Category: Natural Disasters

  • MIL-OSI Canada: SIRT Investigating Officer Involved Shooting in Regina

    Source: Government of Canada regional news

    Released on July 22, 2025

    On Friday July 18, 2025, at approximately 10:30 a.m., the Saskatchewan Serious Incident Response Team (SIRT) received a notification from the Regina Police Service (RPS) regarding an officer-involved shooting that had just taken place in Regina. 

    SIRT’s Civilian Executive Director accepted the notification as within SIRT’s mandate and directed an investigation by SIRT.

    On the morning of July 18, plainclothes members of RPS were engaged in a homicide investigation. At approximately 10:08 a.m., members observed a 29-year-old male on a bicycle who was wanted in connection with the investigation. The members requested other RPS units attend the area to assist with re-locating the male after contact had been lost. At approximately 10:12 a.m., the male was located by plainclothes members of RPS in the alley between Garnet Street and Athol Street north of 8th Avenue. Two plainclothes members of RPS exited separate unmarked police vehicles and a confrontation took place between the male and police. During that confrontation, members issued verbal commands to the male. One plainclothes member of RPS discharged a single round from a service pistol, striking the male. 

    RPS immediately called EMS to attend the scene as additional police resources arrived and assessed the male’s injuries. EMS arrived at the scene at approximately 10:17 a.m., and assumed responsibility for the male’s care, pronouncing him deceased at approximately 10:19 a.m. 

    Following the notification, a SIRT team consisting of the Civilian Executive Director and four SIRT investigators deployed to Regina to begin their investigation. A replica firearm was recovered from the scene and has been seized as an exhibit in SIRT’s investigation. 

    SIRT’s investigation will examine the conduct of police during this incident, including the circumstances surrounding the male’s death. RPS will maintain responsibility for the investigation that brought police into contact with the individual. As part of the ongoing investigation, SIRT is asking anyone who directly witnessed or may have video of the incident to contact SIRT at sirt@gov.sk.ca.

    No further information will be released at this time. A final report will be issued to the public within 90 days of the investigation ending.

    SIRT’s mandate is to investigate alleged cases of serious injury, death, sexual assault or interpersonal violence arising from the actions or omissions of on and off-duty police officers, or while an individual is in police custody.

    For updates on SIRT investigations, follow SIRT on X, formerly known as Twitter, at: SIRT_SK.

    -30-

    For more information, contact:

    MIL OSI Canada News

  • MIL-OSI Canada: Prime Minister Carney meets with premiers to remove barriers and advance major projects

    Source: Government of Canada – Prime Minister

    Today, the Prime Minister, Mark Carney, met with provincial and territorial premiers in Huntsville, Ontario.

    The Prime Minister updated the premiers on trade negotiations with the United States. He emphasized that the federal government remains focused on getting the best deal for Canadians. First Ministers are united on this. The Prime Minister also underscored recent federal measures to restrict and reduce steel imports into Canada, protect Canadian steel workers, catalyze domestic steel production, and prioritize the procurement of Canadian steel in government projects.

    First Ministers discussed their ongoing work to get major projects built across the country, strengthening Canada’s economic resilience. To that end, the Prime Minister shared that the Major Federal Projects Office and the Indigenous Advisory Council will be operational by Labour Day – acting as the point of contact for governments, proponents, and communities to submit their proposals. The Prime Minister will continue meeting with key stakeholders over the coming weeks to ensure big projects are built in full partnership with First Nations, Inuit, and Métis, and to build one Canadian economy.

    First Ministers also discussed the wildfire situation across Canada, and the Prime Minister emphasized the federal government’s readiness to mobilize additional resources to protect and support Canadians.

    MIL OSI Canada News

  • MIL-OSI USA: SBA Offers Disaster Relief to Indiana Small Businesses, Private Nonprofits and Residents Affected by Flooding

    Source: United States Small Business Administration

    ATLANTA–The U.S. Small Business Administration (SBA) announced the availability of low interest federal disaster loans for Indiana small businesses, private nonprofits, and residents affected by the flooding occurring June 28-July 2, 2025. The SBA issued a disaster declaration in response to a request received from Gov. Mike Braun on July 11, 2025.

    The disaster declaration covers the counties of Daviess, Dubois, Greene, Knox, Martin and Pike which are eligible for both Physical Damage Loans and Economic Injury Disaster Loans (EIDLs) from the SBA.  

    Small businesses and private nonprofits are eligible to apply for business physical disaster loans and may borrow up to $2 million to repair or replace disaster-damaged or destroyed real estate, machinery and equipment, inventory, and other business assets.  

    Homeowners and renters are eligible to apply for home and personal property loans and may borrow up to $100,000 to replace or repair personal property, such as clothing, furniture, cars, and appliances. Homeowners may apply for up to $500,000 to replace or repair their primary residence.  

    Applicants may also be eligible for a loan increase of up to 20% of their physical damage, as verified by the SBA, for mitigation purposes. Eligible mitigation improvements include strengthening structures to protect against high wind damage, upgrading to wind rated garage doors, and installing a safe room or storm shelter to help protect property and occupants from future damage.  

    “One distinct advantage of SBA’s disaster loan program is the opportunity to fund upgrades reducing the risk of future storm damage,” said Chris Stallings, associate administrator of the Office of Disaster Recovery and Resilience at the SBA. “I encourage businesses and homeowners to work with contractors and mitigation professionals to improve their storm readiness while taking advantage of SBA’s mitigation loans.”

    SBA’s EIDL program is available to small businesses, small agricultural cooperatives and private nonprofit (PNP) organizations with financial losses directly related to the disaster. The SBA is unable to provide disaster loans to agricultural producers, farmers, or ranchers, except for small aquaculture enterprises.

    EIDLs are for working capital needs caused by the disaster and are available even if the business did not suffer any physical damage. They may be used to pay fixed debts, payroll, accounts payable, and other bills not paid due to the disaster.

    Interest rates are as low as 4% for small businesses, 3.625% for PNPs, and 2.813% for homeowners and renters, with terms up to 30 years. Interest does not begin to accrue, and payments are not due, until 12 months from the date of the first loan disbursement. The SBA sets loan amounts and terms, based on each applicant’s financial condition.

    Beginning, Wednesday, July 23, SBA customer service representatives will be on hand at the Disaster Loan Outreach Center in the county of Daviess to answer questions about SBA’s disaster loan program, explain the application process and help individuals complete their application. Walk-ins are accepted, but you can schedule an in-person appointment in advance at appointment.sba.gov.

    The DLOC hours of operation are listed below:

    Disaster Loan Outreach Center (DLOC)

    Daviess County

    Odon Community Center

    311 Park Street

    Odon, Indiana 47562

    Opening: Wednesday, July 23, 10 a.m. to 5 p.m.

    Hours:  Monday – Friday, 8 a.m. to 5 p.m.

    Saturday, 10 a.m. to 2 p.m.

    Closed: Sunday

    Permanently Closing: July 31 at 4 p.m.

    Disaster survivors should not wait to settle with their insurance company before applying for a disaster loan. If a survivor does not know how much of their loss will be covered by insurance or other sources, SBA can make a low-interest disaster loan for the total loss up to its loan limits, provided the borrower agrees to use insurance proceeds to reduce or repay the loan.

    To apply online, visit sba.gov/disaster. Applicants may also call SBA’s Customer Service Center at (800) 659-2955 or email disastercustomerservice@sba.gov for more information on SBA disaster assistance. For people who are deaf, hard of hearing, or have a speech disability, please dial 7-1-1 to access telecommunications relay services.

    The filing deadline to return applications for physical property damage is Sept. 16, 2025. The deadline to return economic injury applications is April 20, 2026.

    ###

    About the U.S. Small Business Administration

    The U.S. Small Business Administration helps power the American dream of business ownership. As the only go-to resource and voice for small businesses backed by the strength of the federal government, the SBA empowers entrepreneurs and small business owners with the resources and support they need to start, grow or expand their businesses, or recover from a declared disaster. It delivers services through an extensive network of SBA field offices and partnerships with public and private organizations. To learn more, visit www.sba.gov. 

