Category: Military Intelligence

  • MIL-OSI Canada: HMCS Ottawa departs for the Indo-Pacific region on Operations HORIZON and NEON

    Source: Government of Canada News

    News release

    October 16, 2024 – Esquimalt, B.C. – National Defence / Canadian Armed Forces

    Today, the crew of His Majesty’s Canadian Ship (HMCS) Ottawa bid farewell to their families and loved ones at a departure ceremony held at His Majesty’s Canadian Dockyard Esquimalt, British Columbia.

    HMCS Ottawa will sail across the Pacific Ocean while deployed on Operations HORIZON and NEON. Operation HORIZON is Canada’s forward-presence mission to the Indo-Pacific region to promote peace, stability, and the rules-based international order. Operation NEON is Canada’s contribution to a coordinated multinational effort to support the implementation of United Nations sanctions imposed against North Korea.

    During this deployment HMCS Ottawa will maintain Canada’s naval presence in the Indo-Pacific, demonstrating the nation’s contribution to regional peace and stability, and commitment to international security. The crew of HMCS Ottawa will showcase the Royal Canadian Navy’s (RCN) operational capabilities while working alongside international allies and partner navies during military training exercises; highlighting Canada’s commitment to international collaboration and fostering military and diplomatic partnerships.

    Quotes

    “The departure of His Majesty’s Canadian Ship (HMCS) Ottawa, the second ship from the West Coast to deploy on Operation HORIZON this year, represents the culmination of thousands of hours of collective effort and dedication from the ship’s company and supporting staff ashore. This deployment to the Indo-Pacific region will see the ship and its crew sail with our allies and partners in the region and take on critical tasks and missions. I know that they are up to the challenge. Fair winds and following seas to HMCS Ottawa, I wish you all a safe and successful mission.”

    Rear-Admiral Christopher Robinson, Commander Maritime Forces Pacific

    “For those serving onboard, today’s departure is months in the making. Ottawa’s crew has worked hard to get our ship ready for Operations HORIZON and NEON where we will represent Canada and the Royal Canadian Navy well throughout our mission across the Indo-Pacific. This deployment would not be possible without the incredible support of our families, who serve with us, and without them we would not have been able to get to this moment.”

    Commander Adriano Lozer, Commanding Officer HMCS Ottawa

    Quick facts

    • As part of the Indo-Pacific Strategy, the RCN is committed to working alongside regional allies and partners to promote a stable, secure, and prosperous Indo-Pacific.

    • The series of UN sanctions, adopted between 2006 and 2017, aim to pressure North Korea to abandon its weapons of mass destruction programs and respond to North Korean nuclear weapon tests and ballistic missile launches.

    • HMCS Ottawa, a Halifax-class Canadian Patrol Frigate, has a crew of approximately 240 members comprised of RCN sailors and Royal Canadian Air Force aviators.

    • One CH-148 Cyclone helicopter detachment is embarked onboard HMCS Ottawa. This helicopter detachment specializes in anti-submarine warfare, maritime surveillance, and search and rescue operations.

    Associated links

    Contacts

    Maritime Forces Pacific Public Affairs
    Phone: 250-363-5789 or 250-888-6775
    Email: ESQPACIFICNAVYPUBLICAFFAIRS@forces.gc.ca

    MIL OSI Canada News

  • MIL-OSI Security: Defense News: Readout of Navy Leadership’s Meeting with the Governor of Guam (Oct. 16, 2024)

    Source: United States Navy

    Mancinelli and the Governor talked about the importance of the Indo-Pacific region and reaffirmed their commitment to working together on shared goals.

    The Navy Under Secretary thanked the Governor for her strong and consistent support of the U.S. military presence on Guam.

    Governor Guerrero spoke about the need for increased federal investment on Guam, and her desire for additional support on infrastructure, healthcare, and Typhoon Mawar recovery efforts.

    Mancinelli emphasized the importance of continued dialogue with Guam’s local stakeholders and other government agencies. He also discussed the ways in which the Department of Defense will continue to work together with the Governor’s office to understand how the military build-up on Guam can be done in partnership with the on-island community.

    This was the first in-person meeting with the Governor since Mancinelli assumed the position of Acting Under Secretary of the Navy, August 20.

    As the Department of Defense’s Senior Defense Official for Guam, Acting Under Secretary Mancinelli looks forward to working with the Governor of Guam to secure the U.S. homeland, improve the resiliency of Guam, and maintain a free and open Indo-Pacific.

    MIL Security OSI

  • MIL-OSI USA: Kaine, Colleagues Push for DOD to Provide Increased Transparency for Children’s Hospitals Serving Defense Communities

    US Senate News:

    Source: United States Senator for Virginia Tim Kaine
    WASHINGTON, D.C. – U.S. Senator Tim Kaine (D-VA), a member of the Senate Armed Services Committee, joined 19 of his Senate and House colleagues in sending a letter to Secretary of Defense Lloyd Austin urging the Defense Health Agency (DHA) to provide clarity on the implementation of a change in reimbursements for children’s hospitals that provide care to military families covered by TRICARE, the government health care program for active duty servicemembers and their families.
    “We write to express our deep concerns about a 2023 Defense Health Agency (DHA) rule that catalyzed a major shift in the TRICARE reimbursement methodology for children’s hospitals,” wrote the lawmakers. “Children’s hospitals situated in defense communities in our home states are now grappling with the impacts of this change as well as the ripple effects that the ensuing financial challenges may have on the provision of care for military families. For states with large military populations and no specialty children’s hospital, any reduction in access to care would further complicate military families’ choices by increasing burdens placed on families who already have to travel outside of their own state for medical services.”
    DHA previously exempted children’s hospitals from the Medicare outpatient reimbursement model because the reimbursement rate did not adequately reflect the specialized care provided at children’s hospitals. Over 2.4 million children obtain care from children’s hospitals through TRICARE each year, and the change has created some challenges for children’s hospitals in major defense communities like Virginia. Children’s hospitals that serve many servicemembers’ children, such as The Children’s Hospital of the King’s Daughters in Norfolk, are seeking increased transparency on how these changes will be implemented. This clarity is crucial to ensuring the continuity of services and care that military families need.
    The Children’s Hospital Association (CHA) sent letters to the Department of Defense in 2020 and 2023 expressing their concerns about the proposed rule. In their letter, the lawmakers specifically asked the following questions:
    What dialogue has DHA had with the affected children’s hospitals to understand how this new reimbursement methodology impacts operations and access to care?
    What data and sources informed the agency’s analysis of the impact on children’s hospitals that care for TRICARE patients?
    How did the agency account for the financial impacts of military families traveling for care in circumstances where local services are no longer available?
    How did the agency develop the contingency payment and why did the DHA set a lower contingency payment for pediatrics?
    Can the agency verify the number of children’s hospitals that are expected to qualify for the contingency payment that is outlined in the rule?
    The full text of the letter is available here.

    MIL OSI USA News

  • MIL-OSI Asia-Pac: India Commits to Ethical AI with New EoI initiative

    Source: Government of India (2)

    India Commits to Ethical AI with New EoI initiative

    Empowering Society Through AI: IndiaAI mission selects 8 projects to enhance ethical AI development across diverse themes

    Top Indian institutions to make AI wise through bias mitigation, Machine Unlearning & making AI Ethical & ensure privacy

    Posted On: 16 OCT 2024 8:14PM by PIB Delhi

    The IndiaAI Mission has selected eight Responsible AI Projects against the Expression of Interest (EoI) floated under the Safe and Trusted AI Pillar of the IndiaAI Mission. Recognizing the need for adequate guardrails to advance the responsible development, deployment, and adoption of AI, the selected Responsible AI projects include the development of indigenous tools and frameworks, and establishing guidelines for ethical, transparent, and trustworthy AI technologies.

    Promoting responsible AI through 8 strategic projects

    As AI continues to permeate various sectors of society, India is committed to invest in agile mechanisms for developing indigenous governance tools, frameworks, and guidelines that are based on Indian datasets and reflect its unique challenges, opportunities, and datasets. To support this vision, IndiaAI has issued an Expression of Interest (EoI) to promote responsible AI projects across a range of critical themes. These include Machine Unlearning, Synthetic Data Generation, AI Bias Mitigation, Ethical AI Frameworks, Privacy-Enhancing Tools, Explainable AI, AI Governance Testing, and Algorithm Auditing Tools.

    More than 2000 proposals were received from reputed Academic Institutions, Start-ups, Research Organisations & Civil Society. A multi-stakeholder committee was created to provide technical expertise for the evaluation of the proposals, resulting in the selection of 8 projects across various themes.

    The details of the Selected Projects are given below:-
     

     

    S.No.

     

    Name of the Theme

     

    Name of the Selected Project

     

     

    Title of the Project

    1.  

    Machine Unlearning

    Indian Institute of Technology, Jodhpur

    Machine Unlearning in Generative Foundation Models

    1.  

    Synthetic Data Generation

    Indian Institute of Technology, Roorkee

    Design and Development of Method for Generating Synthetic Data for Mitigating Bias in Datasets; and Framework for Mitigating Bias in Machine Learning Pipeline for Responsible AI

    1.  

    AI Bias Mitigation Strategy

    National Institute of Technology Raipur

    Development of Responsible Artificial Intelligence for Bias Mitigation in Health Care Systems

    1.  

    Explainable AI Framework

    Defence Institute of Advanced Technology (DIAT), Pune in partnership with Mindgraph Technology Pvt. Ltd.

    Enabling Explainable and Privacy Preserving AI for Security

    1.  

    Privacy Enhancing Strategy

    Indian Institute of Technology, Delhi in partnership with Indian Institute of Technology, Dharwad, Indraprastha Institute of Information Technology, Delhi and Telecommunication Engineering Center (TEC)

    Robust Privacy-Preserving Machine Learning Models

    1.  

    AI Ethical Certification Framework

    Indraprastha Institute of Information Technology, Delhi in partnership with Telecommunication Engineering Center (TEC)

    Nishpaksh: Tools for assessing fairness of AI model

    1.  

    AI Algorithm Auditing Tool

    Civic Data Labs

    ParakhAI – An open-source framework and toolkit for Participatory Algorithmic Auditing

    1.  

    AI Governance Testing Framework

    Amrita Vishwa Vidyapeetham in partnership with Telecommunication Engineering Center (TEC)

    Track-LLM, Transparency, Risk Assessment, Context & Knowledge for Large Language Models

    Advancing India’s leadership in AI through the IndiaAI Mission

    This initiative aligns with the Government of India’s vision of leveraging AI for inclusive growth. IndiaAI, an IBD (Independent Business Division) under the Digital India Corporation (DIC) of the Ministry of Electronics and IT (MeitY), is the implementation agency of the IndiaAI Mission, which aims to democratize AI’s benefits across all strata of society, bolster India’s global leadership in AI, foster technological self-reliance, and ensure ethical and responsible use of AI.

    *******

    Dharmendra Tewari/Kshitij Singha

    (Release ID: 2065579) Visitor Counter : 40

    MIL OSI Asia Pacific News

  • MIL-OSI Security: Raytheon Company to Pay Over $950M in Connection with Defective Pricing, Foreign Bribery, and Export Control Schemes

    Source: United States Department of Justice

    Raytheon Company (Raytheon) — a subsidiary of Arlington, Virginia-based defense contractor RTX (formerly known as Raytheon Technologies Corporation) — will pay over $950 million to resolve the Justice Department’s investigations into: (i) a major government fraud scheme involving defective pricing on certain government contracts and (ii) violations of the Foreign Corrupt Practices Act (FCPA) and the Arms Export Control Act (AECA) and its implementing regulations, the International Traffic in Arms Regulations (ITAR).

    Raytheon will enter into a three-year deferred prosecution agreement (DPA) in connection with a criminal information filed today in the District of Massachusetts charging Raytheon with two counts of major fraud against the United States. As part of that resolution, Raytheon admitted to engaging in two separate schemes to defraud the Department of Defense (DOD) in connection with the provision of defense articles and services, including PATRIOT missile systems and a radar system.

    Separately, Raytheon entered into a three-year DPA in connection with a criminal information unsealed today in the Eastern District of New York charging Raytheon with two counts: conspiracy to violate the anti-bribery provision of the FCPA for a scheme to bribe a government official in Qatar and conspiracy to violate the AECA for willfully failing to disclose the bribes in export licensing applications with the Department of State as required by part 130 of ITAR.

    Both agreements require that Raytheon retain an independent compliance monitor for three years, enhance its internal compliance program, report evidence of additional misconduct to the Justice Department, and cooperate in any ongoing or future criminal investigations.

    Raytheon also reached a separate False Claims Act settlement with the department relating to the defective pricing schemes. The Justice Department’s FCPA and ITAR resolution is coordinated with the Securities and Exchange Commission (SEC).

    In addition, the Justice Department’s resolutions ensure that the appropriate federal agencies can proceed with determining whether Raytheon or any other individuals or entities associated with the company should be suspended or debarred as federal contractors. Pursuant to the Federal Acquisition Regulations (FAR), when more than one agency has an interest in an entity’s potential suspension or debarment, the FAR requires that the Interagency Suspension and Debarment Committee (ISDC) identify the lead agency for conducting governmentwide suspension or debarment proceedings. In connection with this resolution, the Justice Department has referred Raytheon’s factual admissions to the appropriate officials within the DOD to initiate the process with the ISDC to identify which federal agency will take the lead in such administrative proceedings, which occur independently of the Justice Department’s criminal and civil resolutions.

    “Raytheon engaged in criminal schemes to defraud the U.S. government in connection with contracts for critical military systems and to win business through bribery in Qatar,” said Deputy Assistant Attorney General Kevin Driscoll of the Justice Department’s Criminal Division. “Such corrupt and fraudulent conduct, especially by a publicly traded U.S. defense contractor, erodes public trust and harms the DOD, businesses that play by the rules, and American taxpayers. Today’s resolutions, with criminal and civil recoveries totaling nearly $1 billion, reflect the Criminal Division’s ability to tackle the most significant and complex white-collar cases across multiple subject matters.”

    “Government contractors have an obligation to be fully transparent about their cost and pricing data when they seek an award of a sole source contract,” said Principal Deputy Assistant Attorney General Brian M. Boynton, head of the Justice Department’s Civil Division. “The department is committed to holding accountable those contractors that knowingly misrepresent their cost and pricing data or otherwise violate their legal obligations when negotiating or performing contracts with the United States.”

    “International corruption in military and defense sales is a violation of our national security laws as well as an anti-bribery offense,” said Assistant Attorney General Matthew G. Olsen of the Justice Department’s National Security Division. “Raytheon willfully failed to disclose bribes made in connection with contracts that required export licenses. Today’s resolution should serve as a stark warning to companies that violate the law when selling sensitive military technology overseas.”

    “Over the course of several years, Raytheon employees bribed a high-level Qatari military official to obtain lucrative defense contracts and concealed the bribe payments by falsifying documents to the government, in violation of laws including those designed to protect our national security,” said U.S. Attorney Breon Peace for the Eastern District of New York. “We will continue to pursue justice against corruption, and as this agreement establishes, enforce meaningful consequences, reforms and monitorship to ensure this misconduct is not repeated.”

