. servicemembers. These are investments that pay dividends, and I’m not just talking about treaty allies.

    The Secretary of the Army rightly calls Ukraine “the Silicon Valley of warfare”. The Navy considers the maritime fight between Russia and Ukraine as the Black Sea Battle Lab and recognizes the need for rapid innovation. So we added $216 million on top of the Administration’s request for drone and counter-drone capabilities, consistent with the intention of achieving “drone dominance.”

    But abandoning the foremost experts of drone warfare would be strategic self-harm. Shutting off engagement with Ukraine would undermine our military’s efforts to prepare for the modern battlefield.

    So, like our friends on the Armed Services Committee, we are restoring funding for the Ukraine Security Assistance Initiative and other security assistance programs that make America safer.

    Madam Chair, I’m proud of the work of the Defense Subcommittee in producing this bill for our colleagues’ consideration. And I hope it’ll earn the support of the entire Committee. But allow me to close with just one note:

    None of the challenges we’re facing today can be solved by a single bill or over the course of a single budget cycle.

    Readiness is not a box to be checked – it’s a state to achieve and maintain. In this era of major power competition, security for future generations of Americans means steady, consistent, predictable, increasing investments in the common defense… year after year after year.

    If we’re tempted to treat successful FY26 appropriations like a finish line, we’re thinking about our obligations all wrong.

    MIL OSI USA News –

    August 5, 2025
  • MIL-OSI USA: Gov. Kemp Announces 114 Appointments to Boards, Authorities, and Commissions

    Source: US State of Georgia

    Atlanta, GA – Governor Brian P. Kemp today announced 114 appointments and reappointments to various state boards, authorities, and commissions.

    Georgia Composite Medical Board

    Srenni Gangasani and David Retterbush were reappointed.

    Kamesha Harbison is a board-certified obstetrician-gynecologist serving the South Columbus community. She has provided women’s health care in the Chattahoochee Valley for over a decade, delivering comprehensive OB/GYN services and assisting with more than 1,000 births. She has also led community health initiatives, including organizing prenatal education and resource events for expectant mothers. Harbison began her career as a high school biology and chemistry teacher after earning a B.S. and M.Ed. from Xavier University of Louisiana. She later earned her medical degree from the University of Iowa Roy J. and Lucille A. Carver College of Medicine and completed her OB/GYN residency at Mercer University in Macon, Georgia. As an educator, she developed a mentoring program to address adolescent health, hygiene, and goal setting—laying the foundation for her transition into women’s healthcare. She is recognized for her commitment to patient education, community outreach, and improving health outcomes for women across the region.

    State Workforce Development Board

    Bárbara Rivera Holmes was sworn in as the 11th Commissioner of the Georgia Department of Labor and the state’s first Latina constitutional officer on April 4, 2025, by Georgia Gov. Brian Kemp. Holmes’ extensive experience includes appointments by former Gov. Nathan Deal to the Board of Regents of the University System of Georgia, which oversees Georgia’s 26 public colleges and universities, and by former Lt. Gov. Geoff Duncan as co-chair of the Georgia Innovates Task Force, which helped design the state’s technology blueprint. A former journalist, Holmes has earned awards for excellence in journalism from the Georgia Associated Press. She holds degrees in journalism and Spanish from Florida Southern College and studied at Estudio Sampere Internacional in Spain. A native of San Juan, Puerto Rico, Holmes resides in Albany with her husband, David, and their daughter.

    Steve Bradshaw served eight years on the DeKalb County Board of Commissioners. First elected in 2016, he was re-elected in 2020 without opposition. During his tenure, he was twice unanimously elected by his colleagues to serve as Presiding Officer of the Board. He also chaired several key committees, including Finance, Audit and Budget; Public Works and Infrastructure; and County Operations. Prior to public service, Bradshaw spent more than 15 years in the private sector in operations management and business development roles, most recently as business development manager for Delta Global Staffing, a subsidiary of Delta Air Lines. Bradshaw began his professional career as a U.S. Army officer as a tank commander. He served in both domestic and international assignments, including deployment to the Middle East during the First Persian Gulf War. His final military post was as a leadership instructor at the Army Officer Candidate School. He holds a master’s degree in public administration from Georgia State University and later served as an adjunct professor in the university’s Andrew Young School of Policy Studies, teaching both undergraduate and graduate students.

    Hearing Panel of the Judicial Qualifications Commission

    Richard Hyde was reappointed.

    Georgia Board of Examiners of Licensed Dietitians

    Cicely Thomas was reappointed.

    Alison Sturgill is a licensed and registered dietitian with over a decade of clinical experience specializing in oncology nutrition. She currently serves as a clinical dietitian IV at the Emory Proton Therapy Center, where she provides medical nutrition therapy to patients undergoing radiation treatment for various cancers. Previously, she held a similar role at Emory University Hospital, where she led inpatient oncology nutrition care and served as a preceptor and educator for dietetic interns. Sturgill holds both a Master of Science and a Bachelor of Science in Nutrition from Murray State University and is a Certified Specialist in Oncology Nutrition (CSO). Her work has been published in the Journal of Nursing Care Quality, and she remains active in multiple professional organizations, including the Academy of Nutrition and Dietetics.

    Franklin D. Roosevelt Warm Springs Memorial Advisory Committee

    Eric Bentley is retired from the Georgia Department of Natural Resources with over three decades of service to Georgia State Parks and Historic Sites, including a deep and enduring connection to the Little White House State Historic Site. A graduate of the University of Georgia with a degree in forest resources, Bentley began his career at Unicoi State Park before serving in various leadership roles, including park manager at Kolomoki Mounds and Fort Yargo. He was named Manager of the Year in 2009 and later served as Region 3 Manager, where he oversaw operations at the Little White House and F.D. Roosevelt State Park, secured funding, and strengthened partnerships with the Advisory Committee. From 2019 until his retirement in 2022, Bentley served as Assistant Director of State Parks, continuing to advocate for the Little White House and playing a key role in advancing major preservation projects.

    Board of Juvenile Justice

    Lisa Colbert was reappointed.

    State Board of Veterinary Medicine

    Jessica Sewell was reappointed.

    Employee Benefit Plan Council

    Courtney Ware and Christopher Wells were reappointed.

    Angelique McClendon was appointed Commissioner of the Georgia Department of Driver Services (DDS) on May 1, 2025. She joined DDS as General Counsel in 2015 and was later promoted to Assistant Deputy Commissioner of Legal and Regulatory Affairs. Her legal career began in 2005 as an assistant solicitor in DeKalb County, followed by her service as an assistant attorney general for the State of Georgia from 2008 to 2015, where she represented public safety agencies, including DDS.  McClendon has provided legal guidance on major state initiatives, including Georgia’s Digital Driver’s License, and is a recognized expert on identity management, digital credentials, and data privacy. She has held leadership roles with the American Association of Motor Vehicle Administrators (AAMVA), helping shape national policy and best practices in driver’s license administration. She holds a Bachelor of Science in chemistry from Xavier University of Louisiana and a Juris Doctor from Georgia State University College of Law.

    Board of Community Affairs

    Kwanza Hall, Donna Armstrong Lackey, and Charlie Maddox were reappointed.

    State Board of Technical College System of Georgia

    Mike Long, Fran Millar, and Lisa Winton were reappointed.

    North Georgia Mountains Authority

    Jeff Andrews, Randy Dellinger, Patrick Denney, Dan Garcia, and Paul Shailendra were reappointed.

    State Board of Podiatry Examiners

    Rupal Gupta is a board-certified podiatrist with over 20 years of clinical, academic, and administrative experience. She currently practices at Ankle and Foot Centers of America and has held leadership roles in both hospital and professional association settings, including serving as president of the Georgia Podiatric Medical Association and department chief at Emory Johns Creek Hospital. Gupta completed her residency at Jackson North Medical Center, where she received advanced training in surgical and non-surgical foot and ankle care, trauma, and wound management. She holds a Doctorate in podiatric medicine from Kent State University and a bachelor’s degree from Emory University. Dedicated to advancing podiatric medicine and public health, she has been an active advocate for clinical standards and evidence-based policy and continues to serve on various hospital committees and community initiatives.

    Lake Lanier Islands Development Authority

    Daniel Dooley and Lauren Talley were reappointed.

    Georgia Rural Development Council

    Robert “Bob” Ray, Jr. is managing member of Ray Family Farms, LLC, where he and his siblings continue six generations and over 200 years of family farming, now focused on pecan production and pine timber. Before returning full-time to agriculture, Ray served for 15 years as President and CEO of Flint Energies. Ray’s public service includes his tenure as Assistant Secretary of State and Chief Operating Officer under Secretary of State Cathy Cox, where he directed agency operations and intergovernmental affairs. Earlier in his career, he was legislative director for the Georgia Farm Bureau Federation and also worked as a corporate lending officer with NCNB National Bank. He holds a bachelor’s in finance from the University of Georgia’s Terry College of Business. Ray has served in leadership roles with Georgia EMC, Green Power EMC, GRESCO, and Leadership Georgia, and remains active in agricultural and community organizations statewide.

    Georgia Commission on the Holocaust

    Jon Barry is President and Founder of Spectrum Maintenance Services and leads the company’s marketing and growth strategies. His career in commercial real estate spans four decades, including extensive experience in all aspects of brokerage and property management. Initially formed to support Barry’s shopping center management platform, SMS has grown to become Atlanta’s leading full-service property maintenance company. Barry previously served on the Board of Advisors of the Kennesaw State University Entrepreneurship Center, is a member of CEO NetWeavers, and has served as mentor to numerous rising professionals.

    Georgia Ports Authority

    James Allgood, Jr., Leda Chong, and Doug Hertz were reappointed.

    Georgia Student Finance Commission Board of Commissioners

    John Loud, Sarah Hawthorne, Ed Pease, and David Perez were reappointed.

    State Board of Accountancy

    Emily Farrell and Todd Tolbert were reappointed.

    Carlton Hodges is a certified public accountant with more than four decades of experience in public accounting, specializing in tax compliance and audit services. He began his career in 1980 with SRLS, where he advanced to Tax Manager following a merger with Price Waterhouse. His practice focuses on business, individual, fiduciary, and nonprofit tax returns, as well as audit and accounting engagements in sectors such as construction, services, and government-assisted entities. Carlton holds Bachelor of Business Administration degrees in finance and accounting from Armstrong State College. He is a member of both the Georgia Society of CPAs and the American Institute of CPAs, and serves on the board and leadership council of the Georgia Society, where he also chairs the GSCPA Insurance Trust. His civic involvement includes prior service as a Pooler City Councilman, treasurer of the Savannah-Chatham MPC, and leadership roles with the Armstrong Foundation and Rotary Club of Savannah West.

    State Board of Registration for Professional Engineers and Land Surveyors

    Trent Turk was reappointed.

    Board of Commissioners of the Sheriffs’ Retirement Fund of Georgia

    Billy Hancock and Dan Kilgore were reappointed.

    Georgia Sports Hall of Fame Authority

    Bill Shanks and Earl Wright were reappointed.

    Phil Schaefer is an award-winning sportscaster whose career spans more than five decades across basketball, football, baseball, and golf. He was the voice of UGA basketball for 17 years, called Atlanta Hawks games for five seasons, and served as a CBS Radio broadcaster for the NCAA Tournament for 20 years. In football, he spent 16 years as UGA’s color commentator, 10 years as the voice of the Peach Bowl, and 20 years as public address announcer for the Atlanta Falcons. Schaefer also covered the Braves for 39 years and the Masters Tournament for 55 consecutive years, earning the Masters Major Achievement Award in 2010. A three-time Georgia Sportscaster of the Year, Schaefer held leadership roles at WSB Radio and later served as Athletic Coordinator for the DeKalb County School System. He is a member of the Georgia Radio Hall of Fame and the Georgia Sports Hall of Fame, and has received over 40 national and regional journalism awards, including a Peabody. He holds degrees from Ohio State University and Georgia State University and is the author of Sins of a Southern Sportscaster.

    Board of Behavioral Health and Developmental Disabilities

    Deb Bailey, Amanda Owens, Bill Slaughter, Jean Sumner, and Jimmy Thomas were reappointed.

    Georgia Behavior Analyst Licensing Board

    Margaret Molony and Robin Osborne were reappointed.

    Georgia Public Telecommunications Commission

    Greg Garrett and Mary Ellen Imlay were reappointed.

    Stephen Lawson is a principal in Dentons’ Regulatory, Public Policy, and Government Affairs practice in Atlanta, with nearly 15 years of experience in public affairs, communications, and political strategy. He has advised Fortune 500 companies, nonprofits, trade associations, and elected officials on complex issues including policy strategy, crisis management, media relations, and advocacy. Prior to joining Dentons, Lawson was president of Full Focus Communications, a public affairs firm based in Atlanta. He has served in senior advisory roles for high-profile public officials, including Florida Governors Rick Scott and Ron DeSantis, and in Georgia for Lieutenant Governor Burt Jones, Agriculture Commissioner Tyler Harper, Congressman Mike Collins, and Speaker of the House Jon Burns.