    MIL OSI USA News

  • MIL-OSI USA: Chairman Simpson’s FY26 Interior and Environment Appropriations Bill Advances in House Appropriations Committee

    Source: US State of Idaho

    WASHINGTON—Today, the House Committee on Appropriations voted to advance the Fiscal Year 2026 Interior, Environment and Related Agencies Appropriations Bill. Idaho Congressman Mike Simpson–Chairman of the House Interior and Environment Appropriations Subcommittee–released the following statement after the Committee approved the bill.
    “Advancing the Fiscal Year 2026 Interior, Environment, and Related Agencies Act is the next step toward establishing American energy dominance, reversing harmful Biden-era regulations, and ensuring access to, and protection of, our public lands for recreation and hunting. While reducing spending and rightsizing federal agencies, I am proud that this legislation directs critical funding where it is needed most. This includes fully funding the Payment in Lieu of Taxes (PILT) program and prioritizing funding for Indian Country and Wildland Fire Management. I am grateful to Chairman Cole for his leadership, and I am pleased we are one step closer to getting this bill across the finish line,” said Rep. Simpson.
    “With today’s full committee approval, we are taking decisive action to steward America’s natural resources and protect taxpayer dollars. This bill responsibly manages our public lands and recreation, supports wildfire response, reins in wasteful spending, and rolls back Biden-era regulations that hamper American strength and jobs. With a focus on U.S. energy dominance, we bolster our national security and expand access to critical minerals. We also uphold our commitments to Native American communities. Chairman Simpson has guided a measure that delivers results for America’s future, and I commend his work and leadership,” said House Committee on Appropriations Chairman Cole.
    Highlights of the bill include:

    Reduces EPA funding by 23%.
    Expands access to critical minerals.
    Fully funds the PILT program.
    Protects oil and gas production.
    Prohibits rulings used to weaponize the Endangered Species Act against land users and energy producers.
    Prioritizes funding for Tribes and Wildland Fire Management.

    Subcommittee Chairman Simpson’s opening remarks are available here.
    The measure was approved by the Committee with a vote of 33 to 28. 

    MIL OSI USA News

  • MIL-OSI NGOs: Gaza fieldworker: “We are torn apart watching our children suffer from hunger” 

    Source: Amnesty International –

    For over 21 months, the world has been bearing witness to unfathomable levels of death and destruction in the occupied Gaza Strip. Israel’s brutal onslaught against Palestinians in Gaza has killed tens of thousands of people, wiped out entire families, flattened residential neighbourhoods, destroyed critical infrastructure and forcibly displaced nearly the entirety of Gaza’s residents., causing an unprecedented humanitarian catastrophe.

    Amnesty International has been working with trusted, exceptionally professional and dedicated fieldworkers in Gaza. Despite all odds, they have continued to document violations, visit sites of strikes, collect evidence and share stories, all while attempting to protect their families and hang on to what remains of their life under Israel’s ongoing genocide.

    In this moving account, our fieldworker bravely shares how his hopes of a ceasefire have been torn apart. The reality of his life is now truly unbearable. His home has been destroyed, he and his family are facing displacement once again and the little food that is available just isn’t enough. He is hungry, worried and afraid of what’s next...

    When the ceasefire in Gaza was announced, we were overjoyed that we would finally be able to return to our home in the north. We returned on 8 February, but we were more afraid than happy — afraid that our home might have been completely destroyed. Thankfully, it was still standing, though there were some shells that had hit the front of the house and burn marks on the walls. 

    But inside, there was no furniture, none of the clothes we had left behind when we were displaced in October 2023, not even kitchen tools remained. The house had been looted. Still, we stayed. We cleaned and repaired it, bought some basic furniture, adapted to the situation, and lived in it for three months. We struggled to secure drinking water, but at least during the ceasefire we were not waiting for death. The truce was broken, and war came back again to claim what remained of our souls. By then the crossings had been closed, prices soared and goods began to disappear, bit by bit. 

    I planted some vegetables behind the house, like mint, pumpkin, chili peppers, eggplants, and basil, so they would be readily available. But we returned to the bigger struggle — hunger. There was no flour, no food. Overnight, our life turned into hell. 

    Israeli military stormed our neighborhood 

    On 15 May, the Israeli military stormed our neighborhood and began indiscriminately shelling the area. We fled our home under gunfire and shelling, taking nothing with us. We ran into the street and wandered aimlessly down an unknown path. We realized we had returned to the worst suffering — displacement. 

    We took refuge in my daughter’s home in Gaza City. It’s a small home — two rooms, a small living room, and a kitchen. She, her husband, and their two children took one room, and we stayed in the other. 

    After three months of closed crossings, even if flour could be found, its price was unimaginable. To withdraw cash, you have to pay up to 45% commission. For a large family like mine, expenses are extremely high, and many types of food were missing from the markets. We craved many foods, and we hadn’t tasted meat, chicken, or sweets in months. We live through intense famine. 

    We are torn apart watching our children suffer from hunger. There is nothing to sustain life. Life in Gaza has become unlivable. We live in humiliation and degradation. 

    We are being starved 

    Yes, limited aid enters the Strip, but it doesn’t meet the huge needs, and even the drops that get in reach very few people.  

    I am not ashamed to say this publicly: I, like my family and my children, am hungry. 

    I speak the truth as it is. We cannot stand from the pain of hunger. 

    We are not weak — but the war has broken our bones, and the siege has hollowed out our stomachs. 

    We are not beggars. We are people entitled to our human rights. We are people of this land. 

    We are being besieged. We are being starved. 

    I said what I feel — what every home in Gaza feels. Our children are hungry, and we are fighting to survive. Fighting for a single bite of food. Fighting for life. 

    I am a human being. I am a father, a brother, a neighbor. 

    I know people’s pain because I live it every moment. 

    After we were displaced from our home in the north during the latest incursion, the Israeli forces advanced into our neighborhood for a short period and destroyed every house. Our home was among them. It was destroyed savagely. They destroyed our memories in that home, every moment we had lived there for nine years. 

    Nothing remains now 

    We had a beautiful, warm house, full of peace. In front of it was a small piece of land where we planted vegetables, olives, and thyme. We had a room for raising poultry and a spot to sit in at the end of the day. Nothing remains now. No house, no land to plant. 

    We are not only dying from bombings. We are dying from hunger too. 

    Hunger has destroyed homes, made the elderly weep like children, and made bread a dream. 

    We used to criticize the airdropped aid. It was dangerous and ineffective., On some occasions, the airdropped cans caused fatalities. But it turns out that it was more merciful than this current method of distribution, which takes dozens of lives every day. 

    Humiliation. Disgrace. Killing. Thuggery. Blood. Sorrow. Grief. 

    We are walking dead, wrapped in our shrouds. 

    We are not okay. 

    The author’s name has been withheld for security reasons

    CALL TO ACTION: Call for an end to Israel’s genocide against Palestinians in Gaza. Take action here

    MIL OSI NGO

  • MIL-OSI USA: Donalds Fights For Hardworking Floridians: Leads Bicameral Effort To Deliver Much-Needed Flood Insurance Tax Relief

    Source: United States House of Representatives – Representative Byron Donalds (R-FL)

    WASHINGTON – Congressman Byron Donalds (R-FL) has announced the reintroduction of legislation to provide much-needed tax relief for National Flood Insurance Program (NFIP) and private insurance policyholders across Southwest Florida, the Sunshine State, and the nation.

    H.R. 4494 – “The Flood Insurance Relief Act” is the 18th piece of legislation proposed by Congressman Donalds during the 119th Congress. Specifically, this bill combats the rising cost of flood insurance by creating a non-refundable tax deduction for flood insurance premiums.

    Senate Companion bill, S. 2313 – “The Flood Insurance Relief Act” is sponsored by Sen. Rick Scott (R-FL) and co-led by Sen. Ashley Moody (R-FL). Last Congress, the “The Flood Insurance Relief Act” was introduced by Rep. Donalds as H.R. 8102 and by Sen. Rick Scott as S. 4143.

    “For far too long, the rising cost of flood insurance has crushed hardworking Floridians. This is unacceptable, this must change, and this critical issue must be addressed to ensure our economy works for all Americans. The time for action is now, and I’m proud to join Senator Rick Scott in introducing the Flood Insurance Relief Act to provide this overdue relief to policyholders across our Southwest Florida community, the Sunshine State, and the nation,” said Congressman Byron Donalds (R-FL). 

    “Floridians know well that flood insurance can be a crucial but costly asset, and it is unacceptable that many are left struggling to find flood insurance coverage they can afford. Families shouldn’t have to choose between protecting their homes and putting food on the table. I’ve been working on several bills to fix the broken NFIP system and encourage private-sector participation to allow for a more robust, affordable flood insurance market, but we must do more to help families ASAP. My Flood Insurance Relief Act offers a practical way to directly ease the financial burden of flood insurance for families by allowing a tax deduction on their premiums, whether through the NFIP or the private market. I’m glad to have my fellow Floridians Senator Ashley Moody and Congressman Byron Donalds joining me in leading this effort,” said Senator Rick Scott (R-FL).

    “As I travel around the Sunshine State, one thing folks continue to tell me is that they are worried about the rising cost of flood insurance. That is why today, Senator Scott and I are working to ease the financial burden on Florida families by proposing a bill that would create a tax deduction on their flood insurance premiums. The Flood Insurance Relief Act is a critical solution that will directly benefit Floridians, ” said Senator Ashley Moody (R-FL).