    “Through deliberate and deceptive actions, Raytheon not only defrauded the U.S. government — it compromised the integrity of our defense procurement process,” said Acting U.S. Attorney Joshua S. Levy for the District of Massachusetts. “Our office is committed to holding accountable those who prioritize profits over national security and clear legal obligations. This case underscores our unwavering commitment to pursuing justice, particularly when taxpayer dollars and DOD operations are at stake. We will continue to work tirelessly with our law enforcement partners to ensure that this type of misconduct is fully exposed and addressed with serious consequences.”

    “Investigating procurement fraud impacting DOD contracts is a top priority for the Defense Criminal Investigative Service (DCIS), the law enforcement arm of the DOD Office of Inspector General,” said Inspector General Robert Storch of DOD. “When DOD contractors fail to provide truthful pricing data and overcharge the government, they undermine the integrity of the DOD procurement process and harm critical DOD programs. The DCIS will continue to work with its law enforcement partners and the Justice Department to ensure DOD contractors that engage in defective pricing schemes are held accountable for their actions. The Defense Contract Audit Agency’s (DCAA’s) Operations Investigative Support Division provided valuable expertise during this investigation.”

    “The Raytheon Company set out to intentionally defraud the U.S. government,” said Assistant Director Chad Yarbrough of the FBI Criminal Investigative Division (CID). “This agreement highlights the importance of integrity when it comes to government contracting. The FBI, with its law enforcement partners, will continue to investigate these types of crimes that waste taxpayer dollars and prosecute all those who are intent on cooking up these major fraud schemes.”

    “Raytheon Corporation engaged in a systematic and deliberate conspiracy that knowingly and willfully violated U.S. fraud and export laws,” said Special Agent in Charge William S. Walker of Homeland Security Investigations (HSI) New York. “Raytheon’s bribery of government officials, specifically those involved in the procurement of U.S. military technology, posed a national security threat to both the United States and its allies. As this investigation reflects, national security continues to be a top priority for HSI New York. The global threats facing the United States have never been greater, and HSI New York is committed to working with our federal and international partners to ensure that sensitive U.S. technologies are not unlawfully and fraudulently acquired.”

    The Defective Pricing Case

    The Criminal Resolution

    According to admissions and court documents filed in the District of Massachusetts, from 2012 through 2013 and again from 2017 through 2018, Raytheon employees provided false and fraudulent information to the DOD during contract negotiations concerning two contracts with the United States for the benefit of a foreign partner — one to purchase PATRIOT missile systems and the other to operate and maintain a radar system. In both instances, Raytheon employees provided false and fraudulent information to DOD in order to mislead DOD into awarding the two contracts at inflated prices. These schemes to defraud caused the DOD to pay Raytheon over $111 million more than Raytheon should have been paid on the contracts.

    Under the terms of the DPA, Raytheon will pay a criminal monetary penalty of $146,787,972, pay $111,203,009 in victim compensation, and retain an independent compliance monitor for three years. The Justice Department has agreed to credit the victim compensation amount against restitution Raytheon pays to the Civil Division in its related, parallel False Claims Act proceeding.

    Pursuant to the DPA, in addition to the independent compliance monitor, Raytheon and RTX have agreed to continue to implement a compliance and ethics program at Raytheon designed to prevent and detect fraudulent conduct throughout its operations. Raytheon and RTX have also agreed to continue to cooperate with the Criminal Division’s Fraud Section and the U.S. Attorney’s Office for the District of Massachusetts in any ongoing or future criminal investigations.

    The Justice Department reached this resolution with Raytheon based on a number of factors, including, among others, the nature and seriousness of the offense conduct, which involved two separate schemes to defraud the U.S. government. Raytheon received credit for its affirmative acceptance of responsibility and cooperation with the department’s investigation, which included (i) facilitating interviews with current and former employees; (ii) providing information obtained through its internal investigation, which allowed the department to preserve and obtain evidence as part of its own independent investigation; (iii) making detailed presentations to the department; (iv) proactively identifying key documents in the voluminous materials collected and produced; (v) engaging experts to conduct financial analyses; and (vi) demonstrating its willingness to disclose all relevant facts by analyzing whether the crime-fraud exception applied to certain potentially privileged documents and releasing the documents that it deemed fell within the exception. However, in the initial phases of the investigation prior to March 2022, Raytheon’s cooperation was limited by unreasonably slow document productions.

    Raytheon also engaged in timely remedial measures, including (i) terminating certain employees who were responsible for the misconduct; (ii) establishing a broad defective pricing awareness campaign; (iii) developing and implementing policies, procedures, and controls relating to defective pricing compliance; and (iv) engaging additional resources with appropriate expertise to evaluate and test the new policies, procedures, and controls relating to defective pricing compliance.

    In light of these considerations, as well as Raytheon’s prior history, the criminal penalty calculated under the U.S. Sentencing Guidelines reflects a 25% reduction off the 10th percentile above the low end of the otherwise applicable guidelines fine range.

    The False Claims Act Settlement

    Raytheon also entered into a civil False Claims Act settlement to resolve allegations that it provided untruthful certified cost or pricing data when negotiating prices with the DOD for numerous government contracts and double billed on a weapons maintenance contract.

    Under the False Claims Act settlement, which is the second largest government procurement fraud recovery under the Act, Raytheon will pay $428 million for knowingly failing to provide truthful certified cost and pricing data during negotiations on numerous government contracts between 2009 and 2020, in violation of the Truth in Negotiations Act (TINA). Congress enacted TINA in 1962 to help level the playing field in sole source contracts — where there is no price competition — by making sure that government negotiators have access to the cost or pricing data that the offeror used when developing its proposal. As part of the settlement, Raytheon admitted that it failed to disclose cost or pricing data, as required by TINA, regarding its labor and material costs to supply weapon systems to DOD. 

     
    Raytheon also admitted that by misrepresenting its costs during contract negotiations it overcharged the United States on these contracts and received profits in excess of the negotiated profit rates. Further, Raytheon admitted that it failed to disclose truthful cost or pricing data on a contract to staff a radar station. Raytheon also admitted that it billed the same costs twice on a DOD contract.

    As part of the civil resolution, Raytheon received credit under the Justice Department’s guidelines for taking disclosure, cooperation, and remediation into account in False Claims Act cases for cooperation provided by RTX. That cooperation included conducting and disclosing the results of an internal investigation, disclosing relevant facts and material not known to the government but relevant to its investigation, providing the department with inculpatory evidence, conducting a damages analysis, identifying and separating individuals responsible for or involved in the misconduct, admitting liability and accepting responsibility for the misconduct, and improving its compliance programs.

    “The Defense Department greatly appreciates the Justice Department’s outstanding efforts culminating in this significant recovery,” said Principal Director of Defense Pricing, Contracting, and Acquisition Policy John Tenaglia of DOD. “The price we pay for equipment and services absolutely matters. The more we pay, the less combat capability we can deliver for our nation’s warfighters. This Justice Department recovery both restores funding that will be used to acquire more capability while also serving as a strong deterrent to all companies that might seek to deny DOD contracting officers the factual information they require to negotiate contracts at fair and reasonable prices.”

    The civil settlement includes the resolution of a lawsuit filed under the qui tam or whistleblower provision of the False Claims Act, which permits private parties to file suit on behalf of the United States for false claims and share in a portion of the government’s recovery. The qui tam lawsuit was filed by Karen Atesoglu, a former Raytheon employee, and is captioned United States ex rel. Atesoglu v. Raytheon Technologies Corporation, 21-CV-10690-PBS (D. Mass.). Ms. Atesoglu will receive $4.2 million as her share of the settlement.

    The FCPA Case

    According to admissions and court documents filed in the Eastern District of New York, between approximately 2012 and 2016, Raytheon, through certain of its employees and agents, engaged in a scheme to bribe a high-level official at the Qatar Emiri Air Force (QEAF), a branch of Qatar’s Armed Forces (QAF) that was primarily responsible for the conduct of air warfare, in order to assist Raytheon in obtaining and retaining business from the QEAF and QAF. Raytheon entered into and made payments on sham subcontracts for air defense operations-related studies in order to corruptly obtain the QEAF official’s assistance in securing certain air defense contracts. Raytheon also entered into a teaming agreement with a Qatari entity in order to corruptly obtain the QEAF official’s assistance in directly awarding a potential contract to Raytheon to build a joint operations center that would interface with Qatar’s several military branches.

    Under the terms of the DPA, Raytheon will pay a criminal monetary penalty of $230.4 million, pay forfeiture of $36,696,068, and retain an independent compliance monitor for three years. In addition, as part of the resolution of the SEC’s parallel investigation, Raytheon will pay approximately $49.1 million in disgorgement and prejudgment interest and a civil penalty of $75 million ($22.5 million of which will be credited against the criminal monetary penalty). The Justice Department has agreed to credit approximately $7.4 million of the disgorgement Raytheon pays to the SEC against the criminal forfeiture.

    As part of the DPA, Raytheon and RTX have agreed to continue to cooperate with the Criminal Division’s Fraud Section, the National Security Division’s Counterintelligence and Export Control Section, and the U.S. Attorney’s Office for the Eastern District of New York in any ongoing or future criminal investigations. In addition to the independent compliance monitor, Raytheon and RTX have agreed to continue to enhance Raytheon’s compliance program.

    The Justice Department reached this resolution with Raytheon based on a number of factors, including, among others, the nature and seriousness of the offense. Raytheon received credit for its affirmative acceptance of responsibility and cooperation with the department’s investigation, which included (i) providing information obtained through its internal investigation, which allowed the government to preserve and obtain evidence as part of its own independent investigation; (ii) facilitating interviews with current and former employees; (iii) making detailed factual presentations to the government; (iv) proactively disclosing certain evidence of which the government was previously unaware and identifying key documents in materials it produced; and (v) engaging experts to conduct financial analyses. However, in the initial phases of the investigation, prior to in or around 2022, Raytheon was at times slow to respond to the government’s requests and failed to provide relevant information in its possession.

    Raytheon also engaged in timely remedial measures, including (i) recalibrating third party review and approval processes to lower company risk tolerance; (ii) implementing enhanced controls over sales intermediary payments; (iii) hiring empowered subject matter experts to oversee its anti-corruption compliance program and third party management; (iv) implementing data analytics to improve third party monitoring; and (v) developing a multipronged communications strategy to enhance ethics and compliance training and communications.

    In light of these considerations, as well as Raytheon’s prior history, the criminal penalty calculated under the U.S. Sentencing Guidelines reflects a 20% reduction off the 20th percentile above the low end of the otherwise applicable guidelines fine range.

    The ITAR Case

    According to admissions and court documents filed in the Eastern District of New York, between approximately 2012 and 2016, Raytheon, through certain of its employees and agents, engaged in a scheme to willfully violate the AECA and ITAR Part 130 by failing to disclose to the State Department, Directorate of Defense Trade Controls, fees and commissions paid in connection with two Qatar-related contracts — specifically, the bribes Raytheon paid to the high-level QEAF official through sham subcontracts.

    The Justice Department reached this resolution with Raytheon based on a number of factors, including, among others, the nature and seriousness of the offense. Raytheon received credit for its cooperation with the department’s investigation, which included (i) gathering evidence of interest to the government and proactively identifying key documents related to willful ITAR-related misconduct; (ii) making factual presentations concerning the ITAR-related misconduct; and (iii) facilitating witness interviews and expediting the government’s ability to meet with witnesses. Raytheon did not receive full credit for its cooperation because in the initial phase of the investigation, before the National Security Division joined the investigation, it failed to provide information relevant to the ITAR violations beyond what was requested in the FCPA investigation.

    Raytheon also received credit for remediation, which included, in addition to the remediation described above in connection with the FCPA case, (i) hiring additional empowered subject matter experts in legal and compliance; (ii) developing a multipronged communications strategy to enhance ethics and compliance training and communications; and (iii) making enhancements to its ITAR-related compliance program.

    In light of these considerations, the ITAR-related financial penalty of $21,904,850 includes a cooperation and remediation credit of 20% off the otherwise applicable penalty.

    ******

    DCIS, Army Criminal Investigation Division, FBI, and Air Force Office of Special Investigations are investigating the criminal defective pricing case. Senior Auditor Glen Hughes from DCAA’s Office of Investigative Support Division assisted in the civil investigation of the False Claims Act Matter. HSI and the FBI’s International Corruption Unit are investigating the FCPA and ITAR case. The Justice Department’s Office of International Affairs assisted in the investigation for the FCPA and ITAR case.

    Assistant Chief Kyle Hankey, Acting Assistant Chief Laura Connelly, and Trial Attorney Tamara Livshiz of the Criminal Division’s Fraud Section and Assistant U.S. Attorneys Brian LaMacchia and Benjamin Saltzman for the District of Massachusetts are prosecuting the criminal defective pricing case.

    Attorneys Art J. Coulter, Patrick Klein, and Jared S. Wiesner of the Civil Division’s Commercial Litigation Branch, Fraud Section, and Assistant U.S. Attorney Brian LaMacchia for the District of Massachusetts are prosecuting the False Claims Act matter.

    Acting Assistant Chief Katherine Raut and Trial Attorney Elina A. Rubin-Smith of the Criminal Division’s Fraud Section, Trial Attorneys Christine Bonomo and Leslie Esbrook of the National Security Division’s Counterintelligence and Export Control Section, and Assistant U.S. Attorneys David Pitluck, Hiral Mehta, and Jessica Weigel for the Eastern District of New York are prosecuting the FCPA and ITAR case.

    The Justice Department also expresses its appreciation for the assistance provided by the State Department and the legal offices of the Army, Air Force, Defense Logistics Agency, Defense Contract Management Agency, and Department of Navy.

    The Criminal Division’s Fraud Section is responsible for investigating and prosecuting FCPA and Foreign Extortion Prevention Act matters. Additional information about the Justice Department’s FCPA enforcement efforts can be found at http://www.justice.gov/criminal-fraud/foreign-corrupt-practices-act.

    MIL Security OSI

  • MIL-OSI Asia-Pac: NITI Aayog to launch the International Methanol Seminar and Expo: Paving the Way for a Sustainable Energy Future

    Source: Government of India (2)

    Posted On: 16 OCT 2024 5:19PM by PIB Delhi

    NITI Aayog is set to host the Second International Methanol Seminar and Expo 2024, a two-day event on the 17th – 18th October 2024 at the Manekshaw Centre, New Delhi. This is the second major seminar in the Methanol Economy Programme by the NITI Aayog. Methanol Economy in India was started in September 2016 when NITI Aayog, in collaboration with Methanol Institute, USA, organized the first seminar. After 8 years, NITI Aayog is organizing the Seminar and Expo to highlight all the progress of projects, products and R&D initiatives related to Methanol production, application, and allied technological developments in the world.