    George Levert is a retired venture capitalist with more than two decades of experience in technology investment. He was a Founding Partner of Kinetic Ventures, where he led investments in telecommunications, network automation, and internet technologies. He served on the boards of more than a dozen venture-backed companies, including Metricom, Pathfire, and Proficient Networks. Prior to his career in venture capital, he held roles with Oglethorpe Power Corporation, Accenture, Boeing, and the U.S. Navy Civil Engineer Corps during the Vietnam War. Levert holds a B.S. in electrical engineering from Louisiana Tech University and an M.S. in management from Georgia Tech. He has served on numerous civic and nonprofit boards, including the Georgia Tech Foundation, Catholic Charities of Atlanta, the Atlanta Opera, and the American Red Cross. He is also a former board member of the Smithsonian National Museum of African Art and the Museum of the American Indian. Levert has endowed multiple scholarships and leadership awards and remains active in philanthropic, educational, and faith-based organizations. He and his wife, Dale, live in Atlanta and have two sons and two granddaughters.

    Savannah-Georgia Convention Center Authority

    Bert Brantley, Martin Miller, and Pritpal Singh were reappointed.

    Board of Human Services

    Lisa Hamilton, Scott Johnson, and Jack Williams were reappointed.

    Criminal Justice Coordinating Council

    Nancy Bills, Denise Downer-McKinney, Ron Freeman, Scotty Hancock, and Joe Hood were reappointed.

    Board of Public Health

    James Curran, Lucky Jain, Mitch Rodriguez, Ryan Shin, and T.E. Valliere-White were reappointed.

    Professional Standards Commission

    Angela Byrne has over 11 years of teaching experience in public and private schools. She currently teaches ESOL to K–6 students at Anna K. Davie Elementary in Rome City Schools, where she has served for the past six years. Her previous roles include teaching kindergarten, fourth, and fifth grade. She holds certifications in Elementary Education and Middle Grades Math and Science, with endorsements in ESOL and Online Teaching. She has received the Rome City Schools Central Office Support Employee of the Year and the Anna K. Davie Star Teacher Award. Byrne lives in Rome, Georgia, with her husband, Lewis, and their three children.

    Christy Edwards is an elementary educator with 14 years of experience in the Hall County School System. She currently serves as the Language Lab Teacher at Tadmore Elementary, focusing on data-driven instruction and student performance. She previously taught second, fourth, and fifth grades, as well as Early Intervention Program (EIP) support. She holds a B.S. in early childhood education from the University of North Georgia and an ESOL endorsement from Pioneer RESA. Edwards has served as a Leadership Team member, RTI representative, and professional learning facilitator.

    Zach Miller is a certified elementary educator currently teaching reading, science, and social studies at Roan School in Dalton. He holds a Bachelor of Science in early childhood education from Dalton State College and is certified in Early Childhood Education (P-5), with endorsements in ESOL and K–5 Mathematics. Named Teacher of the Year at Roan School in 2025, Miller focuses on a student-centered approach that integrates project-based learning and relationship-building to drive academic success. He founded the District Elementary Soccer Tournament and mentors students through Soccer for Success. He also leads Roan’s Soccer and Disc Golf Clubs, coordinates the Social Studies Bee, and partners with local nonprofits to support families in need. Miller is active in his church, serving as vice chairman of the deacons at Fellowship Bible Church and leading the soccer portion of Grace Presbyterian Church’s summer sports camp.

    State Rehabilitation Council

    Jo Ellen Hancock is a long-serving advocate and leader in the fields of special education, behavioral health, and community engagement. Since 2005, she has served as the parent mentor for special education with the Cherokee County School District, supporting families and fostering collaboration between schools and parents of students with disabilities. She holds multiple leadership roles across state and local behavioral health organizations, including chair of the Statewide Leadership Council and immediate past chair of the Region 1 Advisory Council for the Georgia Department of Behavioral Health and Developmental Disabilities (DBHDD). She also serves on the Georgia Behavioral Health Planning and Advisory Council and the Behavioral Health Services Coalition. Hancock is a certified peer specialist – parent and currently chairs the Cherokee County Local Interagency Planning Team (LIPT), where she has led efforts to coordinate services for children with complex needs since 2018. She serves on the advisory board for NAMI Georgia and is communications chair for the Holly Springs Optimist Club.

    Charity Roberts assumed the position of State Director (IDEA) for the Office of Federal Programs Division for Exceptional Children on January 1, 2025. She is a quadruple Eagle from Georgia Southern University, obtaining her bachelor’s and master’s degrees in special education. She completed a specialist and doctorate degree in educational leadership. She is certified in multiple fields within general and special education, such as elementary education, reading (P-8), special education preschool, physical and health disabilities, and P-12 special education adaptive and general curriculum. Roberts has over 30 years of experience in special education instruction and leadership in a variety of roles. After serving as a special education teacher, she became a district director of special education. From there, Roberts provided leadership support as a GLRS Director for twelve years before joining the Georgia Department of Education Office of Rural Education and Innovation.

    Board of Community Supervision

    Jimmy Kitchens and Steve Queen were reappointed.

    Judicial Legal Defense Fund Commission

    Christine Hayes serves as Deputy Executive Counsel in the Office of Governor Brian P. Kemp. Prior to joining the Governor’s staff, she was director of governmental affairs for the State Bar of Georgia, where she worked on a variety of legislative issues that affect the judiciary and the legal profession. She also held roles at the Judicial Council/Administrative Office of the Courts, Georgia General Assembly, and as an associate at Fields Howell where she focused on insurance coverage issues and related litigation. Hayes holds a bachelor’s degree in political science from the University of Florida and a law degree from Emory University. She and her husband, Jonathan, live in Atlanta with their two daughters.

    State Board of Long-term Care Facility Administrators

    Timothy Bush and Laura Cayce were reappointed.

    Suzanne Gerhardt serves as Senior Vice President of Health Services at PruittHealth, Inc., where she oversees skilled nursing center operations across four states. With a career in long-term care that began in 1983, she brings decades of hands-on experience in healthcare management, including roles in business operations, social services, admissions, and auditing. Gerhardt became a licensed Nursing Home Administrator in 1997 and has since managed multiple facilities and regional operations. She is known for her focus on regulatory compliance, operational efficiency, and improving patient outcomes. In addition to her leadership at PruittHealth, she has served in various roles with the Georgia Health Care Association, including Chair of the Board and, currently, as immediate past chair.

    Donna Sant is a public policy professional with extensive experience in political organizing, campaign operations, and grassroots leadership. She served as Chairman of the Houston County Republican Party from 2018 to 2024 and has held multiple roles within the Georgia Republican Party, including State Committee Member and County Vice Chair. She has led volunteer efforts, managed election headquarters, coordinated large-scale events, and served as a liaison between voters and candidates. Sant holds a master’s in public policy from Liberty University and a B.F.A. in TV/Film production from Valdosta State College. A graduate of Republican Leadership for Georgia, she is also a recipient of the Ted & Barbara Waddle Award of Excellence. She lives in Elko, Georgia, with her husband. They have three adult children. Sant will serve as the consumer member on the State Board of Long-term Care Facility Administrators.

    Board of Trustees of the Teachers Retirement System of Georgia

    Mary Elizabeth Davis is the Superintendent of Cherokee County Schools, serving 42,000 students. She has spent nearly 20 years in Georgia public education, holding leadership roles in four school districts. Prior to her current role, she served as Superintendent of Henry County Schools for nearly seven years, where she led improvements in operational systems, financial management, and student outcomes. Her previous roles include Chief Academic Officer in Cobb County and Assistant Superintendent for Curriculum and Instruction in Gwinnett County. She began her career as a chemistry teacher and coach in Fairfax County, Virginia. Davis was named one of District Administration’s 100 most influential education leaders in 2024 and is a former finalist for Georgia Superintendent of the Year. She holds a chemistry degree from Messiah College and a Ph.D. in Education Policy from Georgia State University. She lives in Canton, Georgia with her husband and two children.

    Board of Juvenile Justice

    Lisa Colbert was reappointed.

    State Board of Veterinary Medicine

    Jessica Sewell was reappointed.

    Georgia Opioid Settlement Advisory Commission

    Trey Bennett is the general counsel and grants division director for the Georgia Governor’s Office of Planning and Budget. A seasoned attorney and public policy advisor, Bennett has over a decade of legal and governmental experience, including past service as deputy executive counsel to Governor Brian Kemp. He oversees the ethical execution of billions of dollars in federal grant funding, advises on statewide emergency responses, and helps shape key legislation across multiple sectors. Bennett also has substantial courtroom experience, having served as both a criminal prosecutor and a defense attorney in Northeast Georgia. He holds a J.D. from the University of Georgia School of Law and lives in Hoschton, Georgia, with his wife, Katherine, and their four children.

    Council for the Arts- Chair

    Colt Chambers was reappointed.

    Board of Commissioners of the Superior Court Clerks’ Retirement Fund of Georgia

    Timothy Harper, Linda Hays, Daniel Jordan, Michael King, and Rhett Walker were reappointed.

    Georgia Public Service Commission Advisory Committee

    Jeff Jacques is a civil engineering professional with over 35 years of experience in transportation and utility coordination. He began his career with the Georgia Department of Transportation in 1983 as a civil engineer co-op and held various roles over a 20 year tenure, including district utilities engineer and area maintenance engineer. Since 2007, he has served as worksite utility coordination supervisor and utility coordination manager with CWM. Jacques is actively involved in the Georgia Utility Coordination Council, Georgia 811 Excavator Advisory Council, GHCA Utilities Task Force, and the GUCC Legislative Committee. He also served Franklin County as a Republican member of the Board of Commissioners from 2002 to 2018 and as Chairman from 2023 to 2024. A graduate of Emmanuel College and Southern Tech, Jacques resides in Franklin County with his wife, Christy. They have three adult children, and he is a member of Liberty Baptist Church in Carnesville.

    Disability Services Ombudsman Medical Review Group

    George Leach is an Assistant Professor of Emergency Medicine at Emory University School of Medicine and an attending physician at Grady Memorial Hospital. He has over 15 years of clinical and academic experience, with a focus on quality improvement, systems-based practice, and medical education. Leach completed his undergraduate studies at the University of North Carolina and earned his medical degree from Emory University, where he also completed his emergency medicine residency and served as chief resident. His academic contributions include developing a national curriculum for advanced emergency medicine learners and leading peer review process improvements at Grady. He is a member of multiple professional organizations, including the American College of Emergency Physicians and the Society for Academic Emergency Medicine. Dr. Leach has received numerous teaching awards and is actively involved in resident education, mentorship, and committee leadership at Emory and Grady.

    Georgia Environmental Finance Authority

    Jimmy Andrews and Travis Turner were reappointed.

    Georgia Child Support Commission

    Ben Land was reappointed.

    Behavioral Health Reform and Innovation Commission

    Kevin Tanner was reappointed as Chairman.

    Karen Bailey, Melanie Dallas, Jason Downey, Nora Haynes, Miriam Shook, Sarah Vinson, DeJuan White, and Michael Yochelson were reappointed.

    DeAnna Julian serves as Chief Executive Officer of the Frazer Center, a nonprofit providing inclusive early childhood, adult, and behavioral health services for individuals with intellectual and developmental disabilities (IDD). She also serves as President of the Service Providers Association for Developmental Disabilities (SPADD), where she works to strengthen Georgia’s IDD service network through policy engagement and provider collaboration. A former special education teacher, Julian holds certifications in special education, early childhood, and physical education, along with a master’s degree in education and transition services from the University of Kansas. She previously served as Executive Director of The Arc of Southwest Georgia, leading efforts to expand access and advance systemic reform. With more than 20 years of leadership in education and disability services, Julian has been recognized with honors including the Annette Bowling Advocacy Award and Albany’s Top 40 Under 40. She lives in Atlanta with her husband, Steve, and their two adult children.

    Carey Parrott, Sr. is the founder and CEO of Parrott Counseling Services, LLC, with over two decades of experience in addiction and mental health counseling. A licensed clinical social worker, master addictions counselor, certified clinical supervisor, and certified peer specialist for addictive diseases, he provides direct care and specialized services to individuals, families, and justice-involved populations, including re-entry and mandated clients. Parrott is a two-time graduate of the University of Georgia, earning a B.S. in psychology and an M.S.W. He later earned a doctorate in clinical social work leadership from Tulane University. His professional background includes service as caregiver support coordinator at the U.S. Department of Veterans Affairs, where he supported veterans and families navigating the challenges of mental illness and substance use. He has also served as a consultant to the Georgia Department of Behavioral Health and Developmental Disabilities, providing clinical supervision and workforce development for addiction counselors statewide. Parrott began his career working in residential treatment settings and community behavioral health programs. He is recognized for his collaborative, personalized approach and his ongoing commitment to supporting recovery and resilience in the Athens community and beyond.