    Bill Overview:

    • This bill allows individuals to deduct the cost of qualified flood insurance premiums paid during the year from their taxable income.

    • The deduction applies to premiums, federal policy fees, and surcharges associated with the National Flood Insurance Program and qualifying private flood insurance.

    • This bill limits any individuals who have a gross income (AGI) of more than $200,000 or $400,000 for joint filers from taking this deduction focusing on middle-class families.

    • The deduction applies only to premiums tied to property owned by the taxpayer.


    Bill Background:

    • Flood insurance premiums have been rapidly rising, but are not deductible under federal tax law, despite being a mandatory expense for many homeowners with federally backed mortgages in high-risk flood zones.
    • As we work to restore the economy for all hardworking Americans, providing tax relief for flood insurance premiums helps to alleviate a major financial burden for many Floridians.


    More:

    • Read text of H.R. 4494 – the Donalds “Flood Insurance Relief Act” HERE.
    • See bill profile of H.R. 4494 HERE.
    • Read text of S. 2313 – the Scott “Flood Insurance Relief Act” HERE.
    • See bill profile of S. 2313 HERE.
    • See H.R. 4494 social media graphics BELOW:

    ###

    MIL OSI USA News

  • MIL-OSI Russia: Air India plane’s auxiliary power unit catches fire after landing

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    NEW DELHI, July 22 (Xinhua) — An Air India passenger plane, flight AI-315, operating from Hong Kong to Delhi, caught fire in its auxiliary power unit shortly after landing at Indira Gandhi International Airport in New Delhi, the Indian capital, on Tuesday, officials said.

    The fire was discovered as passengers were preparing to exit the plane.

    Air India said no passengers or crew were injured, but the fire caused some damage to the aircraft itself.

    Another Air India flight from Cochin to Mumbai skidded off the runway while landing on Monday, causing damage to both the plane and the road surface, according to media reports. Last month, an Air India flight to London crashed shortly after takeoff in the city of Ahmedabad, killing all 241 people on board. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI USA: Last Day to Apply for Federal Assistance for April Storms

    Source: US Federal Emergency Management Agency 2

    strong>LITTLE ROCK, Ark. – Homeowners and business owners who had damage from the destructive storms, tornadoes and flooding in Arkansas in April have until 11:59 p.m. Tuesday, July 22, to apply for federal disaster assistance.
    Residents including homeowners, renters and business owners may apply for assistance if your home or business is in Clark, Clay, Craighead, Crittenden, Desha, Fulton, Greene, Hot Spring, Jackson, Miller, Ouachita, Pulaski, Randolph, St. Francis, Saline, Sharp or White County.
    In planning your recovery from the April 2-22 storms, give yourself the widest possible set of options. If you applied for damage or losses after the storms in March, you may apply again for FEMA assistance for uninsured property losses from the April storms. Previous FEMA aid does not affect eligibility for assistance. 
    Loans from the U.S. Small Business Administration also hold many benefits for survivors. SBA loans are not just for businesses. They are the largest source of federal disaster recovery funds for survivors. In a presidentially declared disaster, these long-term, low-interest loans are available to homeowners, renters, businesses of all sizes and nonprofit organizations including houses of worship.
    FEMA has many types of assistance available. FEMA may be able to help with basic home repair costs, personal property loss, and temporary housing while you are unable to live in your home. Repair or replacement assistance may be available for a primary vehicle, a computer damaged in the disaster, or books and other items required for school. 
    To apply for FEMA assistance, go to DisasterAssistance.gov, use the FEMA App for mobile devices or call the FEMA Helpline at 800-621-3362. Lines are open daily from 6 a.m. to 10 p.m. CT and specialists speak many languages. If you use a relay service, captioned telephone or other service, you can give FEMA your number for that service. To view an accessible video on how to apply, visit Three Ways to Apply for FEMA Disaster Assistance – YouTube.
    To apply or to download an SBA application, go to SBA.gov/disaster. You may also call SBA’s Customer Service Center at 800-659-2955 or email DisasterCustomerService@sba.gov.
    Survivors can also submit documents and speak to someone about their FEMA or SBA applications at several sites. To find locations and hours, visit fema.gov/disaster/4873, scroll to the bottom of the page and click the link under “In-person Survivor Assistance.”
    For the latest information about Arkansas’ recovery, visit fema.gov/disaster/4873. Follow FEMA Region 6 on social media at x.com/FEMARegion6 and at facebook.com/FEMARegion6

    MIL OSI USA News

  • MIL-OSI USA: #StopRansomware: Interlock

    News In Brief – Source: US Computer Emergency Readiness Team

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL OSI USA News

  • MIL-OSI Security: Across-the-Board Convictions in Final Highs RICO Trial of 2025

    Source: Office of United States Attorneys

    MINNEAPOLIS – Following an eight-day jury trial, a federal jury convicted two defendants of all charged counts for their involvement in the Highs street gang, announced Acting U.S. Attorney Joseph H. Thompson.

    Defendants Cortez Davon Blakemore, 35, and Robert Lesure, 23, were convicted by a jury of federal RICO conspiracy and conspiracy to distribute controlled substances. A sentencing hearing will be set at a later date. According to court documents and evidence presented at trial, Blakemore and Lesure were long-standing and prolific drug traffickers for the Highs criminal street gang.  They sold fentanyl at the intersection of Broadway and Lyndale in North Minneapolis, which the Highs had taken control of and turned into an open-air drug market. As the jury heard at trial, the Highs is a violent criminal street gang that has long wreaked havoc on North Minneapolis, selling fentanyl and other deadly drugs and enforcing its terorrity through violence, kidnapping, and murder, including the murders of innocent civlians caught in the crossfire. Forty members of the Highs gang were charged in this large RICO indictment. Blakemore and Lesure are the 37th and 38th defendants to be convicted in this case. A final RICO defendant is set to be tried in 2026.

    “These convictions bring justice not just to the victims of the Highs gang, but to an entire community that has endured years of violence, fear, and loss,” said Acting U.S. Attorney Joseph H. Thompson. “For too long, this gang terrorized Minneapolis, maintaining control through chaos. Today, the people of this city get something they’ve long been denied: peace. This case is the result of a relentless federal coalition—the U.S. Attorney’s Office side-by-side with our federal, state, and local law enforcement partners.  Our message is clear: if you endanger our communities, we are coming for you.  And we won’t stop until every neighborhood in this city is free from fear.”

    “This isn’t just another trial; it’s a continuation of our full-court press to dismantle the Highs street gang and hold every last member accountable,” said Travis Riddle, ATF Special Agent in Charge of the St. Paul Field Division. “We’re proud to stand alongside our prosecution and investigative partners who’ve shown unmatched determination, trial after trial, to bring justice to the communities harmed by this violence.”

    “As the summer progresses, Minneapolis is continuing to see a drop in violent crime, especially gun violence throughout the city,” said Minneapolis Police Chief Brian O’Hara.  “The outstanding work of MPD officers and our partnership with the U.S. Attorney’s Office have been instrumental in targeting the small number of individuals committing a disproportionate amount of violence in the city. This conviction is the latest result of efforts that can not only be seen in the reduction of crime, but also felt by the community as we work to rebuild trust.”

    “Our focus isn’t just on the money—it’s on the damage that money fuels,” said Jason Bushey, IRS Acting Special Agent in Charge of the Chicago Field Office. “When violent gangs push drugs and fear into our communities, our agents work relentlessly to expose the money behind the violence. This conviction is the result of that effort and a clear reminder that those who profit from chaos and pain will be held accountable.”

    “In the wake of the guilty verdicts in the Highs gang RICO trial, it becomes abundantly clear that the efficacy of our justice system hinges not merely on the application of law, but on the transformative power of collaborative law enforcement partnerships,” stated FBI Minneapolis Special Agent in Charge Alvin M. Winston, Sr. “These alliances are essential, for they weave a fabric of shared intelligence and resources that fortify our collective resolve against violent crime, ensuring that justice is not merely an ideal, but a tangible reality for our communities.”

    This case is the result of an investigation conducted by the ATF, FBI, Minneapolis Police Department, IRS Criminal Investigation, U.S. Postal Inspection Service, Hennepin County Sheriff’s Office, Minnesota Bureau of Criminal Apprehension, and Minnesota Department of Corrections with the assistance of the U.S. Marshals Service, DEA, Homeland Security Investigation, and the Hennepin County Attorney’s Office. The Ramsey County Sheriff’s Office, Dakota County Sheriff’s Office, St. Paul Police Department, and numerous other law enforcement agencies contributed to the investigation.

    The U.S. Attorney’s Office also is deeply grateful to the Justice Department’s Violent Crime & Racketeering Section (VCRS) for their continued partnership and expertise on this and other ongoing RICO cases. This partnership has been critical to the success of these gang prosecutions.