    The seminar will be a comprehensive platform for discussions on the methanol economy, bringing together global experts, industry leaders, policymakers, and researchers. The key focus of the Seminar would be to highlight the role of Methanol in the world energy transition and the rise of Methanol as a low-carbon fuel in green shipping. NITI Aayog is partnering with Methanol Institute, USA, as the Knowledge Partner. Government of India through various Departments supported various R&D projects in Indian high ash coal to methanol, DME production, conversion of diesel engines to operate on 100% Methanol and Methanol blends in Diesel (MD15) and Methanol blended petrol. The government is also promoting work in methanol cooking and process heating applications.

    This event is not just limited to discussions; an exciting Methanol Expo will also run alongside the seminar, showcasing cutting-edge technologies and innovations in methanol production, storage, and utilization. Participants will have the opportunity to engage with leading global companies and organizations, explore the latest advancements, and witness first-hand how methanol is set to revolutionize industries like transportation, shipping, power generation, and more.

    Key Indian Industries like Kirloskar, Ashok Leyland, Volvo Penta, FCTecNrgy, Wesman Thermal process, METFUEL, Thermax, BHEL, NTPC and Defence labs like NMRL have developed 100% Methanol buses, trucks, LCVs, gensets, fuel cell and reformed based energy applications, boilers, gas turbines and other cutting-edge applications. The entire array of products and technologies will be on display at the Expo.

    The seminar comes at a critical time as India advances its vision of a methanol economy. Methanol, a versatile fuel that can be produced from a wide range of domestic feedstocks, including biomass, coal, and renewable sources, is positioned to play a crucial role in India’s clean energy transition.

    As India seeks to meet its COP commitments and align with global sustainability goals, the International Methanol Seminar will focus on key themes such as:

    • Methanol as a clean alternative fuel for transportation, shipping, and power generation.
    • Sustainable production and scaling of methanol technologies, emphasizing local production to enhance energy security.
    • Global partnerships and innovation exchanges that foster international collaboration on methanol advancements.

    Speakers from about a dozen countries will be in full participation through both physical and virtual modes.

    The International Methanol Seminar 2024 promises to be a landmark event, offering a platform for groundbreaking discussions and collaborative efforts to propel India and the world toward a sustainable, methanol-powered future.

    For further information please go through this link:

    https://www.niti.gov.in/sites/default/files/2024-10/International%20Methanol%20Seminar.pdf  

     

    ***

    MJPS/SR

    (Release ID: 2065437) Visitor Counter : 28

    MIL OSI Asia Pacific News

  • MIL-OSI Video: Colombia: Progress and Challenges in the Peace Agreement -Security Council Briefing | United Nations

    Source: United Nations (Video News)

    The Head of the United Nations Verification Mission in Colombia (UNVMIC), Carlos Ruiz Massieu, today (15 Oct) told the Security Council that “historic progress has been made” in the implementation of the peace agreement, “but much remains to be done.” He welcomed the rapid response plan, or “Plan de Choque” being developed by the Minister of the Interior and other stakeholders.

    The plan, Ruiz Massieu said, “is a new instrument that should serve to energize implementation.”

    The UNVMIC Chief said, “we remain encouraged by the Government’s commitment to advancing the rural reform chapter of the Agreement – provisions that have a transformative potential, attacking structural causes of the conflict, but which had lagged in their implementation in previous years.”

    He said that as a result, “more land is being distributed and formalized for those in need, bringing the promised benefits of peace to landless peasants and those dispossessed of it during the conflict.”

    Ruiz Massieu said, “in some territories, signatories to the Agreement and social leaders continue to be the target of violence, pressure and threats from armed actors fighting for territorial control and strategic routes linked to illicit economies.”

    He noted that since the beginning of the reintegration process, five former territorial areas for training and reintegration (TATRs) have had to be relocated for these reasons

    Ruiz Massieu said, “the difficult situation in some areas continues to impact the lives of communities that are caught in the crossfire and subjected to condemnable phenomena such as the recruitment of minors, displacement and confinement.”

    Colombia’s Foreign Minister Luis Gilberto Murillo for his part said, “with the firm commitment to fulfil what has been agreed and to territorialize peace, we have developed a new strategic framework for peace, where effective and comprehensive compliance with the 2016 agreement becomes an inescapable requirement, unavoidable for the sustainability of strategic proposals surrounding territorial transformation.”

    On women’s participation in negotiation and peacebuilding, he said it was “not only is a question of justice, but it is crucial to ensure stronger and more durable agreements.”

    For this reason, he continued, “the Colombian government has formulated and is implementing a feminist foreign policy linked to the precepts of the women, peace and security agenda. Included in Security Council Resolution 1325”

    Outside the Council, Switzerland’s representative Riccarda Christiana Chanda read a statement on behalf of Ecuador, France, Guyana, Japan, Malta, the Republic of Korea, Sierra Leone, Slovenia, Switzerland, the United Kingdom, and the United States on Women Peace and Security.

    Chanda said, “during a visit of the Security Council to Colombia in February of this year, we were able to engage meaningfully with former combatants, victim representatives, women’s organizations, indigenous and Afro-Colombian communities to discuss the progress made and remaining obstacles in the comprehensive implementation of the peace agreement. And what we have witnessed over and over again, was the urgent call for improved security guarantees, equitable land distribution, and the successful social, political, and economic reintegration of former combatants as well as the crucial implementation of gender provisions and the ethnic chapter of the Peace Agreement.”

    UNVMIC was established by the UN Security Council pursuant to resolution 2366 (2017), adopted unanimously on 10 July 2017. The resolution followed a joint request for UN support from the Government of Colombia and the then Revolutionary Armed Forces of Colombia–People’s Army (FARC-EP).

    https://www.youtube.com/watch?v=iaI6rgXNDS4

    MIL OSI Video

  • MIL-OSI Economics: Thales demonstrates its capacity to deploy drone swarms with unparalleled levels of autonomy using AI

    Source: Thales Group

    Headline: Thales demonstrates its capacity to deploy drone swarms with unparalleled levels of autonomy using AI

    • On 16 October 2024, in the first flight tests of their kind, Thales demonstrated the potential of deploying swarms of drones with different levels of autonomy. Autonomous functionality optimised by Artificial Intelligence (AI) and intelligent agents reduces the cognitive load on operators yet ensures that they remain in control at all times, particularly during critical mission phases.
    • In this latest step in its Drone Warfare strategy, Thales and its partners are applying the principles of interoperability and integration to improve the coordination of drone swarms for deployment on a wide range of mission types.
    • To meet the requirements of the armed forces, Thales is proposing an innovative AI-based system architecture that provides drone swarms with an unparalleled level of supervised autonomy and enables them to adapt their behaviour to changing operational requirements.

    The operational value of drones on the battlefield is now firmly established, but their effectiveness is still limited by two factors: they usually require one operator per drone, and a secure, resilient datalink must be available throughout the mission. Flight tests organised for the JDEC (1) demonstrations on 16 October 2024 turned the spotlight on the latest breakthroughs by Thales and its partners in their efforts to overcome these limitations and support drone swarm operations tailored to military requirements. In the tests, Thales’s COHESION demonstrator showed how AI and intelligent agents can be used to achieve an unparalleled level of autonomous operation in drone swarm deployments.

    The system architecture of the COHESION demonstrator enables operators to adapt the level of autonomy of their drone swarms to the operational requirements of each phase of the mission. This new possibility offers an unprecedented level of flexibility in contested environments, where electronic warfare measures can saturate communication systems and jam datalinks that rely on GNSS signals. Autonomous operation by single drones and/or entire swarms overcomes the need for a permanent datalink with the control station. The drones are capable of perceiving and analysing their local environment, sharing target information, analysing enemy intent and prioritising missions. They can also utilise collaborative tactics and optimise their trajectories to increase resilience and boost force effectiveness, helping to accelerate the OODA(2) loop and enhance battlefield transparency.

    This innovative approach acts as a force multiplier without increasing the cognitive load on operators, who remain in charge of the most critical decisions. The use of trusted, cybersecure, human-in-the-loop AI guarantees safe human supervision at all times, in line with Thales’s principles of TrUE AI (3).

    “We are proud to be developing innovative solutions aligned with strong ethical values. Our solutions are demonstrable, applicable, incremental and deployable, acting as a force multiplier without increasing the cognitive burden on operators, yet guaranteeing that they retain their central role in the decision-making process.” Hervé Dammann, Executive Vice President, Land and Air Systems, Thales

    Positioned as a systems provider and integrator, Thales has developed its Drone Warfare offering to accelerate interoperability between a wide range of land, airland, air and naval platforms. The Group is also a key player in an ecosystem of French industries and tech companies working to expand the capabilities of front-line drones in the theatre of operations.

    • In June 2023, Thales unveiled OpenDRobotics, a revolutionary AI-based solution that ties together robotics technologies and different types of unmanned air and ground-based assets to build complete human-in-the-loop mission systems.
    • Thales is also an established manufacturer of unmanned air systems: its Spy’Ranger 330 system, for example, has been selected for the French Army’s SMDR (4) programme.
    • Thales’s acquisition of Aeromapper in 2024 has expanded its range of drone products to include the TOUTATIS loitering munition.

    In March 2024, Thales created cortAIx to speed development of trusted AI for critical systems. Among its short-term objectives, cortAIx aims to integrate and industrialise AI development tools to enable the armed forces to optimise analysis of the data generated by sensors and decision support solutions while addressing the specific cybersecurity, embeddability and frugality requirements of systems operating in constrained environments.

    1JDEC: Journée de Démonstrations d’Essaims de Drones de Contact / Front-line drone swarm demonstrations

    2OODA: Observe, Orient, Decide, Act

    3TrUE AI: Transparent, Understandable, Ethical AI

    4SMDR: Système de Mini-Drones de Reconnaissance / mini-drone system for reconnaissance missions

    MIL OSI Economics

  • MIL-OSI Security: USS Russell Returns Home to San Diego

    Source: United States Navy Pacific Fleet 1

    SAN DIEGO –
    The Arleigh Burke-class guided-missile destroyer USS Russell (DDG 59) returned to Naval Base San Diego Oct. 15, following an eight-month deployment with the Theodore Roosevelt Carrier Strike Group (TRCSG) to the U.S. 3rd, 5th, and 7th Fleet areas of operation.

    MIL Security OSI

  • MIL-OSI USA: Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations

    News In Brief – Source: US Computer Emergency Readiness Team

    Summary

    The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the Communications Security Establishment Canada (CSE), the Australian Federal Police (AFP), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) are releasing this joint Cybersecurity Advisory to warn network defenders of Iranian cyber actors’ use of brute force and other techniques to compromise organizations across multiple critical infrastructure sectors, including the healthcare and public health (HPH), government, information technology, engineering, and energy sectors. The actors likely aim to obtain credentials and information describing the victim’s network that can then be sold to enable access to cybercriminals.

    Since October 2023, Iranian actors have used brute force, such as password spraying, and multifactor authentication (MFA) ‘push bombing’ to compromise user accounts and obtain access to organizations. The actors frequently modified MFA registrations, enabling persistent access. The actors performed discovery on the compromised networks to obtain additional credentials and identify other information that could be used to gain additional points of access. The authoring agencies assess the Iranian actors sell this information on cybercriminal forums to actors who may use the information to conduct additional malicious activity.

    This advisory provides the actors’ tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs). The information is derived from FBI engagements with entities impacted by this malicious activity.

    The authoring agencies recommend critical infrastructure organizations follow the guidance provided in the Mitigations section. At a minimum, organizations should ensure all accounts use strong passwords and register a second form of authentication.

    Download the PDF version of this report:

    For a downloadable list of IOCs, see:

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 15. See the MITRE ATT&CK Tactics and Techniques section in Appendix A for a table of the actors’ activity mapped to MITRE ATT&CK tactics and techniques.

    Overview of Activity

    The actors likely conduct reconnaissance operations to gather victim identity [T1589] information. Once obtained, the actors gain persistent access to victim networks frequently via brute force [T1110]. After gaining access, the actors use a variety of techniques to further gather credentials, escalate privileges, and gain information about the entity’s systems and network. The actors also move laterally and download information that could assist other actors with access and exploitation.

    Initial Access and Persistence

    The actors use valid user and group email accounts [T1078], frequently obtained via brute force such as password spraying [T1110.003] although other times via unknown methods, to obtain initial access to Microsoft 365, Azure [T1078.004], and Citrix systems [T1133]. In some cases where push notification-based MFA was enabled, the actors send MFA requests to legitimate users seeking acceptance of the request. This technique—bombarding users with mobile phone push notifications until the user either approves the request by accident or stops the notifications— is known as “MFA fatigue” or “push bombing” [T1621].

    Once the threat actors gain access to an account, they frequently register their devices with MFA to protect their access to the environment via the valid account:

    • In two confirmed compromises, the actors leveraged a compromised user’s open registration for MFA [T1556.006] to register the actor’s own device [T1098.005] to access the environment.
    • In another confirmed compromise, the actors used a self-service password reset (SSPR) tool associated with a public facing Active Directory Federation Service (ADFS) to reset the accounts with expired passwords [T1484.002] and then registered MFA through Okta for compromised accounts without MFA already enabled [T1556] [T1556.006].

    The actors frequently conduct their activity using a virtual private network (VPN) service [T1572]. Several of the IP addresses in the actors’ malicious activity originate from exit nodes tied to the Private Internet Access VPN service.

    Lateral Movement

    The actors use Remote Desktop Protocol (RDP) for lateral movement [T1021.001]. In one instance, the actors used Microsoft Word to open PowerShell to launch the RDP binary mstsc.exe [T1202].

    Credential Access

    The actors likely use open-source tools and methodologies to gather more credentials. The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Kerberos tickets [T1558.003]. In one instance, the actors used the Active Directory (AD) Microsoft Graph Application Program Interface (API) PowerShell application likely to perform a directory dump of all AD accounts. Also, the actors imported the tool [T1105] DomainPasswordSpray.ps1, which is openly available on GitHub [T1588.002], likely to conduct password spraying. The actors also used the command Cmdkey /list, likely to display usernames and credentials [T1555].

    Privilege Escalation

    In one instance, the actors attempted impersonation of the domain controller, likely by exploiting Microsoft’s Netlogon (also known as ”Zerologon”) privilege escalation vulnerability (CVE-2020-1472) [T1068].

    Discovery

    The actors leverage living off the land (LOTL) to gain knowledge about the target systems and internal networks. The actors used the following Windows command-line tools to gather information about domain controllers [T1018], trusted domains [T1482], lists of domain administrators, and enterprise administrators [T1087.002] [T1069.002] [T1069.003]:

    • Nltest /dclist
    • Nltest /domain_trusts
    • Nltest /domain_trusts/all_trusts
    • Net group “Enterprise admins” /domain
    • Net group “Domain admins” /domain

    Next, the actors used the following Lightweight Directory Access Protocol (LDAP) query in PowerShell [T1059.001]to search the AD for computer display names, operating systems, descriptions, and distinguished names [T1082].