    Child Advocate Advisory Committee

    Andre Blanchard and Jay Watkins were reappointed.

    Georgia Hotel Motel Tax Performance Review Board

    David Dukes was reappointed. 

    MIL OSI USA News –

    August 5, 2025
  • MIL-OSI Africa: President John Dramani Mahama Partakes in the 178th Independence Day Celebrations in Monrovia

    Source: APO


    .

    President John Dramani Mahama, on Saturday, joined President Joseph Nyuma Boakai and the people of Liberia to celebrate their 178th Independence Day celebration in Monrovia. The event held at the Centennial Memorial Pavilion in Monrovia, Montserrado County, was attended by heads of states from the subregion including the Presidents of Senegal, Sierra Leone, and Guinea Bissau. There were also representatives of the governments of Cote D’Ivoire, Nigeria, and Gambia. Liberia used the occasion to recognise ECOWAS member states that contributed troops to the multinational peacekeeping force, ECOMOG, which played a key role in ending the civil war as well as securing humanitarian corridors during the Liberian war. President Mahama received Ghana’s honour from the Liberian President on behalf of the Ghana Armed Forces and the people of Ghana for the contribution of its gallant soldiers. President Boakai in a spirit of national reconciliation said Liberia must heal itself, unite for a common purpose and inspire all for a faster development of the country. He called on all his citizens to leverage on technology to transform Liberia. The celebration as on the theme “One people, one destiny, healing the past and building the future the ceremony reflected on the past, need for stock taking, reconciliation, a united national identity to rebuild a peaceful Liberia, endowed with rich natural resources”. The President was accompanied by the Minister for Defence, Dr Edward Omane Boamah, the Chief of Defence Staff of the Ghana Armed Forces, Lt. General William Agyapong and Deputy Chief of Staff, Operations, Stanislav Xoese Dogbe.

    Distributed by APO Group on behalf of Embassy of Ghana in Liberia.

    MIL OSI Africa –

    August 5, 2025
  • MIL-OSI USA: Warner Applauds Committee Approval of Bipartisan Bill to Extend Life-Saving Veteran Suicide Prevention Program

    US Senate News:

    Source: United States Senator for Commonwealth of Virginia Mark R Warner

    WASHINGTON – U.S. Sen. Mark R. Warner (D-VA) today applauded the Senate Veterans’ Affairs Committee for advancing legislation to renew and expand the Staff Sergeant Parker Gordon Fox Suicide Prevention Grant program – a community-based mental health initiative Warner co-authored with Sen. John Boozman (R-AR) that is set to expire this year without congressional action.

    “This program was born out of a simple but urgent idea: that we need to meet veterans where they are, in their communities, with the support and services that could save their lives,” said Sen. Warner. “I’m proud to see this grant program making a difference across the country, including here in Virginia, and glad that we’re one step closer to making sure it doesn’t lapse at the end of the year.”

    Suicide is the 12th-leading cause of death for veterans, and the 2nd-leading cause for veterans under 45. Over 131,000 veterans have died by suicide since 2001, with veterans being 72% more likely than the civilian population to die by suicide. Since its original passage in 2021, the Fox Grant Program has worked to end this crisis by distributing hundreds of millions in funding to organizations that provide critical, frontline mental health services to veterans. In 2024 alone, Virginia organizations received $4.5 million from these grants. The program honors Veteran Parker Gordon Fox, a veteran and former sniper instructor at the U.S. Army Infantry School at Ft. Benning, GA. SSG Fox died by suicide on July 21, 2020 at the age of 25. 

    The legislation advanced in committee on Wednesday would reauthorize the program before it expires on September 30 and expand its reach to ensure more veterans can access support where they live.

    “Veteran suicide is a national emergency,” Sen. Warner added. “We have a responsibility to keep pushing for solutions that work. This program is one of them, and I look forward to seeing it expanded under the law.”

    The bill now heads to the full Senate for consideration.

    MIL OSI USA News –

    August 5, 2025
  • MIL-OSI China: PLA celebrates 98 years, vows strength and readiness 2025-08-01 00:11:56 China’s military is willing to work with armed forces from other nations to jointly tackle global risks and challenges, and to help build a world of lasting peace, universal security and shared prosperity, Defense Minister Dong Jun said on Thursday.

    Source: People’s Republic of China – Ministry of National Defense

      The Ministry of National Defense hosts a reception on Thursday at the Great Hall of the People in Beijing. The event celebrates the 98th anniversary of the founding of the People’s Liberation Army, which is on Aug 1. [Photo by  Xu Dong / For China Daily]

      China’s military is willing to work with armed forces from other nations to jointly tackle global risks and challenges, and to help build a world of lasting peace, universal security and shared prosperity, Defense Minister Dong Jun said on Thursday.

      He made the remarks at a reception hosted by the Ministry of National Defense at the Great Hall of the People in Beijing to mark the 98th anniversary of the founding of the People’s Liberation Army, which falls on Friday.

      Dong said the PLA is ready to work with foreign militaries to implement the concept of a community with a shared future for humanity, as well as the Global Development Initiative, the Global Security Initiative and the Global Civilization Initiative.

      He extended greetings to PLA officers and personnel, members of the armed police and paramilitary forces, and paid tribute to veterans, military heroes and model service members for their contributions to the country’s defense.

      Dong noted that this year marks the 80th anniversary of the victory in the Chinese People’s War of Resistance Against Japanese Aggression and the World Anti-Fascist War. It also marks the 80th anniversary of Taiwan’s recovery from Japanese occupation and the founding of the United Nations.

      Under the leadership of the Communist Party of China, the PLA has made “immortal achievements” in saving the nation from peril and achieving national liberation, Dong said, while contributing significantly to the global fight against fascism.

      “In just over a month, the PLA will present itself as a force of peace, justice and might, ready to be reviewed by the Party and the people,” he said, referring to the upcoming military parade scheduled for Sept 3 in Beijing to commemorate the 80th anniversary of victory over Japanese aggression and fascism.

      Dong reiterated that the PLA “will never allow any attempts at ‘Taiwan independence’ to succeed” and said the military is prepared to counter any external military interference. The PLA, he said, remains fully ready to realize the complete reunification of the motherland.

      He added that the Chinese military will step up training and enhance combat readiness to fulfill its missions and responsibilities in the new era.

    loading…

    MIL OSI China News –

    August 5, 2025
  • Trump’s envoy meets Netanyahu for Gaza aid, ceasefire push

    Source: Government of India

    Source: Government of India (4)

    U.S. special envoy Steve Witkoff met Israeli Prime Minister Benjamin Netanyahu on Thursday in a bid to salvage Gaza truce talks and tackle a humanitarian crisis in the enclave, where a global hunger monitor has warned that famine is unfolding.

    Shortly after Witkoff’s arrival, President Donald Trump posted on his Truth Social network: “The fastest way to end the Humanitarian Crises in Gaza is for Hamas to SURRENDER AND RELEASE THE HOSTAGES!!”

    Indirect ceasefire talks between Israel and Palestinian Islamist group Hamas in Doha ended in deadlock last week with the sides trading blame for the impasse and gaps lingering over issues including the extent of an Israeli military withdrawal.

    Witkoff arrived with Israel facing mounting international pressure over the widespread destruction of Gaza and constraints on aid in the territory, with Canada the latest Western power to say it will recognise a Palestinian state.

    Israel on Wednesday sent a response to Hamas’ latest amendments to a U.S. proposal that would see a 60-day ceasefire and the release of some hostages in exchange for Palestinian prisoners, a source familiar with the details said.

    There was no immediate comment from Hamas. Israeli officials have in recent days said Israel might declare that it would annex parts of Gaza if the stalemate continues.

    Gaza medical officials said at least 23 people were reported killed by Israeli fire across the enclave, including 12 people among crowds who had gathered to receive aid around the Netzarim corridor, an area held by Israeli troops in central Gaza.

    The Israeli military said that its troops had fired warning shots to disperse crowds that were endangering them with no casualties identified.

    Since the war began, the Gaza health ministry has recorded 156 deaths from starvation and malnutrition, most of them in recent weeks, including at least 90 children.

    Israel’s Public Broadcaster Kan said Witkoff would also visit an aid distribution site in Gaza.

    Confronted by rising international outrage over images of starving children, Israel said on Sunday it would halt military operations for 10 hours a day in parts of Gaza and designate secure routes for convoys delivering food and medicine.

    CALLS ON HAMAS TO DISARM

    The U.N. Office for the Coordination of Humanitarian Affairs said on Wednesday the United Nations and its partners had been able to bring more food into Gaza in the first two days of pauses, but the volume was “still far from enough”.

    Even with more aid running through Gaza, residents face peril from Israeli forces and Palestinian looters when trying to reach the supplies.

    “I have tried several times to grab a sack of flour. The only time I managed to do so, someone with a knife froze me in the street and took it away, threatening to stab me,” one man from Deir Al-Balah told Reuters, asking not to be identified.

    With the number of Palestinians killed in almost two years of war passing 60,000 this week, pressure has been mounting in Gaza on Hamas to reach a ceasefire deal with Israel.

    “We can save thousands of lives and maybe the war wouldn’t resume,” Rami from Gaza City told Reuters via a chat app.

    Mothers of hostages led a protest outside Netanyahu’s office, calling on the government to end the war.

    “End this nightmare,” said Yael Engel-Lichi, whose nephew had been taken hostage and released in a previous ceasefire. Twenty of the 50 hostages still held by militants in Gaza are believed to still be alive.

    Netanyahu, whose ruling coalition includes two far-right parties who want to conquer Gaza and re-establish Jewish settlements there, has said he will not end the war until Hamas no longer rules the enclave and lays down its arms.

    Hamas has rejected calls to disarm.

    Qatar and Egypt, who are mediating the ceasefire efforts, backed a declaration on Tuesday by France and Saudi Arabia which outlined steps for a two-state solution to the Israeli-Palestinian conflict.

    The declaration says Hamas “must end its rule in Gaza and hand over its weapons to the Palestinian Authority”, which is led by its rivals and exercises limited self-rule in parts of the Israeli-occupied West Bank.

    Israel has ruled out the Palestinian Authority gaining control of Gaza and on Thursday Defence Minister Israel Katz and Justice Minister Yariv Levin voiced support for annexing the West Bank – territory which the Palestinians seek for a state.

    Israel has denounced declarations by France, Britain and Canada since last week that they may recognise a Palestinian state, which Israel says amounts to rewarding Hamas for its October 7, 2023 assault on Israeli territory.

    That attack, when fighters killed 1,200 people and took 251 hostages back to Gaza, precipitated the war.

    German Foreign Minister Johann Wadephul, embarking on a visit to Israel, said negotiations for a two-state solution must begin but that for Germany, the recognition of a Palestinian state would come at the end of that process.

    (Reuters)

    August 5, 2025
  • MIL-OSI USA: Adventure awaits: USGS releases detailed topographic maps designed for recreational use

    Source: US Geological Survey

    Custom Extent 25K Recreational Topo showing elevation, hydrography, geographic names, transportation, structures, boundaries, and woodland tint around Grand Canyon Village in Grand Canyon National Park, Arizona. This OnDemand Topo was generated using the topoBuilder application in June 2025.

    The maps are highly detailed, allowing users to see subtle changes in terrain and plan routes that match their skill level, time constraints and interests. They also have specialized symbols that denote key recreational features like trailheads, campsites, picnic areas, and other amenities, making it easier to locate resources for outdoor enthusiasts of all ages and abilities. Rivers, trails, forests, and structures are emphasized, providing a comprehensive view of the environment with a focus on recreational opportunities. The maps highlight protected areas, such as national parks, national forests and national wild and scenic rivers, encouraging responsible exploration.

    “Whether you are a seasoned explorer or a casual hiker, the new USGS maps are a game-changer for recreational activities. If you’re looking for the shortest path to a summit or a leisurely trail along a river, these maps have you covered,” said Ariel Doumbouya, a USGS geographer and product lead. 

    These new maps are called 25K Recreational Topos because they have a 1:25,000 scale, which means one inch on the map represents 25,000 inches on the ground. This is about 2,083 feet or roughly 0.4 miles. This scale was used because it matches those used in Alaska, Canada, and by the U.S. Military, simplifying the user experience and aligning with scales used by national and international agencies and industries. 

    The level of detail these new maps bring to outdoor navigation make it easier to explore the natural wonders of the U.S. while supporting access to public lands for everyone. Designed with modern mapping technology, these maps offer precise coordinates and topographical details perfect for remote explorations.

    The new 25K Recreational Topo is available through the USGS topoBuilder application, where users can customize and download digital OnDemand Topo maps featuring the most up-to-date data from The National Map. These maps can be integrated with GPS devices or mobile apps, providing real-time navigation in the field. The maps are free for digital use, reinforcing the USGS commitment to making geographical data accessible to all, and enhancing public access to public lands for outdoor exploration.