    Assistant U.S. Attorneys Thomas Calhoun-Lopez, Albania Concepcion, and Carla Baumel tried this case.  They are prosecuting the case along with Attorney Brian Lynch of the Justice Department’s Violent Crime & Racketeering Section. 

    MIL Security OSI

  • MIL-OSI Security: Byrd Gang Member Sentenced for Racketeering, Firearm, and Drug Conspiracies

    Source: US FBI

    NEW ORLEANS, LOUISIANA – SAMUEL MORTON (“MORTON”),a/k/a “Sosa,” age 27, from New Orleans, was sentenced on July 2, 2025, for violations of 18 U.S.C. § 1962(d), conspiracy to violate the Racketeer Influenced and Corrupt Organizations Act, in violation of Title 18, U.S.C. § 1962(d); conspiracy to distribute controlled substances, in violation of Title 21, U.S.C. § 846,; and conspiracy to possess firearms, in violation of Title 18, U.S.C. § 924(o),.

    According to court documents, MORTON was a member of the Byrd Gang, which operated primarily out of the former Magnolia Housing Development in Central City New Orleans. MORTON and other members of this organization and their associates ran a violent drug trafficking ring in and around New Orleans dating back to 2014. Its members daily distributed drugs, including heroin, fentanyl, crack cocaine and marijuana, and always possessed firearms. The gang, and MORTON specifically, committed many acts of violence, often in furtherance of an ongoing feud with its rivals, the Ghost Gang. Numerous individuals have been shot and killed on both sides, and innocent bystanders have also been caught in these retaliatory shootings.

    United States District Judge Milazzo sentenced MORTON to 216 months imprisonment for each count, to be served concurrently, to be followed by 5 years of supervised release. MORTON was also ordered to pay a $300 mandatory special assessment fee.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results. For more information about Project Safe Neighborhoods, please visit Justice.gov/PSN.

    Acting U.S. Attorney Simpson praised the work of the Federal Bureau of Investigation and the New Orleans Police Department. The case is being prosecuted by Assistant United States Attorneys Elizabeth Privitera and Sarah Dawkins of the Violent Crime Unit.

     

    MIL Security OSI

  • MIL-OSI Security: Byrd Gang Member Sentenced for Racketeering, Firearm, and Drug Conspiracies

    Source: US FBI

    NEW ORLEANS, LOUISIANA – SAMUEL MORTON (“MORTON”),a/k/a “Sosa,” age 27, from New Orleans, was sentenced on July 2, 2025, for violations of 18 U.S.C. § 1962(d), conspiracy to violate the Racketeer Influenced and Corrupt Organizations Act, in violation of Title 18, U.S.C. § 1962(d); conspiracy to distribute controlled substances, in violation of Title 21, U.S.C. § 846,; and conspiracy to possess firearms, in violation of Title 18, U.S.C. § 924(o),.

    According to court documents, MORTON was a member of the Byrd Gang, which operated primarily out of the former Magnolia Housing Development in Central City New Orleans. MORTON and other members of this organization and their associates ran a violent drug trafficking ring in and around New Orleans dating back to 2014. Its members daily distributed drugs, including heroin, fentanyl, crack cocaine and marijuana, and always possessed firearms. The gang, and MORTON specifically, committed many acts of violence, often in furtherance of an ongoing feud with its rivals, the Ghost Gang. Numerous individuals have been shot and killed on both sides, and innocent bystanders have also been caught in these retaliatory shootings.

    United States District Judge Milazzo sentenced MORTON to 216 months imprisonment for each count, to be served concurrently, to be followed by 5 years of supervised release. MORTON was also ordered to pay a $300 mandatory special assessment fee.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results. For more information about Project Safe Neighborhoods, please visit Justice.gov/PSN.

    Acting U.S. Attorney Simpson praised the work of the Federal Bureau of Investigation and the New Orleans Police Department. The case is being prosecuted by Assistant United States Attorneys Elizabeth Privitera and Sarah Dawkins of the Violent Crime Unit.

     

    MIL Security OSI

  • MIL-OSI Security: New York Man Sentenced for Conspiring to Traffic Firearms from Maine to New York

    Source: Office of United States Attorneys

    BANGOR, Maine: A Syracuse, New York man was sentenced on Monday in U.S. District Court in Bangor for conspiring to violate federal firearms laws and being a felon in possession of a firearm.

    U.S. District Judge John A. Woodcock, Jr. sentenced Tyquinn Montell Cannon (aka “Q”), 32, to 45 months in prison to be followed by three years of supervised release. Cannon pleaded guilty on June 17, 2024.

    According to court records, beginning in May 2022, Cannon knowingly conspired with others in Maine and New York to illegally obtain firearms at federally licensed firearms dealers (FFLs) in central and southern Maine using straw purchasers. Two of the coconspirators in Maine would arrange for the straw purchase of firearms, and Cannon would deliver, or arrange the delivery of, the illegally obtained firearms to coconspirators in New York. In September 2022, Cannon was found in possession of a Glock .40 caliber pistol, which had earlier been straw purchased at an FFL in Maine. Cannon is prohibited from possessing firearms due to felony drug convictions in Illinois.

    The Bureau of Alcohol, Tobacco, Firearms and Explosives and Massachusetts State Police investigated the case.

    STRAW PURCHASING: A straw purchase is an illegal firearm purchase where the actual buyer of the gun, being unable to pass the required federal background check or desiring to not have his or her name associated with the transaction, uses a proxy buyer who can pass the required background check to purchase the firearm for him/her.

    ###

    MIL Security OSI

  • MIL-OSI USA: Sullivan & Colleagues Seek to Reauthorize Young Fishermen’s Development Program

    US Senate News:

    Source: United States Senator for Alaska Dan Sullivan
    07.22.25
    WASHINGTON—U.S. Senators Dan Sullivan and Lisa Murkowski (both R-Alaska), Ed Markey (D-Mass.), and Roger Wicker (R-Miss.) have introduced bipartisan legislation reauthorizing the Young Fishermen’s Development Act, first signed into law by President Trump in 2021, to continue to mitigate the challenges and hurdles facing the next generation of entrants into the fishing industry. The legislation would authorize $2 million annually through FY 2031 to support regional training opportunities and apprenticeship programs for individuals building their early careers in the fishing industry.
    “Over the last four years, the Young Fishermen’s Development Program has helped reduce the high barriers and costs that too often prevent prospective fishermen from filling the ranks of the fishing sector,” said Senator Sullivan. “We want to ensure the next generation of fishermen can continue utilizing these grants, training opportunities, and apprenticeship programs that will bolster our fishing fleet and maintain Alaska’s status as the global superpower of seafood. I urge my colleagues to join us in reauthorizing this important program that is focused on reversing the ‘greying’ of the fleet, supporting our many coastal communities, and empowering our fishermen to continue sustainably harvesting our world-class seafood.”
    “Fishing is a cornerstone of the Massachusetts economy, and a vital economic driver for the nation, but there are far too many barriers preventing young people from joining the industry,” said Senator Markey. “With this legislation, we are reaffirming our commitment to the next generation of fishermen by working to build their ability to push off the dock into fulfilling careers at sea. I thank my colleagues for their partnership on this bill and will continue to fight for this important program and our fishing communities.”
    “This legislation provides our next generation of fishermen with the resources they need to be successful, and keep Wild Alaska Seafood on tables around the country,” said Senator Murkowski. “The Young Fishermen’s Development Act equipped our next generation of fishermen with important education, hands-on training, and financial resources. I thank Senator Sullivan for his advocacy on this issue, and look forward working alongside him to reauthorize the YFDA and ensure these benefits continue to be realized by young Alaskans.”
    “The fishing industry is crucial to the economic success of coastal Mississippi,” said Senator Wicker. “The Young Fishermen’s Development Act encourages future generations of anglers to take advantage of opportunities to perfect their skills. Fishermen of all ages should have the resources to be successful.”
    “The Fishing Communities Coalition and our members from across the country are deeply grateful to Senator Sullivan and the bipartisan, multi-coastal, bicameral cosponsors of this legislation for their commitment to the continued success of the Young Fishermen’s Development Program,” said Noah Oppenheim, coordinator of the Fishing Communities Coalition. “The nation’s community-based commercial fisheries have benefitted from this small but mighty program through enhanced workforce development and safety training opportunities. The reauthorization of this program will support hundreds of additional early-career fishermen as they begin working in America’s oldest profession. Five years ago President Trump signed the original Young Fishermen’s Development Act into law, and we look forward to supporting this bill as it advances through Congress and lands on his desk once again.”
    “Commercial fishing is an inherently dangerous way of life, with the challenges only increasing as our oceans warm and storms intensify,” said Linda Behnken, executive director of the Alaska Longline Fishermen’s Association. “To be successful, young fishermen need a host of skills. Senator Sullivan’s support for the YFDA funds that skill building, providing the boost our young bloods need to succeed.”
    “This program has support from across the political spectrum because it’s about investing in American jobs and food security,” said Michelle Stratton, executive director of FCC founding member Alaska Marine Conservation Council. “Senator Sullivan and Senator Murkowski’s strong support for the YFDA five years ago recognized the importance of our domestic fishing fleet. Their support today is a reaffirmation of their commitment to ensuring future generations of harvesters and fishing communities can thrive for generations to come.”
    The fishing industry employs more individuals than any other industry in Alaska. However, barriers such as high costs to enter a fishery, financial risk, and limited entry-level opportunities make it difficult for young men and women to gain access to the fishing industry.
    Senator Sullivan’s legislation would:
    Provide training, education, outreach, and technical assistance initiatives for young fishermen entering the industry.
    Authorize competitive grants to support new and established local and regional training, education, outreach, and technical assistance initiatives for young fishermen, including programs, workshops, and fishing related services.
    Authorize $2 million annually for program funding.
    Congressman Nick Begich (R-Alaska) has led the introduction of companion legislation in the House.