                                               $i=0
                                               $D= [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
                                               $L='LDAP://' . $D
                                               $D = [ADSI]$L
                                               $Date = $((Get-Date).AddDays(-90).ToFileTime())
                                               $str = '(&(objectcategory=computer)(operatingSystem=*serv*)(|(lastlogon>='+$Date+')(lastlogontimestamp>='+$Date+')))'
                                               $s = [adsisearcher]$str
                                               $s.searchRoot = $L.$D.distinguishedName
                                               $s.PropertiesToLoad.Add('cn') > $Null
                                               $s.PropertiesToLoad.Add('operatingsystem') > $Null
                                               $s.PropertiesToLoad.Add('description') > $Null
                                               $s.PropertiesToLoad.Add('distinguishedName') > $Null
                                               Foreach ($CA in $s.FindAll()) {
                                                             Write-Host $CA.Properties.Item('cn')
                                                             $CA.Properties.Item('operatingsystem')
                                                             $CA. Properties.Item('description')
                                                             $CA.Properties.Item('distinguishedName')
                                                             $i++
                                               }
                                               Write-host Total servers: $i

    Command and Control

    On one occasion, using msedge.exe, the actors likely made outbound connections to Cobalt Strike Beacon command and control (C2) infrastructure [T1071.001].

    Exfiltration and Collection

    In a couple instances, while logged in to victim accounts, the actors downloaded files related to gaining remote access to the organization and to the organization’s inventory [T1005], likely exfiltrating the files to further persist in the victim network or to sell the information online.

    Detection

    To detect brute force activity, the authoring agencies recommend reviewing authentication logs for system and application login failures of valid accounts and looking for multiple, failed authentication attempts across all accounts.

    To detect the use of compromised credentials in combination with virtual infrastructure, the authoring agencies recommend the following steps:

    • Look for “impossible logins,” such as suspicious logins with changing usernames, user agent strings, and IP address combinations or logins where IP addresses do not align to the user’s expected geographic location.
    • Look for one IP used for multiple accounts, excluding expected logins.
    • Look for “impossible travel.” Impossible travel occurs when a user logs in from multiple IP addresses with significant geographic distance (i.e., a person could not realistically travel between the geographic locations of the two IP addresses during the period between the logins). Note: Implementing this detection opportunity can result in false positives if legitimate users apply VPN solutions before connecting into networks.
    • Look for MFA registrations with MFA in unexpected locales or from unfamiliar devices.
    • Look for processes and program execution command-line arguments that may indicate credential dumping, especially attempts to access or copy the ntds.dit file from a domain controller.
    • Look for suspicious privileged account use after resetting passwords or applying user account mitigations.
    • Look for unusual activity in typically dormant accounts.
    • Look for unusual user agent strings, such as strings not typically associated with normal user activity, which may indicate bot activity.

    Mitigations

    The authoring agencies recommend organizations implement the mitigations below to improve organizations’ cybersecurity posture based on the actors’ TTPs described in this advisory. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA. The CPGs, which are organized to align to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, are a subset of cybersecurity practices, aimed at meaningfully reducing risks to both critical infrastructure operations and the American people. These voluntary CPGs strive to help small- and medium-sized organizations kick-start their cybersecurity efforts by prioritizing investment in a limited number of essential actions with high-impact security outcomes. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.

    • Review IT helpdesk password management related to initial passwords, password resets for user lockouts, and shared accounts. IT helpdesk password procedures may not align to company policy for user verification or password strength, creating a security gap. Avoid common passwords (e.g. “Spring2024” or “Password123!”).
    • Disable user accounts and access to organizational resources for departing staff [CPG 2.D]. Disabling accounts can minimize system exposure, removing options actors can leverage for entry into the system. Similarly, create new user accounts as close as possible to an employee’s start date.
    • Implement phishing-resistant MFA [CPG 2.H]. See CISA’s resources Phishing-Resistant Multifactor Authentication and More than a Password for additional information on strengthening user credentials.
    • Continuously review MFA settings to ensure coverage over all active, internet-facing protocols to ensure no exploitable services are exposed [CPG 2.W].
    • Provide basic cybersecurity training to users [CPG 2.I] covering concepts such as:
      • Detecting unsuccessful login attempts [CPG 2.G].
      • Having users deny MFA requests they have not generated.
      • Ensuring users with MFA-enabled accounts have MFA set up appropriately.
    • Ensure password policies align with the latest NIST Digital Identity Guidelines.
      • Meeting the minimum password strength [CPG 2.B] by creating a password using 8-64 nonstandard characters and long passphrases, when possible.
    • Disable the use of RC4 for Kerberos authentication.

    These mitigations apply to critical infrastructure entities across sectors.

    The authoring agencies also recommend software manufacturers incorporate secure by design principles and tactics into their software development practices to protect their customers against actors using compromised credentials, thereby strengthening the security posture of their customers.  For more information on secure by design, see CISA’s Secure by Design webpage and joint guide.

    Validate Security Controls

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating organization security programs against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 12).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Contact Information

    Organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

    • CISA via CISA’s 24/7 Operations Center [report@cisa.gov or 1-844-Say-CISA (1-844-729-2472)] or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.
    • For NSA cybersecurity guidance inquiries, contact CybersecurityReports@nsa.gov.

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring agencies.

    Intrusion events connected to this Iranian group may also include a different set of cyber actors–likely the third-party actors who purchased access from the Iranian group via cybercriminal forums or other channels. As a result, some TTPs and IOCs noted in this advisory may be tied to these third-party actors, not the Iranian actors. The TTPs and IOCs are in the advisory to provide recipients the most complete picture of malicious activity that may be observed on compromised networks. However, exercise caution if formulating attribution assessments based solely on matching TTPs and IOCs.

    Version History

    October 16, 2024: Initial version.

    Appendix A: MITRE ATT&CK Tactics and Techniques

    See Tables 1–12 for all referenced actors’ tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 1: Reconnaissance
    Technique Title  ID Use
    Gather Victim Identity Information T1589 The actors likely gathered victim information.
    Table 2: Resource Development
    Technique Title  ID Use
    Obtain Capabilities: Tool T1588.002 The actors obtained a password spray tool through an open-source repository.
    Table 3: Initial Access
    Technique Title ID Use
    Valid Accounts T1078 The actors used password spraying to obtain valid user and group email account credentials, allowing them access to the network.
    Valid Accounts: Cloud Accounts T1078.004 The actors used accounts hosted on Microsoft 365, Azure, and Okta cloud environments as additional methods for initial access.
    External Remote Services T1133 The actors exploited Citrix systems’ external-facing remote services as another method for gaining initial access to the system.
    Table 4: Execution
    Technique Title  ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 The actors used PowerShell commands to maintain and expand access.
    Table 5: Persistence
    Technique Title ID Use
    Account Manipulation: Device Registration T1098.005 The actors used PowerShell commands to maintain and expand access.
    Modify Authentication Process T1556 The actors used a public facing Active Directory Federation Service (ADFS) domain to reset the passwords of expired accounts.
    Modify Authentication Process: Multi-Factor Authentication T1556.006 The actors used an MFA bypass method, such as Multi-Factor Authentication Request Generation, providing the ability to modify or completely disable MFA defenses.
    Table 6: Privilege Escalation
    Technique Title ID Use
    Exploitation for Privilege Escalation T1068 The actors attempted impersonation of the domain controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability.
    Domain or Tenant Policy Modification: Trust Modification T1484.002 The actors leveraged a public-facing ADFS password reset tool to reactivate inactive accounts, allowing the actor to authenticate and enroll their devices as any user in the AD managed by the victim tenant.
    Table 7: Defense Evasion
    Technique Title ID Use
    Indirect Command Execution T1202 The actors attempted impersonation of the Domain Controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability.
    Table 8: Credential Access
    Technique Title ID Use
    Brute Force: Password Spraying T1110.003 The actors targeted applications, including Single Sign-on (SSO) Microsoft Office 365, using brute force password sprays and imported the tool DomainPasswordSpray.ps1.
    Credentials from Password Stores T1555 The actors used the command Cmdkey /list likely to display usernames and credentials.
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Rivest Cipher 4 (RC4) tickets.
    Multi-Factor Authentication Request Generation T1621 The actors sent MFA requests to legitimate users.
    Table 9: Discovery
    Technique Title ID Use
    Remote System Discovery T1018 The actors used LOTL to return information about domain controllers.
    Permission Groups Discovery: Domain Groups T1069.002 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    Permission Groups Discovery: Cloud Groups T1069.003 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    System Information Discovery  T1082 The actors were able to query the AD to discover display names, operating systems, descriptions, and distinguished names from the computer.
    Account Discovery: Domain Account T1087.002 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    Domain Trust Discovery T1482 The actors used LOTL to return information about trusted domains.
    Table 10: Lateral Movement
    Technique Title  ID Use
    Remote Services: Remote Desktop Protocol T1021.001 The actors used Microsoft Word to open PowerShell to launch RDP binary mstsc.exe.
    Table 11: Collection
    Technique Title ID Use
    Data from Local System T1005 The actors downloaded files related to remote access methods and the organization’s inventory.
    Table 12: Command and Control
    Technique Title ID Use
    Application Layer Protocol: Web Protocols T1071.001 The actors used msedge.exe to make outbound connections likely to Cobalt Strike Beacon C2 infrastructure.
    Ingress Tool Transfer T1105 The actors imported a tool from GitHub and used it to conduct password spraying.
    Protocol Tunneling T1572 The actors frequently conduct targeting using a virtual private network (VPN).

    Appendix B: Indicators of Compromise

    See Tables 13 to 15 for IOCs obtained from FBI investigations.

    Table 13: Malicious Files Associated with Iranian Cyber Actors
    Hash Description
    1F96D15B26416B2C7043EE7172357AF3AFBB002A Associated with malicious activity.
    3D3CDF7CFC881678FEBCAFB26AE423FE5AA4EFEC Associated with malicious activity.

    Disclaimer: The authoring organizations recommend network defenders investigate or vet IP addresses prior to taking action, such as blocking, as many cyber actors are known to change IP addresses, sometimes daily, and some IP addresses may host valid domains. Many of the IP addresses provided below are assessed VPN nodes and as such are not exclusive to the Iranian actors’ use. The authoring organizations do not recommend blocking these IP addresses based solely on their inclusion in this JCSA. The authoring organizations recommend using the below IP addresses to search for previous activity the actors may have conducted against networks. If positive hits for these IP addresses are identified, the authoring organizations recommend making an independent determination if the observed activity aligns with the TTPs outlined in the JCSA. The timeframes included in the table reflect the timeframe the actors likely used the IPs.

    Table 14: Network Indicators
    IP Address Date Range
    95.181.234.12 01/30/2024 to 02/07/2024
    95.181.234.25 01/30/2024 to 02/07/2024
    173.239.232.20 10/06/2023 to 12/19/2023
    172.98.71.191 10/15/2023 to 11/27/2023
    102.129.235.127 10/21/2023 to 10/22/2023
    188.126.94.60 10/22/2023 to 01/12/2024
    149.40.50.45 10/26/2023
    181.214.166.59 10/26/2023
    212.102.39.212 10/26/2023
    149.57.16.134 10/26/2023 to 10/27/2023
    149.57.16.137 10/26/2023 to 10/27/2023
    102.129.235.186 10/29/2023 to 11/08/2023
    46.246.8.138 10/31/2023 to 01/26/2024
    149.57.16.160 11/08/2023
    149.57.16.37 11/08/2023
    46.246.8.137 11/17/2023 to 01/25/2024
    212.102.57.29 11/19/2023 to 01/17/2024
    46.246.8.82 11/22/2023 to 01/28/2024
    95.181.234.15 11/26/2023 to 02/07/2024
    45.88.97.225 11/27/2023 to 02/11/2024
    84.239.45.17 12/04/2023 to 12/07/2023
    46.246.8.104 12/07/2023 to 02/07/2024
    37.46.113.206 12/07/2023
    46.246.3.186 12/07/2023 to 12/09/2023
    46.246.8.141 12/07/2023 to 02/10/2024
    46.246.8.17 12/09/2023 to 01/09/2024
    37.19.197.182 12/15/2023
    154.16.192.38 12/25/2023 to 01/24/2024
    102.165.16.127 12/27/2023 to 01/28/2024
    46.246.8.47 12/29/2023 to 01/29/2024
    46.246.3.225 12/30/2023 to 02/06/2024
    46.246.3.226 12/31/2023 to 02/03/2024
    46.246.3.240 12/31/2023 to 02/06/2024
    191.101.217.10 01/05/2024
    102.129.153.182 01/08/2024
    46.246.3.196 01/08/2024
    102.129.152.60 01/09/2024
    156.146.60.74 01/10/2024
    191.96.227.113 01/10/2024
    191.96.227.122 01/10/2024
    181.214.166.132 01/11/2024
    188.126.94.57 01/11/2024 to 01/13/2024
    154.6.13.144 01/13/2024 to 01/24/2024
    154.6.13.151 01/13/2024 to 01/28/2024
    188.126.94.166 01/15/2024
    89.149.38.204 01/18/2024
    46.246.8.67 01/20/2024
    46.246.8.53 01/22/2024
    154.16.192.37 01/24/2024
    191.96.150.14 01/24/2024
    191.96.150.96 01/24/2024
    46.246.8.10 01/24/2024
    84.239.25.13 01/24/2024
    154.6.13.139 01/26/2024
    191.96.106.33 01/26/2024
    191.96.227.159 01/26/2024
    149.57.16.150 01/27/2024
    191.96.150.21 01/27/2024
    46.246.8.84 01/27/2024
    95.181.235.8 01/27/2024
    191.96.227.102 01/27/2024 to 01/28/2024
    46.246.122.185 01/28/2024
    146.70.102.3 01/29/2024 to 01/30/2024
    46.246.3.233 01/30/2024 to 02/15/2024
    46.246.3.239 01/30/2024 to 02/15/2024
    188.126.89.35 02/03/2024
    46.246.3.223 02/03/2024
    46.246.3.245 02/05/2024 to 02/06/2024
    191.96.150.50 02/09/2024
    Table 15: Devices
    Device Type Description
    Samsung Galaxy A71 (SM-A715F) Registered with MFA
    Samsung SM-G998B Registered with MFA
    Samsung SM-M205F Registered with MFA

    MIL OSI USA News

  • MIL-OSI USA: Governor Katie Hobbs Announces Jerry McPherson as New Executive Director of the Commission of African American Affairs

    Source: US State of Arizona

    Phoenix, AZ – Today, Governor Katie Hobbs announced that Jerry McPherson, longtime Phoenix community leader, will serve as the new Executive Director of the Commission of African American Affairs. The Commission plays an important role in serving the vibrant African American community in Arizona, including supporting economic advancement, promoting equality and justice, and providing educational tools and resources needed to thrive.

    “I am thrilled to have Jerry McPherson as The Commission’s new Executive Director,” said Governor Katie Hobbs. “He has a strong track record of leadership in both the public and private sectors and has spent his career finding new and innovative ways to empower his community. I know Jerry’s breadth of experience and determination will unlock a bright future for The Commission and I look forward to seeing what they will accomplish together.”