    “The 25K Recreational Topos mark a milestone in supporting recreation and reflect USGS’s commitment to innovative cartography that serves and supports the American public.” said Doumbouya. “They empower adventurers to explore the outdoors with greater confidence, insights, and awareness of their surroundings.”

    Ready to hit the trails? Check out the new maps and start planning your next adventure. Let the 25K Recreational Topo guide you to places you’ve only dreamed of exploring!

    Learn more about the variety of topographic maps from the U.S. Geological survey. 

    MIL OSI USA News –

    August 5, 2025
  • MIL-OSI USA: Attorney General Bonta Issues Consumer Alert Amid Increase in Reported Scams Targeting the Military Community

    Source: US State of California

    Thursday, July 31, 2025

    Contact: (916) 210-6000, agpressoffice@doj.ca.gov

    Does an offer seem too good to be true? Take a tactical pause to evaluate  

    OAKLAND — In recognition of Military Consumer Month, Attorney General Rob Bonta today issued a consumer alert to help protect California service members, veterans, and their family members from targeted common scams and fraud. The military community and their families are often targets for predatory scammers: According to the Federal Trade Commission, military consumers nationwide reported over 99,400 fraud complaints last year — an increase from 2023’s approximately 93,000 complaints — including 44,587 imposter scams that reportedly cost them and their families over $199 million.  

    “More and more often, service members, veterans, and their families are targets for predatory scammers promising everything from home loans to jobs, and continuing education. This is absolutely unacceptable. As part of our commitment to protect those who protect us, my office will continue to bring the full force of the law against those who seek to exploit California’s military community,” said Attorney General Bonta. “If you have fallen victim to a scam or suspect fraudulent activity, get help and share your story so that we can help your fellow service members. You can report fraud to your local military or civilian law enforcement agency, or to the California Department of Justice at oag.ca.gov/report.”

    Why is the Military Community Targeted? 

    Military service members, veterans, and their families are frequently targeted by scammers who want access to their pay and benefits, and who know that military members will often pay even fraudulent or over-stated debts to avoid security clearance issues or other disruptions to their military careers. In addition, the camaraderie that unites the military community is often exploited by impostors who claim to be veterans in attempts to perpetrate scams or access personal information for fraudulent purposes.   

    Common Scams Targeting the Military Community:

    Scammers use a variety of tactics to gain trust. Protect yourself by staying up to date on common military- and veteran-targeted scams. Beware of the following: 

    • Charity Scams: Just because a charity includes the word “veteran” in its name doesn’t mean that veterans are members of the group, or that veterans or their families will benefit from a donation. Scammers will use names that sound legitimate or those that mimic the names of well-known charities to create confusion. Take the time to make an informed decision and be wary of aggressive solicitations. Go to oag.ca.gov/charities, under the Resources & Tools section, and click on Registry Verification Search. If a charity is not listed, it should not be soliciting funds in California. If it is listed, you can view its financial reports, including the IRS Form 990 that the charity is required to file with DOJ’s Registry of Charitable Trusts.
    • Predatory Schools: The GI Bill and other military education programs offer you the chance to attend school and plan for your future, but for-profit schools sometimes target service members and veterans with false promises. Slow down and take the time you need to make the right decision. Predatory schools often use high-pressure sales tactics to try to get you to sign up. It’s important to ask for information about the programs, such as graduation rates, job placement, and graduate salary information. Offers that seem too good to be true generally are. Further, don’t forget that educational opportunities at the California Community Colleges, California State University, and University of California may be available to you. 
    • Home Loan Scams: Be aware of scammers that — through phone calls or fraudulent mailers — claim to be affiliated with the government, the Department of Veterans Affairs, or your home loan servicer. These fraudsters may attempt to convince you to agree to loan modifications, refinance your home, or make payments on your loans. Be cautious of any individual or lender that contacts you and asks you to pay fees upfront before receiving any services; tells you to cancel your mortgage payment and resend the funds elsewhere; tells you to make payments to someone other than your current loan servicer; or pressures you to sign papers you haven’t had a chance to read thoroughly or that you don’t understand — including asking you to sign over the title to your property. 
    • Identity Theft and Fraud: Some scammers will pretend to be from the Department of Defense, Department of Veterans Affairs, or other official organizations in order to get your personal information so that they can commit identity theft or fraud. Before you provide any information, always make sure a request is coming from an official organization by doing a quick search on the internet or consulting a trusted source to get the organization’s real contact information. Never trust the contact information given by the person that is asking for your personal information, as scammers often give out fake contact information. Be wary of letters and emails that have misspellings, look unprofessional, or send you to a non-government website for information or action, as these are almost always fake. Lastly, never give out your Social Security number to receive military or veteran discounts. Scammers often promise military or veteran discounts in order to obtain personal information. 
    • Job Scams: Service members looking for new career opportunities after leaving service are a target for scammers posting fictitious job listings with the goal of stealing their personal information and finances. Avoid becoming a victim of job scams by conducting thorough research on the company. Additionally, stick to well-known job search platforms and government career websites when looking for job opportunities. Remember, legitimate employers will never require you to pay fees for applications, interviews, or background checks. You should also look out for fake check scams, which occur when a scammer posing as an employer sends you a counterfeit check to deposit into your account. The scammer will then ask you to send a portion of the funds back to them or a third party, while letting you keep some as payment. Eventually, the bank reverses the fake check, leaving you stuck paying the money back to the bank. If something feels off or suspicious during the job search, trust your instincts and end communication immediately.
    • Pension Scams: Veterans ages 65 and over are targeted by scam financial advisers who try to persuade senior veterans to buy costly annuities or transfer their assets into trusts, or pay unnecessary and illegal fees for help with a veterans pension application. These “advisers” claim to help veterans qualify for Aid and Attendance or other veterans benefits, but may cause you to lose eligibility or access to pension, disability, or healthcare benefits. If you are interested in Aid and Attendance or other veterans benefits, you can get free help from your County Veterans Service Office here.
    • Affinity Fraud: Affinity scams target members of identifiable groups, including the military. The perpetrators are — or pretend to be — members of the targeted group, and use sales pitches that rely on group trust and loyalty. In the military community, this includes exploiting the trust that service members have for their fellow service members, and for veterans who previously served. Don’t make a significant purchase, or an investment decision, based on the salesperson’s supposed military service, or the claim that a business is military-friendly or endorsed by the Armed Forces. Take a tactical pause, and shop around for the best deal.
    • Debt Collection and Illegal Threats: Debt collectors may try to trick or scare service members into making payments on debts. It is illegal for debt collectors to do any of the following: revoke your security clearance; contact your command in order to collect a debt (unless they have your consent, given after the debt came due, to do so); discipline or demote you; or garnish your pay. If a debt collector is trying to collect a debt that you do not owe or have already paid, dispute the debt in writing. Tell the debt collector why you do not owe the debt, include copies of any evidence you have, and mail this dispute to the debt collector using registered mail so that you have proof that the collector received it — and make sure to keep copies of everything for yourself. If you dispute the debt within 30 days after the collector first contacted you, the collector must stop collection until it shows you written proof of the debt.
    • Rental Housing Scams: These scams target military personnel looking for housing near a base, especially prevalent during the Permanent Change of Station season. Scammers pretend to be real estate agents and post fake ads for rental properties on websites, sometimes promising military discounts and other incentives in order to get service members to send them money for fees and deposits upfront. If someone insists on receiving money or other payments before a property has been seen, it is likely a rental scam. Avoid wiring money to reserve apartments, and use your installation housing office or established property management companies to locate potential housing. 
    • Predatory Auto Sales and Financing: Car dealers located near military bases may try to lure service members with promises of special deals for military personnel. Often, these so-called deals conceal the terms of purchase for the vehicle and result in the service member drastically overpaying for both the vehicle and the cost of financing. For example, dealers may insist that military personnel will not qualify for financing unless they purchase overpriced and unnecessary add-ons. Other times, the dealer may tell a service member who just purchased a car that the initial financing fell through and insist on renegotiating for worse terms. You should not rely on oral promises, nor feel pressured to enter into any purchase, without first reading and understanding the contract. If you are looking to purchase a car, you should explore all of your options for financing — including by contacting your bank or credit union — before making a purchase.  

    Protect Yourself from Scams:  

    • Bring a battle buddy when making big decisions, and take a tactical pause: Take your time with big decisions and get advice. A business that pressures you to make a quick decision or to not talk with your family, friends, a military financial counselor, or an officer or NCO that you trust may be out to scam you.
    • Take advantage of free annual credit reports: You are entitled to one free credit report every year from each of the three national credit bureaus: Equifax, Experian and TransUnion. Your credit history contains information from financial institutions, utilities, landlords, insurers, and others. By checking your credit reports at least once a year, you can identify signs of identity theft, as well errors in your report that could be raising the cost of your credit. Order your free annual credit reports by phone, toll-free, at 1-877-322-8228, or online at www.annualcreditreport.com.
    • Place a Fraud Alert: If your identity is stolen, put a fraud alert on your credit report by contacting the three main credit reporting agencies: Equifax, Experian, and TransUnion. Also, consider requesting a credit freeze, which will restrict access to your credit file, making it difficult for identity thieves to open new accounts in your name. Report identity theft right away and get a recovery plan at identitytheft.gov. Additionally, file a police report with your local sheriff or police department and keep a copy for your records.
    • Report Suspicious Activity: Never give out personal information to a lender or servicer that contacts you out of the blue. If you are feeling unsure, hang up and call your loan servicer directly at the number that is listed on your mortgage statement. Report suspicious activity to the Office of the Attorney General at oag.ca.gov/report and file a complaint with the FTC at reportfraud.ftc.gov.
    • Protect your online information and accounts with strong passwords: Protect yourself by using different, unique passwords for each of your online accounts. Make sure that the passwords you use are at least eight characters, including a mix of letters, numbers, and symbols.
    • Check your credit card bills and bank statements often: Look for unauthorized charges, withdrawals, or unexpected bills, and report irregular activity to your bank as soon as you see it. If you notice that a bill didn’t arrive on time, it may mean that someone has changed the contact information on your account in order to hide fraudulent charges. Don’t share personal information: Be careful about what personal information you share, such as your address or financial information.
    • Sign up for the Enhanced Homeowner Notification Program: If you reside in Los Angeles County, you may sign up to receive mailed copies of documents recorded against your home, allowing you to review recorded real estate documents so you are aware of actions taken against your property.

    If you believe you have been the victim or target of a scam, immediately contact your local police department or reach out to your base legal office. For the legal office’s contact information, ask your command or visit to legalassistance.law.af.mil/. California National Guard personnel can also obtain legal help at calguard.ca.gov. You may also file a complaint with the Office of the Attorney General at oag.ca.gov/report. For additional information on military-targeted scams, visit our website at oag.ca.gov/consumers/general/military.

    # # #

    MIL OSI USA News –

    August 5, 2025
  • MIL-OSI Security: D.C. Guard Tests Skills With Jamaican, Barbadian Forces

    Source: United States SOUTHERN COMMAND

    Soldiers from the District of Columbia National Guard; Jamaica Defence Force, or JDF; Jamaica National Reserve; and Barbados Defence Force Reserves recently participated in the Caribbean Regional Training Camp 2025, a joint exercise aimed at bolstering regional security, enhancing disaster response capabilities and strengthening interoperability among the participating nations.

    MIL Security OSI –

    August 5, 2025
  • MIL-OSI Analysis: Will the latest diplomatic moves to end the war in Gaza work?

    Source: The Conversation – UK – By Jonathan Este, Senior International Affairs Editor, Associate Editor, The Conversation

    This article was first published in The Conversation UK’s World Affairs Briefing email newsletter. Sign up to receive weekly analysis of the latest developments in international relations, direct to your inbox.


    It feels as if things are moving at completely different speeds in Gaza and in the outside world. From the embattled Gaza Strip the narrative is depressingly familiar. Dozens more Palestinian civilians have been killed in the past 24 hours as they try to get hold of scarce supplies of food.

    Aid agencies report that despite air drops of supplies and “humanitarian pauses” in the fighting, the amount of food getting through to the starving people of Gaza remains pitifully insufficient.

    Two more children are reported to have died of starvation, bringing the total number of hunger-related deaths to 159, according to Palestinian sources quoted by al-Jazeera.

    US envoy Steve Witkoff arrived in Jerusalem for more talks as the US president Donald Trump posted his latest bout of social media diplomacy on his TruthSocial site, a message which appears pretty faithful to the Netanyahu government’s position: “The fastest way to end the Humanitarian Crises in Gaza is for Hamas to SURRENDER AND RELEASE THE HOSTAGES!!”

    Both sides continue to reject the other side’s demands, bringing ceasefire negotiations to an effective standstill.