    MIL OSI USA News

  • MIL-OSI USA: Sullivan & Colleagues Seek to Reauthorize Young Fishermen’s Development Program

    US Senate News:

    Source: United States Senator for Alaska Dan Sullivan

    07.22.25

    WASHINGTON—U.S. Senators Dan Sullivan and Lisa Murkowski (both R-Alaska), Ed Markey (D-Mass.), and Roger Wicker (R-Miss.) have introduced bipartisan legislation reauthorizing the Young Fishermen’s Development Act, first signed into law by President Trump in 2021, to continue to mitigate the challenges and hurdles facing the next generation of entrants into the fishing industry. The legislation would authorize $2 million annually through FY 2031 to support regional training opportunities and apprenticeship programs for individuals building their early careers in the fishing industry.

    “Over the last four years, the Young Fishermen’s Development Program has helped reduce the high barriers and costs that too often prevent prospective fishermen from filling the ranks of the fishing sector,” said Senator Sullivan. “We want to ensure the next generation of fishermen can continue utilizing these grants, training opportunities, and apprenticeship programs that will bolster our fishing fleet and maintain Alaska’s status as the global superpower of seafood. I urge my colleagues to join us in reauthorizing this important program that is focused on reversing the ‘greying’ of the fleet, supporting our many coastal communities, and empowering our fishermen to continue sustainably harvesting our world-class seafood.”

    “Fishing is a cornerstone of the Massachusetts economy, and a vital economic driver for the nation, but there are far too many barriers preventing young people from joining the industry,” said Senator Markey. “With this legislation, we are reaffirming our commitment to the next generation of fishermen by working to build their ability to push off the dock into fulfilling careers at sea. I thank my colleagues for their partnership on this bill and will continue to fight for this important program and our fishing communities.”

    “This legislation provides our next generation of fishermen with the resources they need to be successful, and keep Wild Alaska Seafood on tables around the country,” said Senator Murkowski. “The Young Fishermen’s Development Act equipped our next generation of fishermen with important education, hands-on training, and financial resources. I thank Senator Sullivan for his advocacy on this issue, and look forward working alongside him to reauthorize the YFDA and ensure these benefits continue to be realized by young Alaskans.”

    “The fishing industry is crucial to the economic success of coastal Mississippi,” said Senator Wicker. “The Young Fishermen’s Development Act encourages future generations of anglers to take advantage of opportunities to perfect their skills. Fishermen of all ages should have the resources to be successful.”

    “The Fishing Communities Coalition and our members from across the country are deeply grateful to Senator Sullivan and the bipartisan, multi-coastal, bicameral cosponsors of this legislation for their commitment to the continued success of the Young Fishermen’s Development Program,” said Noah Oppenheim, coordinator of the Fishing Communities Coalition. “The nation’s community-based commercial fisheries have benefitted from this small but mighty program through enhanced workforce development and safety training opportunities. The reauthorization of this program will support hundreds of additional early-career fishermen as they begin working in America’s oldest profession. Five years ago President Trump signed the original Young Fishermen’s Development Act into law, and we look forward to supporting this bill as it advances through Congress and lands on his desk once again.”

    “Commercial fishing is an inherently dangerous way of life, with the challenges only increasing as our oceans warm and storms intensify,” said Linda Behnken, executive director of the Alaska Longline Fishermen’s Association. “To be successful, young fishermen need a host of skills. Senator Sullivan’s support for the YFDA funds that skill building, providing the boost our young bloods need to succeed.”

    “This program has support from across the political spectrum because it’s about investing in American jobs and food security,” said Michelle Stratton, executive director of FCC founding member Alaska Marine Conservation Council. “Senator Sullivan and Senator Murkowski’s strong support for the YFDA five years ago recognized the importance of our domestic fishing fleet. Their support today is a reaffirmation of their commitment to ensuring future generations of harvesters and fishing communities can thrive for generations to come.”

    The fishing industry employs more individuals than any other industry in Alaska. However, barriers such as high costs to enter a fishery, financial risk, and limited entry-level opportunities make it difficult for young men and women to gain access to the fishing industry.

    Senator Sullivan’s legislation would:

    • Provide training, education, outreach, and technical assistance initiatives for young fishermen entering the industry.
    • Authorize competitive grants to support new and established local and regional training, education, outreach, and technical assistance initiatives for young fishermen, including programs, workshops, and fishing related services.
    • Authorize $2 million annually for program funding.

    Congressman Nick Begich (R-Alaska) has led the introduction of companion legislation in the House.

    MIL OSI USA News

  • MIL-OSI USA: Sullivan & Colleagues Seek to Reauthorize Young Fishermen’s Development Program

    US Senate News:

    Source: United States Senator for Alaska Dan Sullivan

    07.22.25

    WASHINGTON—U.S. Senators Dan Sullivan and Lisa Murkowski (both R-Alaska), Ed Markey (D-Mass.), and Roger Wicker (R-Miss.) have introduced bipartisan legislation reauthorizing the Young Fishermen’s Development Act, first signed into law by President Trump in 2021, to continue to mitigate the challenges and hurdles facing the next generation of entrants into the fishing industry. The legislation would authorize $2 million annually through FY 2031 to support regional training opportunities and apprenticeship programs for individuals building their early careers in the fishing industry.

    “Over the last four years, the Young Fishermen’s Development Program has helped reduce the high barriers and costs that too often prevent prospective fishermen from filling the ranks of the fishing sector,” said Senator Sullivan. “We want to ensure the next generation of fishermen can continue utilizing these grants, training opportunities, and apprenticeship programs that will bolster our fishing fleet and maintain Alaska’s status as the global superpower of seafood. I urge my colleagues to join us in reauthorizing this important program that is focused on reversing the ‘greying’ of the fleet, supporting our many coastal communities, and empowering our fishermen to continue sustainably harvesting our world-class seafood.”

    “Fishing is a cornerstone of the Massachusetts economy, and a vital economic driver for the nation, but there are far too many barriers preventing young people from joining the industry,” said Senator Markey. “With this legislation, we are reaffirming our commitment to the next generation of fishermen by working to build their ability to push off the dock into fulfilling careers at sea. I thank my colleagues for their partnership on this bill and will continue to fight for this important program and our fishing communities.”

    “This legislation provides our next generation of fishermen with the resources they need to be successful, and keep Wild Alaska Seafood on tables around the country,” said Senator Murkowski. “The Young Fishermen’s Development Act equipped our next generation of fishermen with important education, hands-on training, and financial resources. I thank Senator Sullivan for his advocacy on this issue, and look forward working alongside him to reauthorize the YFDA and ensure these benefits continue to be realized by young Alaskans.”

    “The fishing industry is crucial to the economic success of coastal Mississippi,” said Senator Wicker. “The Young Fishermen’s Development Act encourages future generations of anglers to take advantage of opportunities to perfect their skills. Fishermen of all ages should have the resources to be successful.”

    “The Fishing Communities Coalition and our members from across the country are deeply grateful to Senator Sullivan and the bipartisan, multi-coastal, bicameral cosponsors of this legislation for their commitment to the continued success of the Young Fishermen’s Development Program,” said Noah Oppenheim, coordinator of the Fishing Communities Coalition. “The nation’s community-based commercial fisheries have benefitted from this small but mighty program through enhanced workforce development and safety training opportunities. The reauthorization of this program will support hundreds of additional early-career fishermen as they begin working in America’s oldest profession. Five years ago President Trump signed the original Young Fishermen’s Development Act into law, and we look forward to supporting this bill as it advances through Congress and lands on his desk once again.”