    “I am deeply honored and grateful to Governor Hobbs and our Commissioners for entrusting me with this critical responsibility,” said Jerry McPherson. “Our mission—to unite African American leaders and communities in the pursuit of opportunity and equity—has never been more urgent. I look forward to collaborating with our elected and appointed officials to transform our aspirations into lasting change. Through our pillars of Economic Development, Justice, Health, and Education, we can ensure that African-Americans throughout the state can embrace a future filled with promise and opportunity.”

    Jerry McPherson is a U.S. Army Veteran and graduate of the Flinn-Brown Fellowship. He has served in advisory roles for the cities of Phoenix and Tempe, and has experience leading some of Arizona’s most pivotal economic and community organizations including the Greater Phoenix Urban League and Valley of the Sun United Way. Jerry most recently served as a Commissioner on the Commission of African American Affairs and was Managing Director at Per Scholas Phoenix.

    MIL OSI USA News

  • MIL-OSI USA: Sacrifice and Success: NASA Engineer Honors Family Roots

    Source: NASA

    Lee esta historia en Español aquí.
    Born and raised in Peru, Daniel Velasquez moved to the United States when he was 10 years old. While that decision was a big transition for his family, it also created many opportunities for him. Now Velasquez is an operations engineer for NASA’s Air Mobility Pathfinders project at NASA’s Armstrong Flight Research Center in Edwards, California.
    Velasquez develops flight test plans for electric vertical take-off and landing (eVTOL) aircraft, specifically testing how they perform during various phases of flight, such as taxi, takeoff, cruise, approach, and landing. He was drawn to NASA Armstrong because of the legacy in advancing flight research and the connection to the Space Shuttle program.
    “Being part of a center with such a rich history in supporting space missions and cutting-edge aeronautics was a major motivation for me,” Velasquez said. “One of the biggest highlights of my career has been the opportunity to meet (virtually) and collaborate with an astronaut on a possible future NASA project.”

    Velasquez is incredibly proud of his Latino background because of its rich culture, strong sense of community and connection to his parents. “My parents are my biggest inspiration. They sacrificed so much to ensure my siblings and I could succeed, leaving behind the comfort of their home and family in Peru to give us better opportunities,” Velasquez said. “Their hard work and dedication motivate me every day. Everything I do is to honor their sacrifices and show them that their efforts weren’t wasted. I owe all my success to them.”
    Velasquez began his career at NASA in 2021 as an intern through the Pathways Internship Program while he was studying aerospace engineering at Rutgers University in New Brunswick, New Jersey. Through that program, he learned about eVTOL modeling software called NASA Design and Analysis of Rotorcraft to create a help guide for other NASA engineers to reference when they worked with the software.
    At the same time, he is also a staff sergeant in the U.S Army Reserves and responsible for overseeing the training and development of junior soldiers during monthly assemblies. He plans, creates, and presents classes for soldiers to stay up-to-date and refine their skills while supervising practical exercises, after action reviews, and gathering lessons learned during trainings.

    “This job is different than what I do day-to-day at NASA, but it has helped me become a more outspoken individual,” he said. “Being able to converse with a variety of people and be able to do it well is a skill that I acquired and refined while serving my country.”
    Velasquez said he never imagined working for NASA as it was something he had only seen in movies and on television, but he is so proud to be working for the agency after all the hard work and sacrifices he made that lead him to this point. “I am incredibly proud to work every day with some of the most motivated and dedicated individuals in the industry.”

    MIL OSI USA News

  • MIL-OSI Security: Defense News: Search Continues for VAQ-130 Aviators

    Source: United States Navy

    Aerial operations continued through the night, launching from NAS Whidbey Island and searching in the area 30 miles west of Yakima, Wash. Responders are facing mountainous terrain, cloudy weather, and low visibility as the search is ongoing.

    As of 11 a.m. on Oct. 16, neither the crew nor wreckage has been located.

    Additional units supporting search and rescue include: U.S. Navy Fleet Air Reconnaissance Squadron One (VQ-1), Patrol Squadron (VP-46), NAS Whidbey Island Search and Rescue, and U.S. Army 4-6 Air Cavalry Squadron out of Joint Base Lewis-McChord. 

    The cause of the crash is under investigation.

    More information will be released as it becomes available.

    MIL Security OSI

  • MIL-OSI Australia: Sydney Opera House illuminated to welcome Their Majesties King Charles III and Queen Camilla to Australia

    Source: New South Wales Government 2

    Headline: Sydney Opera House illuminated to welcome Their Majesties King Charles III and Queen Camilla to Australia

    Published: 16 October 2024

    Released by: The Premier


    The Sydney Opera House shells will be illuminated on Friday night as NSW welcomes King Charles III and Queen Camilla to Australia, with Sydneysiders and visitors invited to head into the city to see the spectacular projection.

    Curated by the NSW Government, the projection consists of a four-minute photo montage from Their Majesties’ previous visits to the state and the nation. The images reflect the diverse ways in which Their Majesties have engaged with and celebrated NSW and Australia over the years.

    The illumination will commence at 8pm on Friday, 18 October to coincide with Their Majesties’ arrival into Sydney.

    This will be the King’s first visit as Sovereign – the first visit by a reigning monarch since Her Late Majesty Queen Elizabeth II visited in 2011.

    The NSW Government is honoured to welcome The King and Queen to Sydney and is inviting NSW residents to join the celebration.

    Members of the public will also have the opportunity to see Their Majesties at the Sydney Opera House Forecourt on Tuesday afternoon, 22 October at 4.20pm. This opportunity will be followed by an impressive Fleet Review and fly past by the Australian Defence Force on Sydney Harbour concluding at 5.20pm.

    For more information about the Royal Visit and the Sydney Opera House engagement visit: http://www.nsw.gov.au/royalvisit

    Premier Chris Minns said:

    “We are lighting up the Sydney Opera House to warmly welcome The King and Queen to our beautiful harbour city.

    “The photo projection on the Opera House sails celebrates a historic moment – The King’s first visit to NSW as Sovereign – and is a fitting tribute.

    “I also invite everyone to the Opera House forecourt next Tuesday afternoon to join The King and Queen.

    “NSW is looking forward to hosting this milestone visit and I encourage everyone to make the most of it.”

    MIL OSI News

  • MIL-OSI USA: Guarding the Grid: Wyoming Army Guard Undergoes Critical Cybersecurity Evaluation

    Source: US State of Wyoming

    CHEYENNE, Wyo. – In today’s environment, cyber threats are more pervasive than ever. Transnational criminal groups and nation-states engage in daily cyber attacks, targeting critical infrastructure.

    The U.S. Army National Guard Cyber Hygiene Assistance Team helps protect our grid. They conducted an assistance mission from Aug. 19 to 23, 2024, to assist the Wyoming Army National Guard with preparations for the U.S. Army Cyber Command Cyber Operational Readiness Assessment to evaluate their cybersecurity posture.

    The assessment is part of ongoing efforts to ensure the highest level of security across the Department of Defense Information Network.

    “Every computer and networking device connected to the network is an avenue nefarious actors can use to access our network,” said Lt. Col. Stephen Fish, the Army Guard CHAT team lead. “Ensuring these devices are secure is not just about protecting data but safeguarding our entire national defense infrastructure.”

    The CORA inspection is a comprehensive process that scrutinizes both the technological infrastructure and the operational practices related to cybersecurity. This two-week inspection assesses an organization’s overall risk to the DOD Information Network, with risk levels ranging from very low to very high. Organizations with high or very high risk may face severe consequences, such as being quarantined or disconnected from the network.

    “CORA isn’t just a check on the technology in use,” Fish explained. “It’s an all-encompassing inspection that looks at the security-minded culture of users, leadership engagement in cyber and personal security, policies, procedures, and how information is secured on classified and unclassified networks. This holistic approach reduces overall risk to our national security.”

    The Army Guard’s preparation for CORA begins six months before the inspection, with weekly meetings and in-depth evaluations of various cybersecurity areas. The CHAT conducts a one-week on-site mission three months before the inspection, collaborating directly with personnel and administrators to access and enhance their cybersecurity posture. After this mission, preliminary results are presented to state senior leadership, providing a clear picture of their security status and allowing them to make informed decisions on necessary actions.

    “The CHAT program has been instrumental in increasing cybersecurity across the Army Guard,” Fish said. “When I started in 2019, the Army Guard had a pass rate of around 50% in the predecessor to CORA, the Command Cyber Readiness Inspection. Thanks to the efforts of the CHAT program, this pass rate has soared to over 90%, a testament to the effectiveness of our approach.”

    Fish shares the secret to his team’s success.

    “We don’t just come to do an assessment, leave a location with a list of things to fix and wish them luck,” he said. “We start working with locations months in advance, build relationships and stick with them all the way through the end of their inspection.”

    Additionally, the team includes highly talented Soldiers from multiple states, according to Fish. “Active duty and reserves do not have the capability or flexibility in force structure to establish the same type of program, which is why we are so successful.”

    In response to these escalating cyber threats, the Army Guard has implemented proactive measures to strengthen its defenses. However, Lejeune emphasized that every user plays a role in safeguarding the network.

    “The Army National Guard deploys a sophisticated and effective cyber defense infrastructure to protect against these threats,” said Lt. Col. Robert Lejeune, Wyoming Army Guard deputy chief of staff information management. “However, technology alone is not the answer—people are the solution. Our G6 [Department of Information Management] has a very talented group of individuals who fight this fight every day, but everyone who uses the network is needed to defend it.”

    Lejeune provides five essential tips for regular users to enhance cybersecurity efforts:

    Don’t leave your Common Access Card in your computer, and avoid using your phone number as your PIN: With the rise of identity theft and the ease of accessing personal information, securing your access credentials is crucial.

    Avoid using wireless keyboards and mice: The frequencies used by these devices are not secure and can be intercepted. Wired versions offer a more secure alternative.

    Protect personally identifiable information and adhere to Health Insurance Portability and Accountability Act requirements: Preventing identity theft is essential for maintaining individual readiness.

    Follow controlled unclassified information, operational, informational and physical security measures: Protecting sensitive and classified information is vital to national security.

    Educate and protect yourself: Start with the personal measures outlined in the annual Cyber Awareness Challenge. These steps will protect you and safeguard your loved ones.

    “The collective effort of every individual using the network is crucial to defending it against potential threats,” Lejeune said. “By adhering to these tips, users can significantly bolster the cybersecurity efforts of DOIM, ensuring a more secure environment for all.”

    MIL OSI USA News

  • MIL-OSI USA: Rep. Roy issues statement on nonstop flight between San Antonio and Washington Reagan

    Source: United States House of Representatives – Representative Chip Roy (R-TX)

    WASHINGTON, DC — Representative Chip Roy (TX-21) issued the following statement Wednesday after the Department of Transportation approved American Airlines’ application to fly a non-stop flight between San Antonio International Airport and Ronald Reagan Washington National Airport in Washington, D.C.:

    “Today’s announcement is a long-awaited and well-deserved victory for the people of San Antonio, the surrounding region, and our nation’s military and veterans. This nonstop flight between San Antonio and Washington Reagan Airport is the direct result of a yearslong, hard-fought battle to secure the legislative language necessary to make this happen in the FAA Reauthorization Act of 2024. 

    For far too long, residents of America’s seventh-largest city — including the tens of thousands of active duty servicemembers and veterans in Military City USA — were denied a direct, nonstop flight to our nation’s capital for no other reason than outdated legislation and crony protectionism.

    I have relentlessly fought for a nonstop flight between San Antonio and Washington Reagan Airport in the House of Representatives. In April 2023, I led a bipartisan letter signed by every member of the San Antonio delegation in support of securing the legislative language ultimately signed into law. In the Rules Committee, I made sure the House considered an amendment to add seven flights at Washington Reagan. While that amendment came up short, it paved the way for the compromise struck by Senator Cruz and included in the FAA Reauthorization Act of 2024, which I proudly supported. In July 2024, Senator Cruz and I led a bipartisan, bicameral delegation of 36 Texans urging the DOT to approve American Airlines’ application to fly this route.

    I am grateful for Senator Ted Cruz and his steadfast leadership, members of the San Antonio congressional delegation, and American Airlines for working to break through the gridlock and deliver this much-needed improvement for San Antonio.

    Background:

    Rep. Roy leads 7 Texans in supporting authorization of non-stop flight from Military City USA to nation’s capital

    Rep. Roy issues statement on the FAA Reauthorization Act of 2024

    Sen. Cruz, Reps. Roy, Castro, Mayor Nirenberg Outline Next Steps for Nonstop Flight from San Antonio to Washington, D.C.

    Texas Delegation Letter to the Department of Transportation

    ###

    MIL OSI USA News

  • MIL-OSI USA: Governor Cooper Visits Yancey and Mitchell Counties to Survey Storm Damage as Federal, State, Local and Non-profit Partners Continue Unprecedented Response to Helene

    Source: US State of North Carolina

    Headline: Governor Cooper Visits Yancey and Mitchell Counties to Survey Storm Damage as Federal, State, Local and Non-profit Partners Continue Unprecedented Response to Helene

    Governor Cooper Visits Yancey and Mitchell Counties to Survey Storm Damage as Federal, State, Local and Non-profit Partners Continue Unprecedented Response to Helene
    mseets

    Today, Governor Roy Cooper traveled to Pensacola and Bakersville where he was joined by FEMA Administrator Deanne Criswell, NCDPS Secretary Eddie Buffaloe and Commander of the State Highway Patrol Colonel Freddie Johnson to assess storm damage, witness relief operations and speak with those affected by Helene. In Pensacola, the Governor visited a supply distribution center operating at the Pensacola Volunteer Fire Department. In Bakersville, the Governor joined Mayor Charles Vines for a walking tour to see areas that sustained damage during the storm.

    “Today I was on the ground in Pensacola, Yancey County and Bakersville, Mitchell County, talking with folks affected by Helene and seeing how hard people are working to rebuild from this storm,” said Governor Cooper. “The people of Western North Carolina are strong, and we will keep working with them to surge resources and to recover and rebuild their communities.”

    The Major Disaster Declaration requested by Governor Cooper and granted by President Biden now includes the following North Carolina counties and designations which were added Tuesday night:

    • Cabarrus, Cherokee, Forsyth, Graham, Iredell, Lee, Nash, Rowan, Stanly, Surry, Union, and Yadkin counties for Individual Assistance,
    • Cabarrus, Cherokee, Forsyth, Graham, Iredell, Lee, Nash, Rowan, Stanly, Surry, Union and Yadkin counties for debris removal and emergency protective measures, including direct Federal assistance, under the Public Assistance program.
    • Swain County for permanent work (already designated for Individual Assistance and assistance for debris removal and emergency protective measures, including direct Federal assistance, under the Public Assistance program.