    In the outside world, meanwhile, events seem to be gathering pace. A “high-level conference” at the United Nations in New York brought together representatives of 17 states, the European Union and the Arab League, resulting in “a comprehensive and actionable framework for the implementation of the two-state solution and the achievement of peace and security for all”.


    Sign up to receive our weekly World Affairs Briefing newsletter from The Conversation UK. Every Thursday we’ll bring you expert analysis of the big stories in international relations.


    What first catches the eye about this proposal, which was signed by Saudi Arabia,
    Qatar, Egypt and Jordan, is that it links a peace deal with the disarming and disbanding of Hamas. It also condemns the militant group’s savage attack on southern Israel on October 23 2023, which was the catalyst for the latest and arguably most grievous chapter of this eight-decade conflict. It’s the first time the Arab League has taken either of these positions.

    The New York declaration, as it has been dubbed, envisages the complete withdrawal of Israeli security forces from Gaza and an end to the displacement of Palestinians. Government will be the responsibility of the Palestinian Authority (PA), and a conference to be scheduled in Egypt will design a plan for the reconstruction of Gaza, much of which has been destroyed in the 20-month assault by the Israel Defense Forces.

    It is, writes Scott Lucas, a “bold initiative” which, “in theory could end the Israeli mass killing in Gaza, remove Hamas from power and begin the implementation of a process for a state of Palestine. The question is whether it has any chance of success.”

    Lucas, an expert in US and Middle East politics at the Clinton Institute of University College Dublin, is not particularly sanguine about the short-term prospects for a ceasefire and the alleviation of the desperate conditions for the people of Gaza. But what it represents more than anything else, is “yet another marker of Israel’s increasing isolation”.

    He points to recent announcements that France, the UK (subject to conditions) and Canada will recognise the state of Palestine at the UN general assembly in September. The prospect of normalisation between Israel and Arab states, at the top of the agenda a few short years ago, is now very unlikely. And in the US, which remains Israel’s staunchest ally, a Gallup poll recently found that public opinion is turning against Israel and its prime minister, Benjamin Netanyahu.




    Read more:
    New peace plan increases pressure on Israel and US as momentum grows for Palestinian statehood


    But how important are the declarations by France, the UK and Canada of intent to potentially recognise Palestinian statehood, asks Malak Benslama-Dabdoub. As expert in international law at Royal Holloway University of London, who has focused on the question of Palestinian statelessness, Benslama-Dabdoub thinks that the French and British pledges bear closer examination.

    The French declaration was made on July 24 on Twitter by the president, Emmanuel Macron. Macron envisages a “demilitarised” state, something Benslama-Dabdoub sees as a serious problem, as it effectively denies the fundamental right of states to self-determination and would rob a future Palestinian state of the necessary right to self-defence.

    The declaration by the UK prime minister that Britain may also recognise Palestinian statehood in September is framed as a threat rather than a pledge. Unless Israel agrees to a ceasefire, allows the UN to recommence humanitarian efforts and engages in a long-term sustainable peace process, the UK will go ahead with recognising Palestine at the UN.

    You have to consider that the UK government’s statement said that the position has always been that “Palestinian statehood is the inalienable right of the Palestinian people”. So to frame this as a threat rather than a demand is arguably to deny that “inalienable right”.




    Read more:
    UK to recognise Palestinian statehood unless Israel agrees to ceasefire – here’s what that would mean


    Paul Rogers also sees serious problems with the pledges to recognise Palestinian statehood. Demands for Hamas to disarm and play no further role in Palestinian government he sees as a non-starter as is the thought of a demilitarised Palestine. “Neither plan has the slightest chance of getting off the ground.”

    Rogers, who has researched and written on the Middle East for more than 30 years, also thinks that without the full backing of the US there is very little chance that a peace plan could succeed.

    Rogers finds it hard to believe that Washington will change tack on the Palestinian question, “unless the US president somehow gets the idea that his own reputation is being damaged”. There’s always a chance of this. News from the Gaza Strip is relentlessly horrifying and the aforementioned polls suggest many voters are reassessing their views of the conflict. But Trump is heavily indebted for his re-election to the far-right Christian Zionist movement, who wield a great deal of power with the White House.

    The other thing that might influence the conflict is if enough of the IDF’s top brass recognise the futility of waging what has always been an unwinnable conflict. This, writes Rogers, is whispered about in Israel’s military circles and one eminent retired general, Itzhak Brik, has come out and said: “Hamas has defeated us.”

    These, writes Rogers, are currently the only routes to an end to the conflict.




    Read more:
    UK and France pledges won’t stop Netanyahu bombing Gaza – but Donald Trump or Israel’s military could


    Inside Trumpian diplomacy

    We mentioned earlier that the Canadian prime minister, Mark Carney, has also pledged to recognise the state of Palestine in September. This was immediately greeted by Trump with the threat that he does so it will derail a trade deal with the US. Whether this will cut any ice with Carney, who had to make concessions to get the trade deal done in the first place, remains to be seen.

    But there’s a broader point here, writes Stefan Wolff. As Wolff reports, this week the foreign ministers of the Democratic Republic of Congo and Rwanda got together in Washington to sign a ceasefire deal, brokered by the US. Trump also claims to have successfully ended a conflict between India and Pakistan at the end of May and hostilities between Thailand and Cambodia earlier this month.

    Meanwhile his efforts to secure peace deals, or even a lasting ceasefire, in Gaza or Ukraine have been unsuccessful.

    Wolff considers why some countries respond to Trump’s diplomatic efforts while others don’t. There are a number of reasons, principally the US president’s ability to apply leverage through trade deals or sanctions and the differing complexity of the conflicts.

    He also points to the depleted resources of the US state department, Trump’s use of personal envoys with little foreign affairs experience and the US president’s insistence on making all the important decisions himself. He concludes: “The White House simply may not have the bandwidth for the level of engagement that would be necessary to get to a deal in Ukraine and the Middle East.”




    Read more:
    Why Donald Trump has stopped some conflicts but is failing with Ukraine and Gaza


    One US government department whose resources haven’t been depleted under Donald Trump is the US Immigration and Customs Enforcement agency, known as Ice. Part of the Department of Homeland Security, Ice has been responsible for identifying and detaining non-citizens and undocumented migrants.

    Their agents carry guns, wear masks and typically operate in plain clothes, although they often wear military kit. The agency received massive funding via Trump’s One Bzig Beautiful Bill Act earlier this month, which will allow the agency to recruit hundreds, if not thousands, of new agents. The number of arrests is increasing steadily, as is the disquiet their operations are prompting in many American cities, where opposition protests are also growing.

    Dafydd Townley, an expert in US politics at the University of Portsmouth, explains how Ice operates and where it sits in Donald Trump’s plan to deport millions of illegal migrants from the US.




    Read more:
    Masked and armed agents are arresting people on US streets as aggressive immigration enforcement ramps up


    World Affairs Briefing from The Conversation UK is available as a weekly email newsletter. Click here to get updates directly in your inbox.


    – ref. Will the latest diplomatic moves to end the war in Gaza work? – https://theconversation.com/will-the-latest-diplomatic-moves-to-end-the-war-in-gaza-work-262380

    MIL OSI Analysis –

    August 5, 2025
  • MIL-OSI Security: CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization

    Source: US Department of Homeland Security

    Summary

    The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement. The purpose of this advisory is to highlight identified cybersecurity issues, thereby informing security defenders in other organizations of potential similar issues and encouraging them to take proactive measures to enhance their cybersecurity posture. This advisory has been coordinated with the organization involved in the hunt engagement.

    In 2024, CISA led a proactive hunt engagement at a U.S. critical infrastructure organization with the support of USCG analysts. During hunts, CISA proactively searches for evidence of malicious activity or malicious cyber actor presence on customer networks. The organization invited CISA to conduct a proactive hunt to determine if an actor had been present in the organization’s environment. (Note: Henceforth, unless otherwise defined, “CISA” is used in this advisory to refer to the hunt team as an umbrella for both CISA and USCG analysts).

    During this engagement, CISA did not identify evidence of malicious cyber activity or actor presence on the organization’s network, but did identify cybersecurity risks, including:

    • Insufficient logging;
    • Insecurely stored credentials;
    • Shared local administrator (admin) credentials across many workstations;
    • Unrestricted remote access for local admin accounts;
    • Insufficient network segmentation configuration between IT and operational technology (OT) assets; and
    • Several device misconfigurations.

    In coordination with the organization where the hunt was conducted, CISA and USCG are sharing cybersecurity risk findings and associated mitigations to assist other critical infrastructure organizations with improving their cybersecurity posture. Recommendations are listed for each of CISA’s findings, as well as general practices to strengthen cybersecurity for OT environments. These mitigations align with CISA and the National Institute for Standards and Technology’s (NIST) Cross-Sector Cybersecurity Performance Goals (CPGs), and with mitigations provided in the USCG Cyber Command’s (CGCYBER) 2024 Cyber Trends and Insights in the Marine Environment (CTIME) Report.

    Although no malicious activity was identified during this engagement, critical infrastructure organizations are advised to review and implement the mitigations listed in this advisory to prevent potential compromises and better protect our national infrastructure. These mitigations include the following (listed in order of importance):

    • Do not store passwords or credentials in plaintext. Instead, use secure password and credential management solutions such as encrypted password vaults, managed service accounts, or built-in secure features of deployment tools.
      • Ensure that all credentials are encrypted both at rest and in transit. Implement strict access controls and regular audits to securely manage scripts or tools accessing credentials.
      • Use code reviews and automated scanning tools to detect and eliminate any instances of plaintext credentials on hosts or workstations.
      • Enforce the principle of least privilege, only granting users and processes the access necessary to perform their functions.
    • Avoid sharing local administrator account credentials. Instead, provision unique, complex passwords for each account using tools like Microsoft’s Local Administrator Password Solution (LAPS) that automate password management and rotation.
    • Enforce multifactor authentication (MFA) for all administrative access, including local and domain accounts, and for remote access methods such as Remote Desktop Protocol (RDP) and virtual private network (VPN) connections.
    • Implement and enforce strict policies to only use hardened bastion hosts isolated from IT networks equipped with phishing-resistant MFA to access industrial control systems (ICS)/OT networks, and ensure regular workstations (i.e., workstations used for accessing IT networks and applications) cannot be used to access ICS/OT networks.
    • Implement comprehensive (i.e., large coverage) and detailed logging across all systems, including workstations, servers, network devices, and security appliances.
      • Ensure logs capture information such as authentication attempts, command-line executions with arguments, and network connections.
      • Retain logs for an appropriate period to enable thorough historical analysis (adhering to organizational policies and compliance requirements) and aggregate logs in an out-of-band, centralized location, such as a security information event management (SIEM) tool, to protect them from tampering and facilitate efficient analysis.

    For more detailed mitigations addressing the identified cybersecurity risks, see the Mitigations section of this advisory.

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See Appendix: MITRE ATT&CK Tactics and Techniques for a table of potential activity mapped to MITRE ATT&CK tactics and techniques.

    Overview

    Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard (USCG) analysts (collectively referred to as CISA in this report) conducted a threat hunt engagement at a critical infrastructure organization in 2024. During this hunt, CISA proactively searched for evidence of malicious activity or the presence of a malicious cyber actor on the customer’s network using host, network, industrial control system (ICS), and commercial cloud and open-source analysis tools. CISA searched for evidence of activity by looking for specific exploitation tactics, techniques, and procedures (TTPs) and associated artifacts.

    While CISA did not find evidence of threat actor presence on the organization’s network, the team did identify several cybersecurity risks. These findings are listed below in order of risk. Technical details of each identified cyber risk are included, along with the potential impact from threat actor exploitation of each risk (recommendations for mitigating each risk are listed in the Mitigations section below).

    Several of these findings align with those observed during similar engagements conducted by US Coast Guard Cyber Command (CGCYBER), which are documented in their 2024 Cyber Trends and Insights in the Marine Environment (CTIME) report. The authoring agencies encourage critical infrastructure organizations to review the CTIME report to understand trends in the techniques/attack paths threat actors are using to compromise at-risk organizations, and what mitigations organizations should implement to prevent a successful attack.

    Key Findings

    Shared Local Admin Accounts with Non-Unique Passwords Stored as Plaintext

    Details: CISA identified a few local admin accounts with non-unique passwords; these accounts were shared across many hosts. The credentials for each account were stored plaintext in batch scripts. CISA discovered these authorized scripts were configured to create user accounts with local admin privileges and then set identical, non-expiring passwords—these passwords were stored in plaintext in the script. One script was configured to create an admin account (set with a password stored in the script in plaintext) and automatically add to the admin group. The account was set as the local admin account on many other hosts.

    Potential Impact: The storage of local admin credentials in plaintext scripts across numerous hosts increases the risk of widespread unauthorized access, and the usage of non-unique passwords facilitates lateral movement throughout the network. Malicious actors with access to workstations with either of these batch scripts could obtain the passwords for these local admin accounts by searching the filesystem for strings like net user /add, identifying scripts containing usernames and passwords [T1552.001], and accessing these accounts to move laterally.