    “Commercial fishing is an inherently dangerous way of life, with the challenges only increasing as our oceans warm and storms intensify,” said Linda Behnken, executive director of the Alaska Longline Fishermen’s Association. “To be successful, young fishermen need a host of skills. Senator Sullivan’s support for the YFDA funds that skill building, providing the boost our young bloods need to succeed.”

    “This program has support from across the political spectrum because it’s about investing in American jobs and food security,” said Michelle Stratton, executive director of FCC founding member Alaska Marine Conservation Council. “Senator Sullivan and Senator Murkowski’s strong support for the YFDA five years ago recognized the importance of our domestic fishing fleet. Their support today is a reaffirmation of their commitment to ensuring future generations of harvesters and fishing communities can thrive for generations to come.”

    The fishing industry employs more individuals than any other industry in Alaska. However, barriers such as high costs to enter a fishery, financial risk, and limited entry-level opportunities make it difficult for young men and women to gain access to the fishing industry.

    Senator Sullivan’s legislation would:

    • Provide training, education, outreach, and technical assistance initiatives for young fishermen entering the industry.
    • Authorize competitive grants to support new and established local and regional training, education, outreach, and technical assistance initiatives for young fishermen, including programs, workshops, and fishing related services.
    • Authorize $2 million annually for program funding.

    Congressman Nick Begich (R-Alaska) has led the introduction of companion legislation in the House.

    MIL OSI USA News

  • MIL-OSI Security: Clewiston Felon Sentenced To Prison For Unlawfully Possessing Firearm

    Source: Office of United States Attorneys

    Fort Myers, Florida – U.S. District Judge Sheri Polster Chappell has sentenced Jose Ignacio Carrizalez III (27, Clewiston) to seven years in federal prison for possessing a firearm as a previously convicted felon. Carrizalez pleaded guilty on March 12, 2025.

    According to court documents, on April 12, 2024, law enforcement executed a search warrant at Carrizalez’s residence after he sold a firearm to a confidential informant and offered to sell another one. During the execution of the search warrant, law enforcement seized multiple firearms, assorted ammunition, and a “switch” designed for use in converting a semi-automatic pistol into a machine gun. Carrizalez is a convicted felon and is therefore prohibited from possessing firearms or ammunition under federal law.

    This case was investigated by the Bureau of Alcohol, Tobacco, Firearms and Explosives and the Hendry County Sheriff’s Office. It was prosecuted by Assistant United States Attorney Patrick L. Darcey.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    MIL Security OSI

  • MIL-OSI Analysis: No wonder England’s water needs cleaning up – most sewage discharges aren’t even classified as pollution incidents

    Source: The Conversation – UK – By Alex Ford, Professor of Biology, University of Portsmouth

    oneSHUTTER oneMEMORY/Shutterstock

    England’s privatised water industry may one day be considered a textbook case study of failed corporate responsibility, regulation and governance. The Cunliffe review, the recent report into England’s privatised water industry, concluded that the financial regulator, OfWat, needs to be disbanded and a new water regulator will be introduced.

    For that to work effectively, better pollution monitoring and more clearly defined pollution incident criteria are essential. While politicians and water companies have claimed to be reducing pollution incidences, they might not strictly be tackling sources of pollution, so communications must be carefully scrutinised for disinformation.

    The UK’s environment minister Steve Reed MP has described the water industry as “broken”. The public have rising water bills. Water companies owe over £60 billion in debts and have left the country with uncertain water security in the face of climate change.

    The Environment Agency (EA) in England recently announced that serious pollution incidents in 2024 rose by 60% to 75 from 47 in the previous year. The EA classifies pollution incidents using a four-point scale called the common incident classification scheme. Trained EA officers consider the evidence reported via their incident hotline to assess its credibility and severity.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    Category 1 is for major incidents, 2 for significant, 3 for minor incidents and 4 for no impact. Category 1 and 2 typically involve visible signs of dead fish floating. For salmon, if more than 10 adult or 100 young fish are dead, this is category 1. With fewer than ten adult and 100 young fish dead, it’s category 2.

    No dead fish, no serious problem? The EA can also record damage on protected habitats as “pollution incidents” but these are harder to substantiate without investigative research that takes time and money.

    Last year, more than 450,000 sewage discharges were recorded by event duration monitors. These are devices fitted to the end of overflow pipes that indicate when and for how long they have been discharging.

    These discharges represent 3.6 million hours of untreated sewage going into our rivers and coasts. These contain chemical contaminants including pharmaceuticals, detergents and human pathogens. Only 75 incidents were recorded as serious or significant in 2024. Another 2,726 were classed as minor.

    So lots of sewage discharges are not being classified as pollution incidents, despite containing pollutants. The EA advises its investigating officers to “record substantiated incidents that result in no environmental impact, or where the impact cannot be confirmed, as a category 4”.

    The EA has been criticised for turning up late to 74% of category 1 and 2 pollution incidents and for being pressured to ignore low-level pollution – all claims that they have denied. However, they admit they are constrained by finances. Any new regulator must be adequately resourced and independent.

    Pollution isn’t always classified as an official pollution incident.
    YueStock/Shutterstock

    In their recent report into pollution incidences, the EA states that they respond to all category 1 and 2 (serious and significant) water industry incidents and will be increasing their attendance at category 3 (minor) incidents. They highlight that more inspections will identify more issues. This shows some acceptance that the more incidents they attend, the more would be substantiated or recorded appropriately.

    Most sewage discharges would not have been reported to, or recorded by, the EA as pollution incidents because they were permitted discharges from combined stormwater overflows. Water companies are allowed to discharge untreated wastewater under exceptional rainfall or snowfall conditions to prevent sewage backing up through the pipes.

    Extra water flow in rivers from rainfall is meant to dilute chemical contaminants in wastewater. However, some discharges can last days or weeks. The EA is currently investigating whether water companies have been breaching their permits and discharging untreated wastewater when there is low or even no rainfall.

    What counts as pollution?

    The UN classifies pollution as “presence of substances and energy (for example, light and heat) in environmental media (air, water, land) whose nature, location, or quantity produces undesirable environmental effects”. This definition differs markedly from the EA’s working definition of pollution incidents.

    Many sewage discharges containing low concentrations of pollutants won’t kill fish but might still be harmful to fish larvae or small insects, for example.

    However, the broad picture from EA data is that invertebrate communities at least are in a better state than they were three decades ago before wastewater treatment plants were upgraded following the EU’s Urban Wastewater Directive.

    Some pollutants bioaccumulate through the food chain, so they become concentrated in top predators such as orcas. Some chemicals mimic reproductive hormones even in low concentrations and can feminise fish, for example. High levels of nutrients from agriculture and sewage in rivers can cause fungal diseases in seagrass meadows.

    Other families of chemicals build up in wildlife and people, such as persistent “forever chemicals”, much of which comes from wastewater discharges. Continued discharges of antibiotics into waterways might not be classified as pollution incidents but still pose a substantial risk to human and ecosystem health through bacteria developing antibiotic resistance.

    The government has just committed to cut sewage pollution by 50% by December 2029 based on 2024 data. But it’s not yet clear whether these involve cutting the frequency of discharges, the duration or both.

    This data could also be manipulated so that a large number of small discharges can be consolidated into one official discharge event. Currently, the volume of discharges from stormwater overflows isn’t known. Without this vital data we can’t ascertain the risk posed by their contaminants.


    Don’t have time to read about climate change as much as you’d like?

    Get a weekly roundup in your inbox instead. Every Wednesday, The Conversation’s environment editor writes Imagine, a short email that goes a little deeper into just one climate issue. Join the 45,000+ readers who’ve subscribed so far.


    Alex Ford receives funding from the Natural Environment Research Council (NERC), EU, charities and industry including water companies.

    ref. No wonder England’s water needs cleaning up – most sewage discharges aren’t even classified as pollution incidents – https://theconversation.com/no-wonder-englands-water-needs-cleaning-up-most-sewage-discharges-arent-even-classified-as-pollution-incidents-261502

    MIL OSI Analysis

  • MIL-OSI Analysis: As Sri Lanka’s economy pivots from tourism, it’s well placed to benefit from global trade and geopolitical jostling – new research

    Source: The Conversation – UK – By Hemamali Tennakoon, Senior Lecturer in Strategy and Management, Brunel University of London

    Dmytro Buianskyi/Shutterstock

    With its natural beauty, wildlife and culture, Sri Lanka is known as the “pearl of the Indian Ocean”, and attracts millions of tourists every year.

    But my research suggests that the country might not be so reliant on tourism in the future, as it looks to become a major player in global maritime trade. The island’s numerous harbours and enviable location along international sea routes have led to major investment from China and the US, as they seek to extend their strategic influence in the region.

    That investment is being welcomed after years of economic and political turmoil in Sri Lanka.