    The Major Disaster Declaration already includes 27 North Carolina counties (Alexander, Alleghany, Ashe, Avery, Buncombe, Burke, Caldwell, Catawba, Clay, Cleveland, Gaston, Haywood, Henderson, Jackson, Lincoln, Macon, Madison, McDowell, Mecklenburg, Mitchell, Polk, Rutherford, Swain, Transylvania, Watauga, Wilkes and Yancey) and the Eastern Band of Cherokee Indians.

    Also today, Governor Cooper issued an emergency Executive Order authorizing the North Carolina Department of Commerce, Division of Employment Security, to increase the amount of weekly unemployment payments available to North Carolinians in the aftermath of Hurricane Helene. As a result of this Order, weekly unemployment benefits will increase from a maximum of $350 a week to a maximum of $600 a week. Prior to the executive order, many low-income and part-time workers would have received less than the $350 weekly maximum. To ensure that these workers receive necessary benefits in the wake of Helene, the order will also increase benefits by $250 a week (up to the $600 cap) for all eligible workers. This order is tied to the State of Emergency for Hurricane Helene, and will remain in effect until the end of the Emergency or until it is rescinded.

    Law enforcement is working to ensure the safety of responders amid reports of threats and misinformation. FEMA officials remain in communities and are conducting operations to help people impacted by these storms recover as quickly as possible following reports of threats on the ground. Governor Cooper has directed the Department of Public Safety to work with local law enforcement to identify specific threats and rumors and coordinate with FEMA and other partners to ensure the safety and security of all involved as this recovery effort continues.

    North Carolina National Guard and Military Response

    Nearly 3,400 Soldiers and Airmen are working in Western North Carolina. Joint Task Force- North Carolina, the task force led by the North Carolina National Guard is made up of Soldiers and Airmen from 12 different states, two different XVIII Airborne Corps units from Ft. Liberty, a unit from Ft. Campbell’s 101st Airborne Division, and numerous civilian entities are working side-by-side to get the much-needed help to people in Western North Carolina.

    National Guard and military personnel are operating 12 aviation assets and approximately 1,200 specialized vehicles in Western North Carolina to facilitate these missions. The U.S. Army Corps of Engineers is helping to assess water and wastewater plants and dams. Residents can track the status of the public water supply in their area through this website.

    FEMA Assistance

    More than $102 million in FEMA Individual Assistance funds have been paid so far to Western North Carolina disaster survivors and approximately 181,000 people have registered for Individual Assistance. More than 2,000 households are now housed in hotels through FEMA’s Transitional Sheltering Assistance.

    Approximately 1,400 FEMA staff are in the state to help with the Western North Carolina relief effort. In addition to search and rescue and providing commodities, they are meeting with disaster survivors in shelters and neighborhoods to provide rapid access to relief resources. They can be identified by their FEMA logo apparel and federal government identification.

    North Carolinians can apply for Individual Assistance by calling 1-800-621-3362 from 7am to 11pm daily or by visiting www.disasterassistance.gov, or by downloading the FEMA app. FEMA may be able to help with serious needs, displacement, temporary lodging, basic home repair costs, personal property loss or other disaster-caused needs.

    Help from Other States

    More than 1,500 responders from 38 state and local agencies have performed 142 missions supporting the response and recovery efforts through the Emergency Management Assistance Compact (EMAC). This includes public health nurses, emergency management teams supporting local governments, veterinarians, teams with search dogs and more.

    Beware of Misinformation

    North Carolina Emergency Management and local officials are cautioning the public about false Helene reports and misinformation being shared on social media. NCEM has launched a fact versus rumor response webpage to provide factual information in the wake of this storm. FEMA also has a rumor response webpage.

    Efforts continue to provide food, water and basic necessities to residents in affected communities, using both ground resources and air drops from the NC National Guard. Food, water and commodity points of distribution are open throughout Western North Carolina. For information on these sites in your community, visit your local emergency management and local government social media and websites or visit ncdps.gov/Helene.

    Storm Damage Cleanup

    If your home has damages and you need assistance with clean up, please call Crisis Cleanup for access to volunteer organizations that can assist you at 844-965-1386.

    Power Outages

    Across Western North Carolina, approximately 11,000 customers remain without power, down from a peak of more than 1 million. Overall power outage numbers will fluctuate up and down as power crews temporarily take circuits or substations offline to make repairs and restore additional customers.

    Road Closures

    Some roads are closed because they are too damaged and dangerous to travel. Other roads still need to be reserved for essential traffic like utility vehicles, construction equipment and supply trucks. However, some parts of the area are open and ready to welcome visitors which is critical for the revival of Western North Carolina’s economy. If you are considering a visit to the area, consult DriveNC.gov for open roads and reach out to the community and businesses you want to visit to see if they are welcoming visitors back yet.

    NCDOT currently has approximately 2,000 employees and 900 pieces of equipment working on approximately 7,000 damaged road sites.

    Fatalities

    Ninety-five storm-related deaths have been confirmed in North Carolina by the Office of Chief Medical Examiner. This number is expected to rise over the coming days. The North Carolina Office of the Chief Medical Examiner will continue to confirm numbers twice daily. If you have an emergency or believe that someone is in danger, please call 911.

    Volunteers and Donations

    If you would like to donate to the North Carolina Disaster Relief Fund, visit nc.gov/donate. Donations will help to support local nonprofits working on the ground.

    For information on volunteer opportunities, please visit nc.gov/volunteernc

    Additional Assistance

    There is no right or wrong way to feel in response to the trauma of a hurricane. If you have been impacted by the storm and need someone to talk to, call or text the Disaster Distress Helpline at 1-800-985-5990. Help is also available to anyone, anytime in English or Spanish through a call, text or chat to 988. Learn more at 988Lifeline.org.

    If you are seeking a representative from the North Carolina Joint Information Center, please email ncempio@ncdps.gov or call 919-825-2599.

    For general information, access to resources, or answers to frequently asked questions, please visit ncdps.gov/helene.

    If you are seeking information on resources for recovery help for a resident impacted from the storm, please email IArecovery@ncdps.gov.

    ###

    Oct 16, 2024

    MIL OSI USA News

  • MIL-OSI USA: Durbin Announces New Resources To Address Child Lead Poisoning Risks In Chicago

    US Senate News:

    Source: United States Senator for Illinois Dick Durbin

    10.16.24

    CHICAGO Today, U.S. Senate Majority Whip Dick Durbin (D-IL) joined officials from CountyCare, Cook County Health, and the Cook County Department of Public Health to unveil new proactive measures taken by all five Medicaid managed care insurance companies (MCOs) in Illinois in response to a request by Durbin and U.S. Senator Tammy Duckworth (D-IL) to address lead poisoning risks to children in Chicagoland.

    In March, Durbin and Duckworth had urged MCOs to step up to address lead poisoning risks to children in Chicago by preemptively sending drinking water test kits, water filters, home visitors, and educational materials to all enrolled children in the city. As a result of these letters, CountyCare, the largest MCO in Cook County, agreed to the Senators’ request and sent educational materials as well as a coupon redeemable at local Jewel-Osco grocery stores for a free water filter to nearly 90,000 families in Cook County. The other four MCOs made similar commitments, including providing grants to primary care providers for lead tests and to local community organizations to distribute free water filters to low-income families.

    “Children continue to face the unacceptable risk of lead poisoning in the very place they call home,” said Durbin. I sent letters with Senator Duckworth to the five Medicaid insurance companies in Illinois, calling upon them to take new, proactive measures to address this dire health risk. I applaud CountyCare for being the first to step up and implement innovative strategies to prevent the threat of lead exposure for low-income children. Today’s announced initiatives from all five insurance companies will support children’s health and provide some peace of mind for parents as we continue to work towards replacing lead pipes in our community.”

    “We appreciate the leadership of Senator Durbin and Senator Duckworth in addressing the number one environmental hazard that is 100 percent preventable. Collaboration is key in tackling public health issues, and efforts like this are crucial in preventing such problems whenever possible. Let’s continue working together to build healthier and safer communities,” said LaMar Hasbrouck, MD, Chief Operating Officer of the Cook County Department of Public Health. 

    “There is no safe level of lead exposure for children. Lead can cause serious and permanent health problems, including irreversible brain damage,” said Dr. Erik Mikaitis, Interim CEO of Cook County Health, which includes CountyCare, the largest Medicaid Managed Care Plan serving residents of Cook County. “I am grateful to Senator Durbin and Senator Duckworth for their leadership on this issue. By creating these new outreach strategies, we are strengthening our collaborative, multi-faceted approach to prevent, mitigate and treat lead exposure and keep children safe.”

    Today’s announcement comes during Children’s Health Month and ahead of National Lead Poisoning Prevention Week.  The Senators’ letters to CountyCare, Aetna, BlueCross, Meridian, and Molina followed the finding earlier this year that 129,000 Chicago children—68 percent of those younger than age six—were potentially exposed to lead in their home drinking water, due to the presence of lead pipes—given that Chicago has the highest number of lead pipes of any city in the country.  

    Medicaid, the federal-state health insurance program for low-income individuals, has a comprehensive benefit for kids—requiring all covered children to receive lead screenings at ages one and two. The Centers for Medicare and Medicaid Services (CMS) states that there is a specific and presumptive risk of lead exposure for children on Medicaid. Further, if a child tests for an elevated blood lead level, states are required to provide diagnostic and treatment services.

    Last week, the U.S. Environmental Protection Agency (EPA) announced its final Lead and Copper Rule Improvements (LCRI) to address lead in drinking water, which requires 100 percent lead pipe replacement in 10 years among other requirements to protect public health. In Illinois, the state reported more than one million lead service lines (LSLs), the most per capita in the nation, and replacing LSLs statewide is estimated to cost $11.6 billion. Illinois has received more than $578 million from the Bipartisan Infrastructure Law earmarked for LSLs from EPA. The Natural Resources Defense Council found that Illinois will benefit the most from lead pipe remediation, with up to $89 billion in avoided health costs.

    Earlier this year, Durbin reintroduced his Lead-Safe Housing for Kids Act, a bill to require the Department of Housing and Urban Development (HUD) to update its lead poisoning prevention measures to reflect modern science and ensure that families and children living in federally assisted housing are protected from the devastating consequences of lead poisoning. 

    -30-



    MIL OSI USA News

  • MIL-OSI USA: Rep. Rosendale Infuriated Over Biden-Harris Deployment of U.S. Troops to Israel

    Source: United States House of Representatives – Representative Matt Rosendale (Montana)

    WASHINGTON, D.C. – Today, Congressman Matt Rosendale (MT-02) released a statement following the Department of Defense’s announcement that they have authorized a deployment of a Terminal High-Altitude Area Defense (THAAD) battery and associated crew of U.S. military personnel to Israel. Rep. Rosendale strongly disagrees with the administration bypassing Congress and putting boots on the ground in a foreign country.  

    “Why was Congress not consulted before the escalation of a foreign war by sending a “THAAD battery and associated crew of U.S. military personnel” into a war zone?” Rep. Rosendale continued, “The Biden-Harris admin is a case study on what NOT to do overseas! They removed sanctions from Iran allowing them to enrich themselves and buy weapons to attack others, and then they send troops and bombs to Israel to fight Iran! The Biden-Harris admin is facilitating both sides of this war and creating havoc in the region.”

    MIL OSI USA News

  • MIL-OSI USA: Readout of Principal Deputy National Security Advisor Jon Finer’s Trip to  Haiti

    US Senate News:

    Source: The White House
    Principal Deputy National Security Advisor Jon Finer traveled to Port-au-Prince, Haiti on October 16 to meet with senior Haitian officials, and leadership of the Multinational Security Support (MSS) mission and the Haitian National Police (HNP) to drive progress on security and governance efforts. Mr. Finer was joined by a senior U.S. delegation from the Department of State, the Department of Defense, the U.S. Agency for International Development, and the National Security Council.  During separate meetings with members of the Transitional Presidential Council (TPC) and Prime Minister Garry Conille, Mr. Finer expressed condolences for the tragic loss of innocent life in the recent gang-led massacre in Pont-Sondé and reiterated the U.S. commitment to support Haitian-led efforts to restore security and pave the way toward free and fair elections.  Mr. Finer also commended the TPC for the transition of the presidency to President Leslie Voltaire on October 7, while noting that all Haitian officials must continue to put country over party and deliver on their promise to work for all Haitians.
    In his meeting with MSS and HNP leadership, Mr. Finer underscored our continued commitment to rally international support and provide the tools necessary to restore security and rule of law in Haiti.  To ensure that the MSS has the resources that it requires, the United States is by far the largest contributor to support the MSS mission to date.  Following the Haitian government’s request to the UN Security Council to authorize a UN peacekeeping mission to take over from the MSS at an appropriate time, Mr. Finer reassured Haitian officials of U.S. support for such a transition.
    The United States remains the largest contributor of humanitarian aid to the Haitian people through our UN and NGO partners, while also supporting the renewal of the HOPE/HELP trade preferences program as soon as possible to spur greater economic prosperity in Haiti.

    MIL OSI USA News

  • MIL-OSI USA: Cornyn Praises Selection of American Airlines for San Antonio to D.C. Direct Flight Route

    US Senate News:

    Source: United States Senator for Texas John Cornyn
    AUSTIN – U.S. Senator John Cornyn (R-TX) released the following statement on the U.S. Department of Transportation’s (DOT) announcement of the establishment of a direct flight route between San Antonio and Washington D.C.’s Ronald Reagan National Airport to be serviced by Texas-based American Airlines:
    “As a proud native of San Antonio, I am pleased with the DOT’s decision to establish a direct route between San Antonio and the District of Columbia, and glad to hear that it will be served by DFW-based American Airlines,” said Sen. Cornyn. “This new route will make travel more efficient for military personnel, business travelers, or simply families visiting their nation’s capital, and I was proud to work with Senator Cruz and countless others to make this major win for ‘Military City, USA’ a reality.”
    Background:
    In May, Sen. Cornyn voted in favor of the Federal Aviation Administration (FAA) Reauthorization Act, now law, which includes a range of reforms to improve public safety, efficiency, and consumer confidence and allows for a direct route from San Antonio.
    In July, Sen. Cornyn joined Senator Ted Cruz (R-TX), Representative Chip Roy (TX-21), Representative Joaquin Castro (TX-20), and others in sending a letter urging Secretary of Transportation Pete Buttigieg to allocate San Antonio International Airport (SAT) one of the new long-haul, round-trip flights to Ronald Reagan Washington National Airport (DCA) allowed for in the FAA reauthorization legislation.