    For example, during a controlled security validation exercise (with explicit permission from the customer), CISA used the credentials found in one of the scripts to log into its associated admin account locally on a workstation [T1078.003], and then establish a Remote Desktop Protocol (RDP) connection to another workstation [T1021.001]. This demonstrated that the credentials allowed local login to an admin account and enabled lateral movement to any workstation with the account. While using this account, the user had local admin privileges on many workstations. Upon initiating the RDP session, the system issued out a notification that another user was currently logged in and that continuing the session would disconnect the existing user, confirming that the account can be accessed remotely via RDP.

    The uniform use of local admin accounts with identical, non-expiring passwords across numerous hosts, coupled with the storage of these credentials in plaintext within accessible scripts, elevates the risk of unauthorized access and lateral movement throughout the network.

    With local admin access, malicious cyber actors can:

    • Modify existing accounts or create new accounts [T1098], potentially escalating privileges or maintaining persistent access.
    • Install malicious browser extensions on compromised systems [T1112].
    • Communicate with compromised systems using standard application layer protocols [T1071], which may bypass certain security monitoring tools.
    • Modify local policies to escalate privileges or disable security features [T1484].
    • Alter system configurations or install software that executes at startup [T1547], ensuring continued access and persistence.
    • Hijack the execution flow of applications to inject malicious code [T1574].

    The widespread distribution of plaintext credentials and the use of identical passwords across hosts increases the risk of unauthorized access throughout the network. This vulnerability heightens the potential for attackers to conduct unauthorized activities, which may impact the confidentiality, integrity, and availability of the organization’s assets.

    Note: This finding was associated with workstations only; servers and other devices were not affected.

    Insufficient Network Segmentation Configuration Between IT and Operational Technology Environments

    Details: While assessing interconnectivity between the customer’s IT and operational technology (OT) environments, CISA identified that the OT environment was not properly configured. Specifically, standard user accounts could directly access the supervisory control and data acquisition (SCADA) virtual local area network (VLAN) directly from IT hosts.

    First, CISA determined it was possible to establish a connection via port 21 from a user workstation in the IT network to a system within the SCADA VLAN. The test established that a network path was available, the remote host was reachable, the port was open and listening for connections, and that the port was directly accessible between the IT and SCADA VLANs, with misconfigured network-level restrictions—for example, firewalls or access control lists (ACLs)—blocking the Transmission Control Protocol (TCP) connection on the port. This test was conducted using a standard user account on a regular IT workstation without administrative privileges [T1078].

    Second, CISA discovered that the customer did not have sufficient secured bastion hosts dedicated for accessing SCADA and heating, ventilation, and air conditioning (HVAC) systems. A bastion host­—sometimes referred to as a jump box or jump server—is a specialized, highly secured system (often a server or dedicated workstation) that serves as the sole access point between a network segment (such as an internal IT network) and a protected internal network (like an OT or ICS environment). By inspecting and filtering all inbound and outbound traffic, a bastion host is designed to prevent unauthorized access and lateral movement, ensuring that only authenticated and authorized users can interact with internal systems. Though several hosts were designated as bastion hosts for remote access to SCADA and HVAC systems, they lacked the enhanced security configuration, dedicated monitoring, and specialized scrutiny expected of bastion hosts.

    Potential Impact: Insufficient OT network segmentation configuration, network access control (NAC), and the ability of a non-privileged user within the IT network to use their credentials to access the critical SCADA VLAN [T1078] presents a security and safety risk. Given that SCADA and HVAC systems control physical processes, compromises of these systems can have real-world consequences, including risks to personnel safety, infrastructure integrity, and equipment functionality.

    Malicious actors could further exploit potentially unsecured workstations with access to OT systems, and insufficient network segmentation configuration between IT and OT systems, in the following ways:

    • Use RDP or Secure Shell (SSH) protocols to move laterally from compromised IT workstations to OT systems [T1021.001] [T1021.004].
    • Execute commands and scripts using scripting languages like PowerShell to attack OT systems [T1059].
    • Map network connections to identify paths to OT systems [T1049].
    • Gather information about network configurations to plan attacks on OT systems [T1016].

    By exploiting these weaknesses, attackers can potentially gain unauthorized access to critical OT systems, manipulate physical processes, disrupt operations, and cause harm.

    Insufficient Log Retention and Implementation

    Details: CISA was unable to hunt for every MITRE ATT&CK® procedure in the scoped hunt plan partly because the organization’s event logging system was insufficient for this analysis. For example, Windows event logs from workstations were not being forwarded to the organization’s security information event management (SIEM), verbose command line auditing was not enabled (meaning command line arguments were not being captured in Event ID 4688), logging in the SIEM was not as comprehensive as required for the analysis, and log retention did not allow for a thorough analysis of historical activity.

    Potential Impact: The absence of comprehensive and detailed logs, along with a lack of an established baseline for normal network behavior, prevented CISA from performing thorough behavior and anomaly-based detection. This limitation hindered the ability to hunt for certain TTPs, such as living-off-the-land techniques, the use of valid accounts [T1078], and other TTPs used by sophisticated threat actors. Such techniques often do not produce discrete indicators of compromise or trigger alerts from antivirus software, intrusion detection systems (IDS), or endpoint detection and response (EDR) solutions. Further, the lack of workstation logs in the organization’s SIEM meant CISA could not analyze authentication events to identify anomalous activities, such as unauthorized access using local administrator credentials. This gap exposes networks to undetected lateral movement and unauthorized access.

    Insufficient logging can prevent the detection of malicious activity by hindering investigations, which makes detection of threat actors more challenging and leaves the network susceptible to undetected threats.

    Additional Findings

    Misconfigured sslFlags on a Production Server

    Details: CISA used PowerShell to examine the ApplicationHost.config file[1]—a central configuration file for Internet Information Services (IIS) that governs the behavior of the web server and its applications and websites—on a production IIS server. CISA observed an HTTPS binding configured with sslFlags==“0”, which keeps IIS in its legacy “one-certificate-per-IP” mode. This mode disables modern certificate-management features, and because mutual Transport Layer Security (TLS) (client-certificate authentication) must be enabled separately in “SSL Settings” or by adding , the binding leaves the client-certificate enforcement off by default, allowing any TLS client to complete the handshake anonymously. Moreover, sslFlags does not control protocol or cipher selection, so outdated protocols or weak cipher suites (e.g., SSL 3.0, TLS 1.0/1.1) may still be accepted unless Secure Channel (Schannel)[2] has been explicitly hardened.

    Potential Impact: The misconfigured sslFlags could enable threat actors to attempt an adversary-in-the-middle attack [T1557] to intercept credentials and data transmitted between clients and the IIS server. Malicious actors could also exploit vulnerabilities in older Secure Sockets Layer (SSL)/TLS protocols, as well as weak cipher suites, increasing the risk for protocol downgrade attacks in which an attacker forces the server and client to negotiate the use of weaker encryption standards [T1562.010]. This compromises the confidentiality and integrity of data transmitted over this channel. Furthermore, the absence of client certificate enforcement meant the server did not validate the identity of the connecting clients beyond the basic SSL/TLS handshake. This deficiency exposed the server to risks where unauthorized or malicious clients could impersonate legitimate users, potentially gaining access to sensitive resources without proper verification.

    Misconfigured Structured Query Language Connections on a Production Server

    Details: CISA reviewed machine.config file on a production server and identified that it was configured with a centralized database connection string, LocalSqlServer, for both profile and role providers. This configuration implies that, unless overridden in each application’s web.config files, every ASP.NET site on the server connects to the same Structured Query Language (SQL) Express or aspnetdb database and shares the same credentials context.

    Additionally, CISA identified that the machine.config file set the minRequiredPasswordLength to be less than 15 characters, which is CISA’s recommended password length.

    Potential Impact: Using a centralized database approach increases risk, as a single breach or misconfiguration in this central SQL database server can compromise all applications dependent on the server. This creates a single point of failure and could be exploited by attackers aiming to gain broad access to the system.

    Additionally, setting the minimum password length to any password under 15 characters is more vulnerable to various forms of brute-force attacks, such as password guessing [T1110.001], cracking [T1110.002], spraying [T1110.003], and credential stuffing [T1110.004]. If a threat actor successfully cracked these weak passwords, they could gain unauthorized access to user or application accounts and leverage vulnerabilities within applications to further escalate privileges, potentially leading to unauthorized access to the backend SQL Server databases. This could result in data breaches, data manipulation, or a loss of database integrity.

    Mitigations

    CISA and USCG recommend that critical infrastructure organizations implement the mitigations below to improve their organization’s cybersecurity posture. Recommendations to reduce cyber risk are listed for each of CISA’s findings during this engagement and are ordered starting from the highest to lowest importance for organizations to implement. CISA and USCG also include general practices to strengthen cybersecurity for OT environments that are not tied to specific findings.

    These mitigations align with the Cross-Sector Cybersecurity Performance Goals jointly developed by CISA and the National Institute for Standards and Technology (NIST). The Cybersecurity Performance Goals (CPGs) provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful TTPs. Visit CISA’s CPGs webpage for more information.

    Many of these mitigations also align with recommendations made by CGCYBER in their 2024 CTIME report. The report provides relevant information and lessons learned about cybersecurity risks gathered through operations similar to this threat hunt engagement, and best practices to mitigate these risks. Please see the 2024 CTIME report for additional recommendations for critical infrastructure organizations to implement to harden their environments against malicious activity.

    Implement Unique Credentials and Access Control Measures for Administrator Accounts

    • Provision unique and complex credentials for local administrator accounts [CPG 2.C] on all systems. Do not use shared or identical administrative credentials across systems. Ensure service accounts/machine accounts have passwords unique from all member user accounts.
      • For example, organizations can deploy Microsoft LAPS (see Microsoft Learn’s Windows LAPS Overview for more information) to ensure each machine has a unique, complex local administrator password; passwords are rotated automatically within Microsoft Active Directory, reducing the window of vulnerability; and that password retrieval is limited to authorized personnel only.
    • Require phishing-resistant multifactor authentication (MFA) [CPG 2.H] in addition to unique passwords for all administrative access, including local- and domain-level administrator accounts, RDP sessions, and VPN connections.
    • Use privileged access workstations (PAWs) dedicated solely for administrative tasks and isolate them from the internet and general network to reduce exposure to threats and lateral movement.
      • Harden PAWs by applying CIS Benchmarks: limit software to essential administrative functions, disable unnecessary services and ports, and ensure regular updates and patches.
      • Enforce strict access controls to restrict PAW access to authorized administrators only.
    • Conduct continuous auditing of privileged accounts by regularly collecting and analyzing logs of administrative activities, such as login attempts, command executions, and configuration changes [CPG 2.T].
      • Configure automated alerts for anomalous behaviors, including logins outside standard hours, access from unauthorized locations, and repeated failed logins.
      • Periodically review all administrator accounts to confirm the necessity and appropriateness of access levels; align these auditing practices with NIST SP 800-53 Rev. 5 Controls AU-2 (Auditable Events) and AU-12 (Audit Record Generation).
    • Apply the principle of least privilege by limiting administrative privileges to the minimum required for users to perform their roles [CPG 2.E].
      • Create individual administrative accounts with unique credentials and role-specific permissions and disable or rename built-in local administrator accounts to reduce common attack vectors.
      • Avoid using shared administrator accounts to improve accountability and auditability, and ensure administrators use standard accounts for non-administrative tasks to minimize credential exposure.
      • Implement Role-Based Access Control (RBAC) to assign permissions based on job functions, as aligned with NIST SP 800-53 Rev. 5 Control AC-5 (Separation of Duties).
    • Identify and remove unauthorized or unnecessary local administrator accounts, maintain oversight by documenting and tracking all authorized accounts, and enforce strict account management policies by restricting account creation privileges and implementing approval workflows for new administrator accounts.

    Securely Store and Manage Credentials

    • Purge credentials from the System Center Configuration Manager (SCCM). Review SCCM packages, task sequences, and scripts to ensure that no plaintext credentials are embedded, and update or remove any configurations that deploy scripts with plaintext credentials.
    • Do not store plaintext credentials in scripts. Instead, store credentials in a secure manner, such as with a credential/password manager or vault, or other privileged account management solution [CPG 2.L].
    • Use encrypted communication. If scripts must retrieve credentials at runtime, use encrypted channels and protocols (e.g., TLS 1.3) to communicate with secure credential stores. Ensure that credentials are not written to disk or exposed in logs.
    • Use unique local administrator passwords, such as by deploying Microsoft LAPS. Set appropriate permissions on Active Directory attributes used by LAPS (ms-MCS-AdmPwd and ms-MCS-AdmPwdExpirationTime) per Microsoft’s security recommendations.