    The Easter bombings of 2019 targeted Catholic churches and hotels, killing 269 people and devastating tourism. The same year, significant tax cuts slashed government revenue before COVID did serious damage to the economy.

    In 2021, a ban on chemical fertilisers led to nationwide agricultural failure, while excessive borrowing and money printing triggered soaring inflation, which peaked at 70% in August 2022. The country ended up failing to pay its foreign debts.

    Following huge protests in 2022 and the resignation of the president, Sri Lanka began a major political and economic shift. It secured a bailout from the International Monetary Fund and implemented reforms aimed at stabilising the economy.

    So far, some of the effects have been positive. Inflation has eased, investor confidence has improved and more tea, clothing and rubber products are being exported up.

    Key to this has been improved logistics and port infrastructure. Business at the port of Colombo, the country’s largest, is booming, aided in part by global shipping disruptions, including the Red Sea crisis, which rerouted vessels through the Indian Ocean.

    But international maritime ambitions can be a complex affair, and Sri Lanka needs to be wary of becoming just a well-positioned commodity for the world’s economic superpowers.

    China for example, has secured a controversial 99-year lease of Hambantota port. India, wary of Chinese encroachment, has ramped up its own investments, including the development of a container terminal in Colombo.

    In 2023, the US announced a US$500 million (£372 million) plan to develop a deep-water shipping container terminal at the port of Colombo. And the potential US tariffs of 30% on imports from Sri Lanka have been interpreted by some as a pressure tactic to get greater access to its waters.

    Balancing these interests is a delicate act. While foreign investment is crucial for infrastructure development, Sri Lanka needs to protect its sovereignty and ensure that port operations serve national, not just international, interests.

    My research suggests that one way of building a resilient and diverse Sri Lankan economy would be to focus on its surrounding waters. Sri Lanka’s vast “exclusive economic zone”, an area of sea where it controls marine resources, holds massive untapped potential.

    Blue economy

    This potential lies in traditional sectors like fisheries and tourism, but also emerging industries such as marine biotechnology.

    This growing field offers opportunities in things like bioengineering and marine-based pharmaceuticals. With other countries rapidly advancing in these sectors, Sri Lanka is well-positioned to follow suit and become a regional leader in the blue economy (economic activities associated with the sustainable use of ocean resources).

    Business is booming in the port of Colombo.
    shutterlk/Shutterstock

    But there is still a complex web of geopolitical interests and economic pressures to navigate, as well as environmental challenges.

    At the moment for example, the Sri Lankan government is making plans for the deep natural port at Trincomalee to become a major marine repair and refuelling centre between Dubai and Singapore. Other proposed projects include offshore wind farms and oil rig facilities.

    The country also needs to compete with the likes of Malaysia, which is investing heavily in AI-driven port operations. To stay competitive, Sri Lanka must modernise infrastructure and streamline processes.

    And despite the progress, challenges persist. Poverty in Sri Lanka has doubled since 2021, while youth unemployment remains high.

    Sri Lanka faces rising maritime threats like piracy and illegal fishing, requiring stronger maritime surveillance. Simultaneously, port expansion risks damaging marine ecosystems. Green technologies and stricter environmental regulations are essential for long-term security and sustainability.

    Sri Lanka’s strategic location and maritime heritage offer a foundation for economic renewal. With wise governance, sustainability, and balanced geopolitics, its ports could once again become vital gateways to regional prosperity and global trade.

    Hemamali Tennakoon does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. As Sri Lanka’s economy pivots from tourism, it’s well placed to benefit from global trade and geopolitical jostling – new research – https://theconversation.com/as-sri-lankas-economy-pivots-from-tourism-its-well-placed-to-benefit-from-global-trade-and-geopolitical-jostling-new-research-261231

    MIL OSI Analysis

  • MIL-OSI Analysis: Hosepipe ban survival guide: which garden plants to save and which to sacrifice

    Source: The Conversation – UK – By Alastair Culham, Associate Professor of Botany, University of Reading

    Studio 37/Shutterstock

    With hosepipe bans in force across several English regions and more restrictions likely to follow, gardeners face some tough choices. When every drop counts, which plants deserve your precious water from the water butt, and which should you leave to fend for themselves?

    As someone who has researched how British gardeners need to adapt to respond to our changing climate, I can tell you that not all garden plants are created equal when it comes to water needs. Some plants will bounce back from a summer scorching, while others may never recover.

    Top plants to prioritise for watering

    1. New woody plants

    Any woody plant installed in the last 12-18 months should be your absolute priority. These haven’t yet developed the deep root systems needed to find moisture reserves and going without enough water the first year or so after planting could kill them.

    Water thoroughly and add a deep mulch of wood chips to help the soil hold water. For young trees you can install a watering bag around the trunk but you still need to top it up.

    2. Hydrangeas

    Hydrangeas adopt a conservative strategy when it comes to drought. They shut their stomata (leaf pores) rapidly when they sense dry soil, and keep them closed until consistent moisture returns. They often drop their leaves too.

    This can mean many weeks without growth, after even a relatively short drought period. So if you want to keep them looking at their best, they need consistent watering. You can cut growth back to reduce water loss, and save the the plant at the cost of flowers.

    Hydrangeas need help during a drought.
    savitskaya iryna/Shutterstock

    3. Moisture loving trees

    Japanese maples (Acer palmatum), along with other moisture-loving trees like birch and beech, are prone to serious die-back during summer droughts. Their shallow root systems and large leaves make them particularly vulnerable to water stress. Water and mulch them.

    4. Soft herbaceous plants

    Astilbe, dicentra, filipendula, heuchera, primula, trollius and many other soft herbaceous plants require good moisture levels and may not survive prolonged drought.

    5. Shallow-rooted shrubs

    Rhododendrons and azaleas are shallow-rooted shrubs particularly susceptible to drought stress, especially the large-leaved evergreen species which are also prone to wind damage when stressed.

    6. Clematis

    Many clematis varieties struggle with drought. Since they’re often grown for their spectacular flowering displays, maintaining adequate moisture around the roots is crucial, especially for autumn-flowering varieties, or spring-flowering varieties which flower on the previous year’s growth.

    A gravel mulch can help keep the roots cool and damp. However, clematis orientalis, terniflora, and evergreens such as C. cirrhosa can be surprisingly tolerant of a hot dry period.

    7. Ripening vegetables

    If you’re growing vegetables, prioritise crops approaching harvest and those that split when moisture returns after drought, such as carrots. Runner beans and courgettes need moist soil to keep cropping and potato yields are heavily influenced by water levels.

    8. All the pots

    Anything in pots has limited access to soil moisture reserves and will need regular attention. Move containers to shadier spots if possible. Always use a pot saucer to hold water and prevent it draining away.

    Plants that can survive without extra water

    Research into plant water-stress shows that many common garden plants are surprisingly resilient.

    Forsythia adopts a risk-taking strategy. It keeps growing and photosynthesising even when soil moisture becomes limited, gambling that it can regrow after damage. This makes it remarkably drought-tolerant. It is also tolerant of heavy pruning which can save it in severe conditions.

    Mediterranean shrubs like lavender, rosemary, sage and thyme are naturally adapted to dry conditions. Their grey, hairy or waxy leaves are evolved to conserve moisture. Soil conditions are crucial though. If the plants are deep rooted they will draw water up, but if your soil is shallow or compacted they might well be less drought tolerant.

    Sedums, sempervivums and other succulents store water in their fleshy leaves and can survive extended dry periods. RHS research identifies Sedum spectabile as particularly reliable under stress.

    Buddleja can cope better than you might think in dry spells.
    Steidi/Shutterstock

    Ornamental grasses generally have efficient root systems and many species actually prefer drier conditions once established.

    Established shrubs including cistus, phlomis, buddleja, cotoneaster, berberis and viburnum have deep roots and proven track records for drought survival. The RHS report identifies these as garden stalwarts, with high stress resilience.

    Some trees, including eucalyptus, bay (Laurus nobilis) and holm oak are remarkably drought tolerant.

    Those to sacrifice

    Grass lawns are thirsty and can be left to go dormant. If you have a newly seeded or turfed lawn from this year, some limited watering may be justified. But in general, embrace the golden colour of water-stressed lawns. As long as you don’t create too many bare patches from over-use, the green colour and growth will come back when it rains.

    Annual bedding plants like busy lizzies and begonias have shallow root systems and high water demands. However, they are only there for one season and are easily replaceable, so prioritise them for watering only if they’re particularly important to your garden’s summer display and you can spare the water. You could save some by potting them up and enjoying a display that needs less water.

    When you do water, research shows that technique is crucial. Water thoroughly but less frequently to encourage deep root growth. Focus water at the base of plants rather than on leaves, and water in early morning or evening to reduce evaporation.