    MIL OSI USA News

  • MIL-OSI USA: Cantwell, Murray, Kilmer Announce $51M Federal Grant to Repair Hood Canal Bridge

    US Senate News:

    Source: United States Senator for Washington Maria Cantwell
    10.16.24
    Cantwell, Murray, Kilmer Announce $51M Federal Grant to Repair Hood Canal Bridge
    Hood Canal Bridge is a vital link between Olympic and Kitsap peninsulas & helps more than 30,000 daily commuters avoid a 100-mile detour around Puget Sound; As the longest floating saltwater bridge in the world, the structure is deteriorating in the harsh marine environment
    WASHINGTON, D.C. – Today, U.S. Senators Maria Cantwell (D-WA) and Patty Murray (D-WA) and U.S. Representative Derek Kilmer (D, WA-06) announced that the Washington State Department of Transportation will receive $51,125,917 in federal funds to repair the Hood Canal Bridge.
    The funding comes from the Infrastructure for Rebuilding America (INFRA) Grant Program, which provides grants to nationally and regionally significant transportation projects to improve the country’s freight network.
    “Thanks to the Bipartisan Infrastructure Law, the Hood Canal Bridge will receive the repairs it needs to continue providing a vital connection between Kitsap, Jefferson, and Clallam Counties, with more than 30,000 crossings per day. Without this bridge, drivers would need to take a 100-mile detour around Puget Sound. And if the bridge’s retractable span were to fail, submarines and other vessels would be cut off from Naval Base Kitsap – Bangor,” Sen. Cantwell said. “This bridge is critical to the quality of life for residents and our national security.”
    “The Hood Canal Bridge is an absolutely critical connection for people and businesses on the Olympic and Kitsap peninsulas,” said Sen. Murray. “This is a piece of infrastructure that must remain safe and reliable so people can get to where they need to go—whether that’s work, a doctor’s appointment, or anything else. With thousands of travelers relying on this bridge just about every day, I’m proud to have worked together with Senator Cantwell and Representative Kilmer to ensure we bring these federal dollars home to replace outdated portions of this bridge.”
    “The Hood Canal Bridge is often a lifeline for folks on the Olympic Peninsula, enabling them to get where they need to go,” said Rep. Kilmer. “This federal funding is a major step toward improving the safety and reliability of the bridge, helping ensure that it will remain open, accessible and resilient for years to come. And with federal support it means this project can move forward without the costs falling solely on the backs of taxpayers in our state. That’s a win-win.”
    This project will replace over 3,400 linear feet of the western half of the bridge including the replacement of 55 reinforced concrete crossbeams and 216 prestressed concrete girder lines and the placement of nearly 4,800 cubic yards of concrete. Preliminary design work is scheduled to begin in November 2025, with project completion scheduled for June 2027. The project’s total budget is $85.2 million.
    The Hood Canal Bridge links the Olympic and Kitsap peninsulas, allowing over 30,000 motorists to get to and from work each day. As the longest floating bridge in the world over saltwater, this unique structure sits in a harsh marine environment that’s deteriorated its condition over the past 40 years. Currently, vehicles that can cross the bridge are weight-restricted at 17,000 lbs per axle or less, and overweight vehicles are forced to drive nearly 100 miles around Puget Sound.  If the bridge’s condition goes unaddressed, further deterioration and restrictions would have severe impacts on commerce and the livelihood of those who depend on the bridge every day.
    The Hood Canal Bridge also crosses a channel used by U.S. Navy submarines to reach the Pacific Ocean from Naval Base Kitsap -Bangor. Should the bridge’s retractable span become unusable, those vessels would be cut off from the base.
    Sen. Cantwell authored the INFRA Grant Program in the FAST Act of 2015, to provide grants to nationally and regionally significant freight and highway projects. This grant program was the first discretionary grant program to focus on improving the multimodal freight network and addressing freight bottlenecks. In 2022, as chair of the Senate Committee on Commerce, Science, and Transportation, Sen. Cantwell helped secure $8 billion over five years for the INFRA Grant Program as part of the Bipartisan Infrastructure Law, a 78 percent increase in funding. Additionally, in August 2024, Sen. Cantwell wrote a letter to Department of Transportation Secretary Pete Buttigieg in support of the Hood Canal Bridge project’s INFRA grant application. The State of Washington has received 11 INFRA Grants, for a total of $532,300,108 since the start of the program.
    Sen. Murray, as a senior appropriator and then Assistant Majority Leader, helped secure $3.2 billion for the INFRA grant program in advance appropriations in addition to the $4.8 billion funded through the Highway Trust Fund when she helped pass the Bipartisan Infrastructure Law, for a total of $8 billion over five years. 

    MIL OSI USA News

  • MIL-OSI USA: Grassley Demands VP Harris Own Up for Failures as Border Czar

    US Senate News:

    Source: United States Senator for Iowa Chuck Grassley

    BUTLER COUNTY, IOWA – U.S. Sen. Chuck Grassley (R-Iowa) wrote Vice President Kamala Harris asking questions about the policy decisions she has made in her role overseeing border issues for the Biden administration, as well as the dangerous consequences and crimes that have ensued as a result.

    “Every community is a border community because the Biden-Harris administration has refused to enforce our immigration laws,” Grassley today said of his letter. “The federal government’s number one job is to keep its citizens safe. By reversing the effective border security policies of the Trump administration, the Biden-Harris administration has done the very opposite of protecting American citizens.”

    Grassley on a radio call this morning cited the following actions, among others, the Biden-Harris administration has taken that have weakened U.S. national security and made innocent Americans targets of otherwise preventable crimes: 

    • Ordering the Defense Department to stop building the southern border wall;
    • Blocking $2 billion previously allocated for barrier construction; and
    • Ending the Trump-era “Remain in Mexico” program.

    Click HERE for audio of Grassley discussing his letter to Vice President Harris. The full letter is available HERE and below. 

    Vice President Kamala D. Harris

    The White House

    Office of the Vice President

    1600 Pennsylvania Avenue

    Washington, D.C. 20500

    Dear Vice President Harris:

    In one of your first official public appearances, you joined President Biden in the Oval Office when he opined on the Trump administration’s immigration and border policies. President Biden dismissed the previous administration’s policies as “counterproductive to our security,” “harmful,” and a “moral and national shame.” 

    Since your first day in office, you and President Biden have worked to dismantle the Trump-era border policies and halted further construction of the border wall. The presidential proclamation terminating construction read, in part: “It shall be the policy of my Administration that no more American taxpayer dollars be diverted to construct a border wall.” This initiated a so-called “careful review of all resources appropriated or redirected to construct a southern border wall.” By April 2021, the Department of Defense (DOD) announced the cancellation of border barrier projects. In June of the same year, the Biden-Harris administration returned $2 billion to the DOD previously allocated for the purpose of border wall construction. Your administration also initiated a review of the Remain in Mexico policy, which Department of Homeland Security (DHS) Secretary Mayorkas subsequently ended in June 2021.

    Meanwhile, every fiscal year throughout your engagements, crossings from Mexico and the

    Northern Triangle markedly exceeded any year of the Trump administration. Despite the stark increase from those nations and many others, deportations and returns overall have decreased as a share of crossings. 

    Now, you are engaging in a numbers racket, telling Americans modest decreases in encounters from soaring, record highs is somehow proof that what your administration has been doing all along is working. It is not. 

    President Biden’s executive order—more than three years after your administration’s reckless reversal of key policies—is an implicit admission that he and you bear ultimate responsibility for this crisis and this disastrous approach. As a result of these slow-walked changes, our national security has been undermined and the safety of our communities has been threatened all across the country. 

    Due to the Biden-Harris administration’s failure to achieve adequate border security, illegal immigrants, including those entering from Mexico and the Northern Triangle, have been able to perpetrate heinous acts against innocent American citizens. For example:

    • On May 14, 2024, an 18-year-old Honduran national, who purportedly entered the United States illegally in April 2022, pled guilty to sexually abusing a 12-year-old girl in Waterloo, Iowa.
    • On April 2, 2024, a Honduran national, who was previously convicted of sexual assaulting a woman in Connecticut and deported, was charged for failing to register as a sex offender. He was reportedly able to re-enter the United States undetected by Customs and Border Protection (CBP) and subsequently was arrested twice before being charged.
    • On February 25, 2024, a 19-year-old Honduran national was arrested for the alleged rape and aggravated assault of a 14-year-old girl at knifepoint in Louisiana. He entered the United States illegally in October 2023.
    • On May 4, 2024, a Guatemalan national was arrested for allegedly kidnapping and sexually assaulting an 11-year-old girl in a van in Palm Beach County, Florida. He reportedly entered the United States illegally in January 2024, was given an immigration hearing date in 2027, and was released by DHS.
    • On June 26, 2024, a Guatemalan national was charged with alleged sexually battery of a 14-year-old girl in Okaloosa County, Florida. He was deported on February 9, 2024, before this incident, but was able to re-enter the United States untraced days later.
    • On May 8, 2024, an El Salvadoran migrant was arrested for allegedly murdering a woman and the malicious assault of two homeless individuals with a baseball bat in West Virginia. He had an extensive criminal history and was in prison in El Salvador for over twenty years for “DUI [driving under the influence], sexual assault/murder, aggravated robbery, and narcotics related crimes.” Law enforcement believes he illegally entered the United States shortly after his release from prison.

    This is just a snapshot from this year alone of the sorts of preventable tragedies, which have become all too common across the United States.

    The Biden-Harris administration’s policies—pulling resources, reversing Remain in Mexico, and stopping wall construction—are largely to blame for our open and unsafe border over the last three-and-a-half years. Because of your actions and inactions, every state is now a border state and every community is a border community.

    Given your role as the leader of engagement with this region, which the media has colloquially dubbed as “Border Czar” or “Root Causes Czar,” I ask that you provide answers to the following immigration and border policy questions by October 24, 2024.

    1. Have you engaged with your international counterparts regarding violence perpetrated against innocent Americans by citizens of their countries? Have you raised this concern with any counterpart(s)? If so, what concerns were raised and when? What was their response?
    2. In light of the Biden-Harris administration’s ending of Remain in Mexico in 2021, what data can you provide suggesting migration from Mexico has been “stemmed” as you were tasked with accomplishing prior to 2024?
    3. In February 2024, the Biden-Harris administration endorsed a proposal that, among other provisions, included a requirement that a few hundred million dollars in unspent funds be used specifically for border wall construction. As noted above, the Biden-Harris administration previously returned $2 billion allocated for the purpose of building a border wall. Did the Biden-Harris administration ever consider reversing course regarding this funding? If not, why not? If so, why has no discernable action been taken to that end?
    4. The Biden-Harris administration has auctioned off some $300 million worth of unused border wall materials for mere pennies on the dollar. Why did the Biden-Harris administration endorse a proposal asking Congress to require them to use hundreds of millions of unspent dollars for border wall construction after deciding to sit on hundreds of millions of dollars’ worth of unused supplies instead of building the wall?

    -30-

    MIL OSI USA News

  • MIL-OSI USA: Latta Presents Paulding County Veteran with Overdue Bronze Star

    Source: United States House of Representatives – Congressman Bob Latta (R-Bowling Green Ohio)

    Congressman Bob Latta (R-OH5) today presented Paulding County Veteran William Young with a Bronze Star for his meritorious service in the U.S. Army during the Vietnam War. Young served as one of the members of the ‘B’ Company, 720th Military Police Battalion, Military Police Brigade.

    This Bronze Star awarded to Young is part of a larger effort by Latta’s office, spearheaded by a group of the members of the ‘B’ Company in their appeal to obtain the Combat Infantry Badge (CIB) to recognize their service during the Vietnam War. After Latta worked alongside the veterans, the Department of the Army concluded the men of ‘B’ Company performed actions essential to the success of the entire 720th MP Battalion during the Vietnam War, and they were recognized with Bronze Stars for their service. 

    Last year, Latta held a ceremony in the U.S. Capitol for 35 Vietnam Veterans to receive their Bronze Stars. To date, 74 Bronze Stars have been awarded to the men of ‘B’ Company. 

    “It was a true honor to present a Bronze Star to Mr. William Young, a Paulding County resident, who honorably served our great nation in the U.S. Army during the Vietnam War,” Latta said. “Mr. Young was trained to be a Military Policeman (MP) but when he arrived in Vietnam, his unit became part of the Bushwhackers whose duties included heading into the jungle to interdict North Vietnamese and Viet Cong troops. And since they were MPs, the Army would not issue them the Combat Infantry Badge. I was pleased to work with the veterans to make sure they received the recognition they deserve – the Bronze Star. We are forever grateful and indebted to our servicemembers for serving and sacrificing for our people and country.”

    Additional background on the Bronze Stars:

    Three years ago, Latta received a copy of a book written by Robert Bogison, entitled Up Close & Personal, that detailed the service and history of ‘B’ Company, 720th Military Police Battalion, 18th Military Police Brigade during the Vietnam War.

    The book came with a letter appealing for assistance with their effort to obtain the Combat Infantry Badge (CIB) to recognize their unique service during the Vietnam War. While they were classified as Military Police during their service, the Battalion unofficially performed infantry missions on the front lines.

    After contacting the U.S. Department of Defense and the Department of the Army to inquire as to the possibility of the group receiving the CIB recognition, officials within the Defense Department undertook an extensive search at multiple personnel records facilities to locate official documentation that could back up claims that the company performed infantry actions. The veterans group also provided documentation for the Army to consider.

    After the Department of the Army concluded ‘B’ Company performed actions essential to the success of the entire 720th MP Battalion during the Vietnam War, it was announced these individuals would be recognized with Bronze Stars for their service.

    MIL OSI USA News

  • MIL-OSI USA: USAF leadership engage allies, partners to counter pacing threat

    Source: United States Air Force

    Headline: USAF leadership engage allies, partners to counter pacing threat

    U.S. Air Force Chief of Staff Gen. David Allvin and Chief Master Sgt. of the Air Force David Flosi are participating in an international Air Force Forum hosted by the Japan Air Self-Defense Force in Tokyo Oct. 14-16.

    MIL OSI USA News

  • MIL-OSI Security: USAF leadership engage allies, partners to counter pacing threat

    Source: United States Air Force

    U.S. Air Force Chief of Staff Gen. David Allvin and Chief Master Sgt. of the Air Force David Flosi are participating in an international Air Force Forum hosted by the Japan Air Self-Defense Force in Tokyo Oct. 14-16.

    MIL Security OSI

  • MIL-OSI USA: Senator Markey Maps Need for Climate Action and Highlights Federal Investments in Massachusetts Climate Resilience, Following Extreme Weather Events Across the Country

    US Senate News:

    Source: United States Senator for Massachusetts Ed Markey

    Calls for more investment in resilient schools and hospitals and for a federal climate emergency declaration

    WATCH: Senator Markey, advocates discuss climate resilience

    Senator Markey joined by City Councilor Gabriela “Gigi” Coletta Zapata; Brian Swett, Boston’s Chief Climate Officer; Dwaign Tyndal, Executive Director of Alternatives for Community and Environment (ACE); and John Walkey, Noemy Rodriguez, and Roseann Bongiovanni from GreenRoots.