    Establish Network Segmentation Between IT and OT Environments

    • Assess the existing network architecture to ensure effective segmentation between the IT and OT networks [CPG 2.F]—this process should evaluate both logical and physical segmentation, ensuring clear boundaries between IT and OT assets.
      • Use NIST SP 800-82 Rev. 3 (Guide to OT Security) and International Electrotechnical Commission (IEC) 62443 standards as guides for network segmentation best practices.
      • Network segmentation is essential for containing breaches within isolated segments and preventing them from spreading across networks. Depending on your environment, consider implementing the following segmentation:
        • Implement VLAN segmentation with inter-VLAN access controls.
        • Create separate VLANs for IT and OT systems, specifically isolating OT components such as SCADA systems from IT network VLANs.
        • Configure inter-VLAN access controls, including Layer 3 ACLs, to restrict traffic between IT and SCADA VLANs.
        • Deploy firewalls with application-layer filtering capabilities to monitor and control data flow between the VLANs, ensuring that only authorized protocols and devices can communicate across segments.
    • Implement a demilitarized zone (DMZ) between IT and OT environments to provide an additional security layer.
      • Position firewalls at both the IT-DMZ and OT-DMZ boundaries to filter traffic and enforce strict communication policies.
      • Configure the DMZ to act as an intermediary, with only essential communications permitted between IT and OT networks.
      • Ensure the DMZ hosts shared services (e.g., bastion hosts, jump servers, or data historians) that require limited interaction with both environments, with access controls and monitoring in place.
    • Consider a full network re-architecture if current segmentation methods cannot effectively separate IT and OT networks.
      • Collaborate with cybersecurity and network experts to design an architecture that meets ICS-specific security requirements—this redesign may involve transitioning to a micro-segmented or zero trust architecture, which includes strict identity verification for all users and devices attempting to access OT assets.[3]
    • Implement unidirectional gateways (data diodes) where appropriate to prevent bidirectional communication.
    • Keep network diagrams, configuration files, and asset inventories up to date.
    • Regularly test segmentation controls to validate their effectiveness in restricting unauthorized access by conducting penetration testing and security assessments.
      • Include simulated breach scenarios to confirm that segmentation contains threats within isolated zones.
      • Ensure compliance with NIST SP 800-53 Rev. 5 Control AC-4 (Information Flow Enforcement) to align segmentation measures with best practices for controlled information flow.

    Prevent Unauthorized Access via Port 21

    • Disable File Transfer Protocol (FTP) services on SCADA devices and servers if they are not required. Replace FTP with secure alternatives, such as SSH FTP (SFTP) or FTP over TLS/SSL (FTPS).
    • Block inbound and outbound FTP traffic on port 21 using firewalls and ACLs.
      • Implement restrictive ACL policies at network boundaries to control FTP access across all network layers.
      • As outlined in CIS Control 9.2 (Limit Unnecessary Ports, Protocols, and Services), close any unused ports to strengthen network defenses.
    • Implement IDS/Intrusion Prevention System (IPS) technologies to monitor traffic between the IT network and SCADA VLAN, use signature and anomaly detection, and integrate IDS/IPS with a SIEM system for centralized monitoring.
    • Enhance authentication and encryption mechanisms. Require MFA for SCADA access, use secure remote access technologies when necessary, securely encrypt communications (using protocols such as TLS 1.2 or higher, preferably TLS 1.3), and establish VPN tunnels to communicate between IT networks and SCADA systems.
    • Perform network traffic filtering and deep packet inspection.
      • Use SCADA-aware firewalls capable of understanding SCADA protocols and inspecting and filtering traffic at the application layer.
      • Only allowlist authorized protocols and command structures to SCADA operations. Use one-way communication devices to prevent data from flowing back into the SCADA network.

    Establish Secure Bastion Hosts for OT Network Access

    • Ensure bastion hosts are dedicated secure access points exclusively used to access the OT network and deployed as exclusive management gateways for all devices within a network.
      • Make bastion hosts the single access points for conducting all administrative tasks, system management, and configuration changes; this centralizes access control and ensures any interaction with the OT system passes through a rigorously monitored and secure environment, minimizing the potential for unauthorized access.
    • Do not allow staff to use bastion hosts as regular workstations.
      • Provide staff with separate workstations for accessing email, internet browsing, etc., on the IT network.
      • Establish and enforce policies that prohibit non-administrative activities on bastion hosts, ensuring they remain dedicated to OT network access.
    • Regularly audit and monitor bastion hosts to maintain security integrity, prevent unauthorized use, and quickly address any vulnerabilities or policy non-compliance.
    • Configure comprehensive logging of all activities on bastion hosts, including authentication attempts, command executions, configuration changes, and file transfers. Aggregate logs into a SIEM.
    • Isolate bastion hosts from the IT network; bastion hosts should reside in a separate security zone with restricted communication pathways (see CISA’s infographic on Layering Network Security Through Segmentation).
      • Deploy bastion hosts in a DMZ, imposing physical and logical isolation from other networks.
      • Configure firewalls between the IT network, bastion hosts, and the OT network, enforcing strict access control policies to allow only necessary traffic.
    • Ensure secure configuration and hardening of bastion hosts: Comply with NIST SP 800-123 and CIS Benchmarks and CNSSI 4009-2015, remove nonessential applications and services to reduce the attack surface, configure system settings to be secure, conduct effective patch management, enforce the principle of least functionality, and disable unused ports and protocols.
    • Implement access control policies: remove any access permissions to the OT network from IT workstations and ensure only bastion hosts have access to the OT network.
      • Implement NAC solutions to enforce policy-driven access control decisions based on device compliance and user authentication to provide dynamic access control and real-time visibility into the devices on the network.
    • Equip each bastion host with robust authentication mechanisms, including phishing resistant MFA [CPG 2.H], to verify the identity of users accessing the network.
      • Align with AAL3 as defined in NIST SP 800-63B. AAL3 requires hardware-based authenticators and proof of possession of cryptographic keys through secure authentication protocols.
    • Implement stringent access controls that restrict access to authorized personnel only using RBAC principles, ensuring that personnel can only access information and perform tasks pertinent to their roles and duties. This reduces the risk of internal threats or lateral movement and prevents unauthorized access.
    • Securely configure remote access tools, including by using secure protocols and disabling remote access tools on IT workstations to the OT network, enforcing that all remote access occurs through bastion hosts.
      • Disable insecure protocols like Telnet and unencrypted VNC to prevent interception and unauthorized access.
      • Log all remote access sessions and monitor for unauthorized or anomalous activities.

    Implement Comprehensive Logging, Log Retention, and Analysis

    • Implement comprehensive and verbose (i.e., detailed) logging across all systems, including workstations, servers, network devices, and security appliances [CPG 2.T].
      • Enable logging of critical events such as authentication attempts, command-line executions with command arguments (Event ID 4688), and network connections.
    • Aggregate logs in an out-of-band, centralized location [CPG 2.U] where adversaries cannot tamper with them, such as a dedicated SIEM, in order to facilitate behavior analytics, anomaly detection, and proactive threat hunting [CPG 2.T, 2.U]. For more information on behavior- and anomaly-based detection techniques, see joint guidance Identifying and Mitigating Living off the Land.
    • Ensure comprehensive logging on bastion hosts for all activities. Capture detailed records of login attempts [CPG 2.G], commands executed (with command arguments enabled), configurations changed, and files transferred.
    • Continuously monitor logs for early detection of anomalous activities. Configure the SIEM to generate automatic alerts for suspicious activity and implement behavior analysis techniques to detect anomalies.
    • Securely store log backups and use tamper resistant storage [CPG 2.U] to prevent a threat actor from altering or purging logs to conceal malicious activity.

    For additional guidance on logging, see joint guidance Best Practices for Event Logging and Threat Detection.

    Securely Configure HTTPS Bindings and LocalSqlServer Connection String

    • Enforce both client certificate verification and secure renegotiation in IIS by configuring the sslFlags setting to “3” in the ApplicationHost.config file. Setting sslFlags=“3” requires clients to present valid X.509 certificates for authentication and implements the TLS Renegotiation Indication Extension (RFC 5746). To implement this, perform the following steps:
      • Locate the element for the HTTPS site within ApplicationHost.config.
      • Set the sslFlags attribute to “3”: .
      • Restart IIS to apply the changes: iisreset.
    • Restrict the server to use only secure and up-to-date SSL/TLS protocols and cipher suites.
      • Disable deprecated protocols like SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 to prevent protocol downgrade attacks that compromise the confidentiality and integrity of data.
    • Override the global settings in machine.config by modifying each application’s web.config file to define its own connection strings and providers. This isolates applications at the database level and allows for tailored security configurations for each application.
    • Create dedicated SQL Server database accounts for each application with permissions limited to necessary operations (e.g., SELECT, INSERT, UPDATE), and avoid granting excessive privileges.
      • Do not assign roles like db_owner or sysadmin to application accounts. This reduces the risk of privilege escalation and enhances accountability through segregated access logs.
    • Use machine.config only for configurations that must be applied globally across all applications on the server.
      • Audit the machine.config file to ensure no application-specific settings are present.

    Enforce Strong Password Policies

    • Implement a system-enforced policy that requires a minimum password length of 15 or more characters for all password-protected IT assets and all OT assets, when technically feasible [CPG 2.B].
      • Consider leveraging passphrases and password managers to make it easier for users to maintain sufficiently long passwords.
    • In instances where minimum password lengths are not technically feasible, apply and record compensating controls, such as rate-limiting login attempts, account lockout thresholds, and strong network segmentation. Prioritize these systems for upgrade or replacement.
    • Implement MFA [CPG 2.H] in addition to strong passwords (i.e., passwords 15 characters or longer).

    Additional Mitigation Recommendations to Strengthen Cybersecurity

    CISA and USCG recommend critical infrastructure organizations implement the following additional mitigations (not tied to specific findings from the engagement) to improve the cybersecurity of their IT and OT environments:

    • Secure RDP from the IT to OT environments by deploying dedicated VPNs for all remote interactions with the OT network. Using RDP without strong authentication practices can lead to credential theft. Additionally, RDP does not inherently segregate or closely monitor user sessions, which can allow a compromised session to affect other parts of the network.
      • Deploy VPNs with strong encryption protocols such as SSL/TLS or Internet Protocol Security (IPsec) [CPG 2.K] to safeguard data integrity and confidentiality; use MFA [CPG 2.H] at all VPN access points to ensure only authorized personnel can gain access.
      • Configure VPN gateways to perform rigorous security checks and manage traffic destined for the OT network, ensuring comprehensive validation of all communications through pre-defined security policies.
        • VPN gateways should function as the primary enforcement points for access controls, scrutinizing every data packet to detect and block unauthorized access attempts.
      • Align the VPN traffic monitoring with the DMZ’s capabilities to regulate and inspect the data flow between IT and OT environments.
      • As part of the broader network architecture review, ensure the VPN infrastructure is correctly segmented from other network resources [CPG 2.F] to prevent any spillover effects from the IT environment to the OT network, containing potential breaches within isolated network zones.
      • Within the VPN configuration, enforce strict routing rules that require all remote access requests to pass through the DMZ and be authenticated by bastion hosts. This minimizes the risk of unauthorized access and ensures that all remote interactions with the OT network are monitored and controlled.
    • If wireless technology is employed within the OT environment, implement Wi-fi Protected Access 3 (WPA3)-Enterprise encryption with strong authentication protocols like Extensible Authentication Protocol (EAP)-TLS to ensure data confidentiality and integrity.
      • Deploy and continuously monitor Wireless Intrusion Prevention Systems (WIPS) to detect, prevent, and respond to unauthorized access attempts and anomalous activities within the wireless network infrastructure.
      • Disable unnecessary features like Service Set Identifier (SSID) broadcasting and peer-to-peer networking, enable Media Access Control (MAC) filtering as an additional layer, and keep wireless firmware updated.

    Validate Security Controls

    In addition to applying mitigations, CISA and USCG recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA and USCG recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 9).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program—including people, processes, and technologies—based on the data generated by this process.

    CISA and USCG recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Contact Information

    Critical infrastructure organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

    Additional Resources

    For more information on improving cyber hygiene for critical infrastructure IT and OT environments, please see the following additional resources authored by CISA, CGCYBER, and international partners:

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. CISA and USCG do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and USCG.

    Version History

    July 31, 2025: Initial version.

    Appendix: MITRE ATT&CK Tactics and Techniques

    See Table 1 to Table 9 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 1: Initial Access
    Technique Title ID Use
    Valid Accounts T1078 Malicious actors could use access to valid accounts for access to IT and OT networks.
    Valid Accounts: Local Accounts T1078.003 Threat actors could use credentials obtained for local administrator accounts to gain administrator access to workstations or services that use the account.
    Account Manipulation T1098 Malicious actors could modify existing accounts or create new accounts to maintain access or escalate privileges. 
    Table 2: Execution
    Technique Title ID Use
    Command and Scripting Interpreter  T1059 Malicious actors could use script interpreters like PowerShell to execute commands and scripts. 
    Table 3: Persistence
    Technique Title ID Use
    Boot or Autostart Execution T1547 Malicious actors could configure autostart execution paths to ensure persistence.
    Hijack Execution Flow T1574 Malicious actors could hijack the execution flow of applications and inject malicious code.
    Table 4: Privilege Escalation
    Technique Title ID Use
    Domain or Tenant Policy Modification T1484 Malicious actors could modify domain policies to escalate privileges or evade defenses.
    Table 5: Defense Evasion
    Technique Title ID Use
    Modify Registry T1112 Malicious actors could install malicious browser extensions on compromised systems.
    Impair Defenses: Downgrade Attack T1562.010 Malicious actors could exploit vulnerabilities in older systems to force a downgrade to a less secure mode of operation.
    Table 6: Credential Access
    Technique Title ID Use
    Unsecured Credentials: Credentials in Files T1552.001 Malicious actors could search for and exploit credentials stored in unsecured files. 
    OS Credential Dumping T1003 Malicious actors could extract credentials from memory or storage from unsecured workstations.
    Adversary-in-the-Middle T1557 Malicious actors could position themselves between networked devices to intercept credentials and other data. 
    Brute Force: Password Guessing T1110.001 Malicious actors could systematically guess possible passwords.
    Brute Force: Password Cracking T1110.002 Malicious actors could recover plaintext credentials after obtaining password hashes or other similar credential material.
    Brute Force: Password Spraying T1110.003 Malicious actors could attempt to use a common password against different accounts to try to obtain account access. 
    Brute Force: Credential Stuffing T1110.004 Malicious actors could try to use credentials gained from an unrelated account to gain access to a desired account in the victim’s environment. 
    Table 7: Discovery
    Technique Title ID Use
    System Network Connections Discovery T1049 Malicious actors could map network connections to identify paths to OT systems from an unsecured IT workstation with access to the OT network. 
    System Network Configuration Discovery T1016 Malicious actors could use an unsecured workstation to discover network configurations.
    Table 8: Lateral Movement
    Technique Title ID Use
    Remote Services: Remote Desktop Protocol T1021.001 Malicious actors could use valid credentials to establish an RDP connection to access a workstation. 
    Remote Services: SSH T1021.004 Malicious actors could use valid accounts to establish an SSH connection to a workstation.
    Table 9: Command and Control
    Technique Title ID Use
    Application Layer Protocol T1071 Malicious actors could use application layer protocols to communicate with systems they compromised while blending in with existing network traffic. 

    MIL Security OSI –

    August 5, 2025
  • MIL-OSI Russia: Chinese Defense Minister Says PLA Ready to Seek Complete Reunification of China

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 31 (Xinhua) — Chinese Defense Minister Dong Jun on Thursday said the People’s Liberation Army (PLA) is always ready to pursue the goal of complete reunification of China, resolutely oppose any separatist attempt to gain “Taiwan independence” and suppress any military interference from external forces.

    Dong Jun made the remarks at a grand reception held by the Chinese Ministry of Defense in Beijing to mark the 98th anniversary of the founding of the PLA on August 1.

    The Minister recalled that this year marks the 80th anniversary of the victory in the Chinese People’s War of Resistance against Japanese Aggression and the World Anti-Fascist War, the 80th anniversary of the liberation of Taiwan from Japanese occupation, and the 80th anniversary of the founding of the United Nations.

    On September 3, a military parade will be held in Tiananmen Square in Beijing to commemorate the 80th anniversary of the victory in the Chinese People’s War of Resistance against Japanese Aggression and the World Anti-Fascist War.

    Dong Jun said the parade would demonstrate to the Party and the Chinese people that the PLA is a powerful force that stands guard over peace and justice.

    The Chinese military, the minister added, is ready to work with its counterparts in all countries of the world to implement the concept of a community with a shared future for mankind and the three major global initiatives, jointly respond to risks and challenges, and hand in hand build a world of lasting peace, universal security, common prosperity, openness, inclusiveness, cleanliness and beauty. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    August 5, 2025
  • MIL-OSI USA: Rep. Dan Goldman’s Bipartisan Legislation Supporting Families of Fallen Law Enforcement Officers Passes Senate

    Source: US Congressman Dan Goldman (NY-10)

    Senate Adoption Tees Up Final Passage by the House in the Fall 

    ‘Chief Herbert D. Proffitt Act’ Ensures Those Who Give the Ultimate Sacrifice Are Not Unjustly Denied Benefits 

    Read the Bill Here 

    Washington, D.C. – Congressman Dan Goldman (NY-10) today celebrated the Senate’s passage of his bipartisan ‘Chief Herbert D. Proffitt Act,’ which would ensure the families of law enforcement officers who are killed as a result of their work on behalf of their communities are not unjustly denied benefits due to arbitrary retirement status restrictions. Under current law, families of officers who have retired but are later targeted and killed because of their past service are denied death benefits under the Public Safety Officers’ (PSOB) program. The unanimous Senate vote sets the legislation on a glide path to final passage by the House when members come back in session in September. Congressman Goldman introduced the legislation with Congressman Barr (KY-06) in February.  

    “We have an obligation to care for those who pay the ultimate price while serving in the line of duty, even after they have retired,” Congressman Dan Goldman said. “At a time when partisan gridlock is grinding Congress to a halt, I’m encouraged that both parties came together to pass this commonsense legislation honoring our fallen heroes. I urge Republican leadership to bring this bill to the House Floor in September and ensure that any law enforcement officers killed or injured in the line of duty receive the benefits they deserve—regardless of retirement status.” 

    Chief Herbert D. Proffitt dedicated his life to serving others, first as a U.S. Army veteran of the Korean War and then as a law enforcement officer for 55 years before retiring in 2009 as Chief of the Tompkinsville, Kentucky Police Department. On August 28, 2012, Chief Proffitt was tragically shot and killed in his driveway by an individual he had arrested a decade earlier. Although his murder was a direct retaliation for his service in uniform, his family was denied benefits under the PSOB program simply because he had retired. 

    Congressman Dan Goldman has made safeguarding public safety officers and first responders a key priority of his time in office.   

    In the Winter of 2024, Goldman publicly condemned the House Republican’s rejection of the bipartisan budget bill, which would have fully funded the World Trade Center Health Program (WTCHP).  
    In the Summer of 2024, Goldman, alongside other New York lawmakers, introduced a bipartisan, bicameral bill to address any funding gap or shortfall for World Trade Center Health Program. The ‘9/11 Responder and Survivor Health Funding Correction Act of 2024’ intended to secure permanent and mandatory funding for the WTCHP, to prevent any future funding shortfall.   
    In the Fall of 2023, Goldman joined Congressman Bill Pascrell (NJ-09), Senator Amy Klobuchar (D-MN), and Senator Kevin Cramer (R-ND) in introducing the ‘Honoring Our Fallen Heroes Act’ (Honor Act). This legislation would recognize occupational cancer deaths as line-of-duty deaths, and ensure fire fighters, police, and EMS personnel receive benefits under the Public Safety Officers’ Benefits (PSOB) program. 

    ### 

    MIL OSI USA News –

    August 5, 2025
  • MIL-OSI USA: Ciscomani Urges U.S. Air Force to Bring New Space Force Mission to Fort Huachuca

    Source: United States House of Representatives – Congressman Juan Ciscomani (Arizona)

    SIERRA VISTA, AZ – In a letter to U.S. Secretary of the Air Force Troy Meink, Congressman Juan Ciscomani (R-AZ) and two of his House colleagues say there is no better place for this U.S. Space Force mission than Fort Huachuca.

    The lawmakers are urging the Department of the Air Force to select Fort Huachuca in Cochise County, Arizona, as the site of a new U.S. Space Force mission aimed at enhancing space domain awareness and early threat detection.

    Ciscomani is joined on the letter by Rep. Andy Biggs (AZ-05) and Rep. Abe Hamadeh (AZ-08).

    “Fort Huachuca provides a strategically sound, operationally ready, and cost-effective location for this critical Space Force capability,” they wrote in the letter. “Unlike other locations, the Fort already has the supporting infrastructure, quality of life, with the opportunity for joint operations. We respectfully urge your full consideration as the Department moves forward with its basing process.”

    Community leaders echoed Ciscomani’s call for a new Space Force mission.

    “Bringing a new U.S. Space Force mission to Fort Huachuca would be a game-changer for Sierra Vista and our surrounding region. This mission would not only strengthen our national defense posture but also create high-quality jobs, attract new talent, and reinforce our city’s long-standing partnership with the Department of Defense. I appreciate Congressman Ciscomani’s advocacy and leadership in championing Fort Huachuca as the right place for this important investment for our future.”

    — Clea McCaa, Mayor of Sierra Vista 

    Congressman Ciscomani’s leadership in advocating for Fort Huachuca as a site for a new U.S. Space Force mission reflects a clear understanding of Arizona’s strategic value to our nation’s defense. Fort Huachuca’s unique capabilities, geographic advantages, and history of supporting joint operations make it an ideal choice. The University of Arizona has long collaborated with Fort Huachuca and is recognized nationally for its expertise in space science and astronomy, optics, and space domain awareness. Together with the unique advantages Southern Arizona offers for innovation in astronomy and space science, this initiative aligns directly with our research strengths and our commitment to advancing U.S. leadership in space security.”

    —  Dr. Tomás Díaz de la Rubia, Senior Vice President of Research and Innovation at The University of Arizona 

     

    View full letter here.

     

    On July 15, 2025, Ciscomani announced his strong support for Fort Huachuca’s selection as the U.S. Department of the Air Force considers basing a new space mission at one of four installations nationwide.

    MIL OSI USA News –

    August 5, 2025
  • MIL-OSI Russia: Chinese Embassy in Kyrgyzstan Holds Reception to Mark 98th Anniversary of Founding of PLA

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BISHKEK, July 31 /Xinhua/ — The Chinese Embassy in Kyrgyzstan held a reception in Bishkek on July 29 to mark the 98th anniversary of the founding of the People’s Liberation Army (PLA).

    More than 400 people took part in the ceremonial event, including embassy diplomats, representatives of military and political circles of Kyrgyzstan, diplomatic missions of various countries, the Chinese diaspora and enterprises with Chinese capital.

    As Liu Weidong, Defense Attaché at the PRC Embassy in Kyrgyzstan, noted in his speech, in recent years, the PLA’s reforms in the defense and military spheres have been continuously deepening, the level of modernization and combat capabilities of the Chinese army have been steadily growing. According to him, under the strategic leadership of the heads of the two states, Chinese-Kyrgyz relations are experiencing the best period in their history, and the ties between the armies of the two countries are continuously developing in a healthy way.

    Liu Weidong stressed that the Chinese side is willing to strengthen exchanges and cooperation with the Kyrgyz side to jointly maintain peace and stability in the region and the world.

    In turn, Kyrgyz Defense Minister Ruslan Mukambetov congratulated the Chinese side on the upcoming holiday. He noted that the military personnel of the two countries maintain long-standing and strong ties that continue to expand and deepen both bilaterally and within the Shanghai Cooperation Organization, based on the principles of mutual trust and equality.

    The reception was held in a friendly and warm atmosphere. The participants of the event expressed their sincere wish that relations between the armies of China and Kyrgyzstan would rise to a new level. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    August 5, 2025
  • MIL-OSI Europe: Written question – German budget deficit – E-002965/2025

    Source: European Parliament

    Question for written answer  E-002965/2025
    to the Commission
    Rule 144
    Moritz Körner (Renew)

    Germany recently reformed its national debt brake. The reform comprises three key elements. The federal states will have their own net borrowing capacity of 0.35 % of GDP per year. The Federal Government adopted a new special investment fund for infrastructure and climate protection worth EUR 500 billion, in addition to the existing special defence fund of EUR 100 billion. Defence and security expenditure will in future be explicitly exempted from the debt brake. According to the Federal Ministry of Defence, the following defence budgets are planned for the coming years:

    2025: EUR 62.43 billion

    2026: EUR 82.69 billion

    2027: EUR 93.35 billion

    2028: EUR 136.48 billion

    2029: EUR 152.83 billion

    • 1.What annual government deficits does the Commission expect for Germany from 2025 to 2029, as a percentage of GDP and in absolute terms?
    • 2.How high can Germany’s annual deficit be between 2025 and 2029 if it applies the national escape clause in full?
    • 3.In such a case, what would the maximum annual expenditure volume available to Germany be without infringing the rules of the Stability and Growth Pact?

    Submitted: 17.7.2025

    Last updated: 31 July 2025

    MIL OSI Europe News –

    August 5, 2025
←Previous Page
1 2 3 4 … 420
Next Page→
NewzIntel.com

NewzIntel.com

MIL Open Source Intelligence

  • Blog
  • About
  • FAQs
  • Authors
  • Events
  • Shop
  • Patterns
  • Themes

Twenty Twenty-Five

Designed with WordPress