    Boston (October 15, 2024) – Senator Edward J. Markey (D-Mass.) today was joined in Boston by local officials and advocates to call for increased federal investment to bolster the climate resilience of regions at risk of sea level rise – exacerbated by devastation from climate change-fueled storms, as well as highlight ongoing resiliency projects in Massachusetts, following two devastating hurricanes in the southeastern United States that are expected to cost $300 billion and have resulted in more than 250 deaths. Senator Markey announced that over the past two years, Boston, Chelsea, and Revere have already secured more than $75 million from the Bipartisan Infrastructure Law and the Inflation Reduction Act for resiliency projects that include building resilient transportation corridors in Roxbury, greening the Chelsea Creek waterfront, and making the MBTA (Massachusetts Bay Transportation Authority) Blue Line more flood resistant. In total, Massachusetts has secured approximately $200 million for climate resiliency projects from those two laws so far. Senator Markey was joined by Brian Swett, Chief Climate Officer for the City of Boston; Boston City Councilor Gabriela Coletta Zapata; Roseann Bongiovanni, Noemy Rodriguez, and John Walkey from GreenRoots; and Dwaign Tyndal, Executive Director of Alternatives for Community and Environment (ACE).

    “If we don’t drive down our emissions as a country, we could see more than six feet of sea level rise by the end of the century. That’s sunny-day flooding in neighborhoods from East Boston to Back Bay. TD Garden wouldn’t be flooded with a sea of fans—it would be flooded by the sea itself. Back Bay will go back to the bay,” said Senator Markey. “Our task is twofold. One, cut climate pollution by ushering in a clean energy revolution unlike any we’ve seen before, dismantling our dependence on fossil fuels. And two, prepare for the future by investing in resilient buildings and strong communities. Thanks in part to the Inflation Reduction Act and the Bipartisan Infrastructure Law, we are well on our way to meet that second goal. In Massachusetts, we don’t wait, we create.”

    “Chelsea and East Boston, the two communities that we serve at GreenRoots, are frontline environmental justice communities that are disproportionately impacted by environmental assault. On a daily basis, environmental justice communities throughout the United States and in the Global South face increased frequency of severe storms, storm surge, sea level rise, drought, heat island impacts, wildfires and much more. We need federal leadership like that of Senator Markey’s to prioritize policies and investments in climate resilience and climate justice, an end to fossil fuel use, and implementing greater renewable, resilient energy,” said Roseann Bongiovanni, Executive Director of GreenRoots.

    “Many of the people here have immigrated as a result of natural disasters in their home countries, and with climate change, we know that natural disasters are only going to be increasing in number. When this happens, we need to ask the questions, ‘Where are we going to go? What is going to happen to us?’ These are the questions and worries that many of us have, not just for East Boston, but all over the country. We are the first generation feeling the effects of climate change and we may be the last generation that can do something about it,” said Noemy Rodriguez, Waterfront Initiative Organizer at GreenRoots.

    “We know that when climate change happens, the least among us are the first affected and the worst affected. We frequently say that people are a paycheck away from disaster. According to FEMA, just an inch of floodwater in a home causes roughly about $25,000 in damages. There are over 400,000 Massachusetts residents living in the hundred-year flood zone which means more than a one in four chance of having a flood during a 30-year mortgage period. If home ownership is the route to generational wealth that we would leave to the next generation, we need to be planning and prepared for this,” said John Walkey, Director of Climate Justice & Waterfront Initiatives.

    “Boston is deeply grateful for Senator Markey’s unwavering leadership in securing critical federal funds that are bolstering our city’s climate resilience. Thanks to our partners in the federal government, Boston has secured over $60 million in grants for coastal resilience projects helping us protect our neighborhoods from rising sea levels and extreme storms. However, with the increasing frequency of extreme weather, much more work remains, and additional funding is essential to fully safeguard our city and its most vulnerable communities,” said Brian Swett, Chief Climate Officer for the City of Boston.

    “We have a moral obligation to move quickly to identify all strategies and tools that are at our disposal to ensure that Boston’s forty-seven-mile coastline is resilient and to protect these residents. I want to thank Senator Markey for his leadership in the Senate, and President Biden’s leadership in securing these necessary federal funds that Boston is now being awarded, which will help protect our communities. This is our next big challenge. We need the resources, capital, and collaboration to adequately protect Boston. We need the vital investments coming down the pike from the federal government in both green and gray infrastructure to protect our future. I am hopeful, with the level of partnership and leadership on display here across all levels of government, advocacy groups and philanthropy, and I know that we will continue to lean in and get it done,” said Boston City Councilor Gabriela “Gigi” Coletta Zapata.

    “This is a reminder, a call to arms, a warning and a reality check. We may have more resources than imagination to deal with this issue. We have all the policy, the information, and the possible solutions. The struggle now is to push beyond our imagination to do what we need to get this done. This is not going to be a part of the political cycle, or fundraising cycles, but part of the continual struggle and persistence that many of us are here today are taking part in,” said Dwaign Tyndal, Executive Director of Alternatives for Community and Environment (ACE).

    The destruction of extreme weather events is disproportionately felt by Black, Brown, low-income, and immigrant communities, who are burdened by historical disinvestment and the compounded effects of legacy pollution and dangerous infrastructure sited in their neighborhoods. Under the Biden-Harris administration, including through the historic Inflation Reduction Act and the Bipartisan Infrastructure Law, federal funding has come to Massachusetts to help prevent the worsening impacts of climate change and support the Commonwealth’s climate resilience efforts, but continued federal investment in resiliency and clean energy will be needed to help avoid worsening disasters and billion-dollar storm recoveries in the future.  

    Senator Markey has been working to ensure that Massachusetts is climate resilient and prepared for extreme weather events, which are only increasing in frequency due to climate change. On October 4, Senator Markey joined Mayor Jennifer Macksey for a briefing on the Hoosic River Flood Mitigation Study, a project that aims to evaluate potential flood risk reduction measures and support development of a new flood mitigation system built with 21st-century engineering standards. Senator Markey led the effort to get the study included in the Water Resources Development Act (WRDA), advocated for $750,000 in funding for the Army Corps of Engineers this year, and has secured $950,000 in the pending appropriations bill for Fiscal Year 2025 (FY25).

    In September, Senator Markey announced a grant of $472 million from the U.S. Department of Transportation (DOT) to the MBTA to fully replace the North Station Draw One Bridge and renovate Platform F at North Station. The grant is the largest federal award the MBTA has won to date. The nearly half a billion-dollar grant will provide critical support for one of MBTA’s top priority projects and a vital transportation asset to MBTA’s north-side operations. It will also support more than 14,500 jobs, make the bridge more climate resilient by bringing it above projected sea-level rise, and lower emissions. 

    In August, on the second anniversary of the historic Inflation Reduction Act, Senator Markey launched his Climate Hub, a centralized site with resources to help stakeholders navigate opportunities from both the Infrastructure Investment and Jobs Act (IIJA) and the Inflation Reduction Act (IRA). Together, these two laws have created the largest and most significant climate and clean energy investments in history, putting the United States on a path to address the climate crisis, repair historic harms to disadvantaged communities, create good-paying union jobs in the clean energy economy, and work towards a Green New Deal future.

    MIL OSI USA News

  • MIL-OSI Video: Army Unveils New Blue Book | U.S. Army

    Source: US Army (video statements)

    About the U.S. Army:

    The Army Mission – our purpose – remains constant: To deploy, fight and win our nation’s wars by providing ready, prompt & sustained land dominance by Army forces across the full spectrum of conflict as part of the joint force.

    Interested in joining the U.S. Army?
    Visit: spr.ly/6001igl5L

    Connect with the U.S. Army online:
    Web: https://www.army.mil
    Facebook: https://www.facebook.com/USarmy/
    X: https://www.twitter.com/USArmy
    Instagram: https://www.instagram.com/usarmy/
    LinkedIn: https://www.linkedin.com/company/us-army
    #USArmy #Soldiers #Military #AUSA2024

    https://www.youtube.com/watch?v=WTE9p7ws_IE

    MIL OSI Video

  • MIL-OSI Security: NAMRU INDO PACIFIC Grows Partnership in Malaysia

    Source: United States INDO PACIFIC COMMAND

    Capt. Andrew Letizia, science director of Naval Medical Research Unit (NAMRU) INDO PACIFIC, has described the command’s collaborations with partner nations as the lifeblood of Navy Medicine’s OCONUS research and development.

    “The best part of my job is sitting down with excellent researchers from a host nation, putting our goals and concepts on paper, designing a project, and then watching the project help meet the needs of the partners as it comes to life,” Letizia explained. “Since I first started playing with Legos many years ago, I have enjoyed building things. Watching NAMRU INDO PACIFIC build new partnerships and strengthen the previous ones brings back that same joy I felt as a kid, making all of the pieces fit together correctly to make a great creation.”

    NAMRU INDO PACIFIC partners with 10 different countries within the area of responsibility (AOR). This network of collaborators continues to grow as the scope of Navy Medicine research expands to meet the ever-evolving needs of U.S. service members. Malaysia, home to many of the U.S. Navy’s partners, is the latest of these countries to see an expansion in collaboration.

    KUALA LUMPUR
    Like many Sailors, Lt. Cmdr. Dawn Weir wakes up early to make her way to the office. Unlike other Sailors, Weir’s walk to work takes her through the bustling metropolis of Kuala Lumpur, the capital of Malaysia. From her office at the U.S. Embassy, she oversees research projects in Malaysia for NAMRU INDO PACIFIC, one of Navy Medicine’s three OCONUS research commands.

    Weir, a microbiologist, is the first person to fill this brand-new billet. NAMRU INDO PACIFIC has been building partnerships within Malaysia for almost 15 years, and Weir is the first active-duty U.S. Sailor stationed in-country.

    “The best part of my job is working with our Malaysian partners,” Weir said, “to foster and strengthen existing collaborative research endeavors, as well as to expand and create new efforts to achieve both their and our research needs and objectives. I also enjoy sharing space and working with my Office of Defense Cooperation and other U.S. Embassy colleagues to support various medical lines of effort and other global health security initiatives.”

    In 2007 NAMRU INDO PACIFIC, then known as NAMRU-2, initiated a partnership with the University of Malaysia. In the years since, the partnership has grown into a much bigger relationship, spanning multiple projects and interoperability.

    “We have been working with [NAMRU INDO PACIFIC] for the past 16 years,” explained Dr. Sazaly Abu Bakar, professor and executive director of the Tropical Infectious Diseases Research & Education Centre (TIDREC) at the University of Malaysia, “and this relationship has really grown over the years. We are now at a transition point that is going to take this relationship to the next level.”

    Part of that next level involves Weir as an active-duty researcher and in-country liaison.

    “We used to have just a few projects,” added Abu Bakar. “Now we have more activities, focused on biomedical research. This shows how the relationship between the two has grown over the years.”

    NAMRU INDO PACIFIC also partners with the National Defense University of Malaysia. Brig. Gen. Mohd Arshil Moideen, dean of the university’s medical facility and defense health division, spoke highly of the partnership.

    “The collaboration includes capacity building in our research, specifically in diagnostic laboratory capabilities,” Moideen explained. “We are currently running a few major research collaborations with tropical disease, as well as entomology studies. Lt. Cmdr. Weir is here specifically for this research cooperation, and this has never happened before. This means that Malaysia is now a significant partner in term of research collaboration.”

    “A permanent NAMRU presence within Malaysia will not only enhance our ability to achieve our mission, but also demonstrates to our Malaysian partners our commitment to continue to work together to enhance health security in the region for years to come,” said Weir. “In my experience thus far, the biggest challenges have been overcoming various administrative challenges often outside of our control that impede the progress of our collaborative research goals and objectives.”

    BORNEO
    NAMRU INDO PACIFIC is also partnering on research in collaboration with The University of Malaysia Sabah, located in the Malaysian state Sabah, which lies on the island of Borneo.

    Borneo is an island east of Kuala Lumpur, and the third largest in the world. It is home to one of the most diverse ecosystems on Earth, with native flora and fauna that includes the world’s biggest flower and world’s smallest elephant. Borneo is also one of the few places where orangutans live in the wild.

    Borneo is also home to East Malaysia, comprised of 2 states and 1 federal territory, the country of Brunei and 5 provinces of Indonesia. The university has over 100 lecturers and more than 500 students, as well as a medical and nursing school.

    “We have a lot of diseases in Sabah,” explained Dr. Yosof Ibrahim, dean of UMS. “The number of research that has been done is limited, because of manpower and expertise. There are a lot more diseases that need to be discovered, identified and to be explored. Sabah has many different ethnicities. We have 32 different ethnicities. This is a challenge. Topography is a challenge. Dialect is a challenge. The way we [in Sabah] live and look at things are very different.

    “This collaboration is beneficial,” Ibrahim added, “not only to NAMRU, but to us. In a way, it opens an avenue for us to expand our research and design what our protective measures should be for rural people. 70 percent of our people are in a rural area. There is a difficulty in access to medical facilities.”

    “Malaysia is rich in culture,” said Weir, “with Malay, Chinese, Indian, and indigenous communities. This diversity fosters a vibrant social scene and a diverse and unique culinary experience! Malaysia is also home to diverse and beautiful landscapes perfect for outdoor activities like hiking, diving, and exploring national parks. I personally love the year-round warm tropical environment. Anyone who is fortunate enough to have the opportunity to visit or work in Malaysia should not pass it up.”

    NAMRU INDO PACIFIC plays an important role in the heath of those in the U.S. Indo-Pacific Command (USINDOPACOM) AOR. One of the most culturally, socially, economically and geopolitically diverse regions, the Asia-Pacific region is home to 38 nations and 60% of the world’s population. More than one-third of these nations are smaller, island nations, where many tropical diseases are prevalent.

    NAMRU INDO PACIFIC collaborates with partners in Singapore, Mongolia, Cambodia, Malaysia, Thailand, Laos, Vietnam, Australia, Papua New Guinea and the U.S. to conduct research efforts throughout the USINDOPACOM area.

    The command’s “hub and spoke” model of operations from its headquarters in Singapore, its wide array partners in the INDOPACOM AOR and the over 375,000 U.S service members stationed in the Pacific allow the NAMRU INDO PACIFIC scientific portfolio to shift, as needed, to align with host nation and sponsor priorities while maintaining focus and efforts on U.S. health security objectives.

    MIL Security OSI

  • MIL-OSI Security: Statement From Pentagon Press Secretary Maj. Gen. Pat Ryder on PRC Military Drills Near Taiwan

    Source: United States INDO PACIFIC COMMAND

    We have closely monitored the People’s Liberation Army (PLA) exercise, JOINT SWORD 2024B, around Taiwan. This military pressure operation is irresponsible, disproportionate, and destabilizing. As the White House noted last week, it is a long-standing tradition for Taiwan’s president to deliver remarks on 10/10. It is a routine, domestic-focused address that has historically prompted little response from the PRC. Still, the PRC has chosen this opportunity to take provocative, military action.
     
    Deterrence remains strong in the Indo-Pacific, and the Department remains confident in its current force posture and operations in the region. The entire world has a stake in peace and stability across the Taiwan Strait, and we continue to see a growing community of countries committed to peace and stability across the Taiwan Strait. We will continue to work with allies and partners to advance our shared vision for a free and open Indo-Pacific, despite the PRC’s destabilizing behavior. The United States remains committed to its longstanding one China policy, guided by the Taiwan Relations Act, the Three Joint Communiqués, and the Six Assurances.

    MIL Security OSI