    Consider “split-root” watering for established shrubs – water one side of the plant thoroughly, then switch to the other side two to three weeks later. This keeps plants hydrated while chemical signals from the dry side’s roots prevent excessive new growth that would increase water demands.

    This drought is a taste of Britain’s gardening future. The plants struggling most in this year’s drought are likely to become increasingly unsuitable for British gardens without intensive irrigation.

    Be willing to swap out plants that suffer in drought for new plants that are more tolerant. Refresh plantings to adapt to the new climate.


    This article features references to books that have been included for editorial reasons, and may contain links to bookshop.org. If you click on one of the links and go on to buy something from bookshop.org The Conversation UK may earn a commission.

    Alastair Culham is affiliated with the Royal Horticultural Society through the RHS Science & Collections Group as a voluntary member. Opinions expressed here are his and do not represent the RHS.

    ref. Hosepipe ban survival guide: which garden plants to save and which to sacrifice – https://theconversation.com/hosepipe-ban-survival-guide-which-garden-plants-to-save-and-which-to-sacrifice-261603

    MIL OSI Analysis

  • MIL-OSI Analysis: Farewell to summer? ‘Haze’ and ‘trash’ among Earth’s new seasons as climate change and pollution play havoc

    Source: The Conversation – UK – By Felicia Liu, Lecturer (Assistant Professor) in Sustainability, University of York

    Throughout history, people have viewed seasons as relatively stable, recurrent blocks of time that neatly align farming, cultural celebrations and routines with nature’s cycles. But the seasons as we know them are changing. Human activity is rapidly transforming the Earth, and once reliable seasonal patterns are becoming unfamiliar.

    In our recent study, we argue that new seasons are surfacing. These emergent seasons are entirely novel and anthropogenic (in other words, made by humans).

    Examples include “haze seasons” in the northern and equatorial nations of south-east Asia, when the sky is filled with smoke for several weeks. This is caused by widespread burning of vegetation to clear forests and make way for agriculture during particularly dry times of year.

    Or there is the annual “trash season”, during which tidal patterns bring plastic to the shores of Bali, Indonesia, between November and March.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    At the same time, some seasons are disappearing altogether, with profound consequences for ecosystems and cultures. These extinct seasons can encompass drastically altered or terminated migratory animal behaviour, such as the decline of seabird breeding seasons in northern England.

    Climate change is also calling time on traditional winter sport seasons by making snow scarcer in alpine regions.

    Nature’s new rhythms

    Perhaps more common are “syncopated seasons”. The changes are akin to new emphases on beats or off-beats in familiar music that capture the listener’s attention.

    Syncopated seasons include hotter summers and milder winters in temperate climates, with increasingly frequent and severe extreme weather that exposes more people and ecosystems to stress.

    The timings of key seasonal events, like when leaves fall or certain migratory species arrive, are becoming more unpredictable. We coined the term “arrhythmic seasons”, a concept borrowed from cardiology, to refer to abnormal rhythms which include earlier springs or breeding seasons, longer summers or growing seasons, and shorter winters or hibernating seasons.

    Changing seasonal patterns throw the interdependent life cycles of plants and animals out of sync with each other, and disrupt the communities that are economically, socially and culturally dependent on them.

    In northern Thailand, human activity has reshaped nature’s rhythms and affected the supply of water and food in turn. Communities along the Mekong river’s tributaries have relied on the seasonal flow of rivers to fish and farm for generations.

    At first, upstream dams disrupted these cycles by blocking fish migration and preventing the accumulation of sediment that farms need for soil. More recently, climate change has shifted rainfall patterns and made dry seasons longer and rainy seasons shorter but more intense, bringing fires and further uncertainty to farmers.

    Let’s rethink time

    How we react to changing seasonal patterns can either worsen or improve environmental conditions. In south-east Asia, public awareness of the “haze season” has led to better forecasting, the installation of air filters in homes and the establishment of public health initiatives.

    These efforts help communities adapt. But if society only uses adaptive fixes like these, it can make the haze worse over time by failing to tackle its root causes. By recognising this new season, societies might normalise the recurrence of haze and isolate anyone who demands the government and businesses deal with deforestation and burning.

    Powerful institutions like these shape narratives about seasonal crises to minimise their responsibility and shift blame elsewhere. Understanding these dynamics is crucial to fostering accountability and ensuring fair responses.

    The shifting seasons require us to rethink our relationship with time and the environment. Today, most of us think about time in terms of days, hours and minutes, which is a globalised standard used everywhere from smartphones to train timetables. But this way of keeping time forgets older and more local ways of understanding time – those that are shaped by natural rhythms, such as the arrival of the rainy season, or solar and lunar cycles, rooted in the lives and cultures of different communities.

    Diverse perspectives, especially those from Indigenous knowledge systems, can enhance our ability to respond to environmental changes. Integrating alternative time-keeping methods into mainstream practices could foster fairer and more effective solutions to environmental problems.

    Seasons are more than just divisions of time – they connect us with nature. Finding synchrony with changing seasonal rhythms is essential for building a sustainable future.


    Don’t have time to read about climate change as much as you’d like?

    Get a weekly roundup in your inbox instead. Every Wednesday, The Conversation’s environment editor writes Imagine, a short email that goes a little deeper into just one climate issue. Join the 45,000+ readers who’ve subscribed so far.


    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Farewell to summer? ‘Haze’ and ‘trash’ among Earth’s new seasons as climate change and pollution play havoc – https://theconversation.com/farewell-to-summer-haze-and-trash-among-earths-new-seasons-as-climate-change-and-pollution-play-havoc-260765

    MIL OSI Analysis

  • MIL-OSI Analysis: Popular Tunisian island’s cultural heritage at risk due to tourism, neglect and climate change

    Source: The Conversation – UK – By Majdi Faleh, Academic Fellow & Lecturer in Architecture and Cultural Heritage, Nottingham Trent University

    The Sidi Yati mosque in Djerba, which dates back to the 10th century, has been damaged by coastal erosion. Mehdi Elouati, CC BY-NC-ND

    Nestled in the southern Mediterranean, off the south-east coast of Tunisia, lies the island of Djerba. With a rich cultural and religious history, it has been a crossroad of many civilisations, including the Phoenicians, Romans, Byzantines and Arabs, and is home to many unique architectural sites. These include the Sedouikech underground mosque, St Joseph’s Church and the El Ghriba Synagogue.

    But, for many years, Djerba’s cultural heritage has been in danger. This is due to a combination of over-tourism, environmental change and human neglect.

    An underground mosque on the island of Djerba.
    Mariana Delca / Shutterstock

    By the 1990s to early 2000s, when Djerba was at the height of its popularity, the island was attracting between 1 million and 1.5 million visitors each year. It is one of Tunisia’s most popular tourist areas, with more hotels than any other destination in the country.

    Tourism has resulted in excessive tourist traffic in Djerba, particularly during the summer. It has also contributed to other problems such as water stress and waste generation. According to figures from 2020, hotels alone generate between 35% and 40% of all the waste on the island.

    But the development of tourism has, above all, altered Djerba’s cultural landscape. In some areas of the island, Djerba’s traditional housing – houmas, menzels and houchs – have given way to more modern tourist infrastructure.

    This has accelerated since Tunisia’s 2011 revolution, when long-time dictator Zine El Abidine Ben Ali was ousted. Weak institutional oversight has led to vandalism, illegal construction on archaeological sites and unauthorised demolitions.

    The development of tourism on Djerba has also eroded traditional ways of life. The island has experienced significant changes due to tourism, with the development of roads, ferries, an airport and the internet leading to a decline in traditional activity. Livelihoods like agriculture, fishing and artisanal crafts have declined and are often now showcased only in tourist areas.

    Life on Djerba has changed since it was opened up for tourism.
    BTWImages / Shutterstock

    Climate change has worsened Djerba’s problems. Rainfall patterns have changed across the island over recent decades, with models suggesting that annual precipitation rates could drop 20% by the end of the century. More frequent and prolonged droughts are expected.

    At the same time, rising sea levels and increasingly common storm surges are affecting the island. Research from 2022 found that 14% of Djerba’s beaches are now highly vulnerable to submersion and coastal erosion.

    Several historical monuments on Djerba have already experienced periodic flooding and saltwater intrusion. The ruins of Sidi Garous and the shrine of Sidi Bakour are now entirely underwater and have been replaced by memorials.

    Other archaeological sites located near the coast like Haribus, Meninx, Ghizene and Edzira, some of which date back to the Roman era (eighth century BC to fifth century AD), are now partially or fully submerged. Studies by Tunisia’s National Institute of Heritage suggest that many of these sites have been lost permanently to the encroaching sea.

    World heritage site

    Significant portions of Djerba’s cultural heritage have already been erased by sea-level rise and coastal erosion. Future losses could be even more severe. The island’s cultural heritage will only grow more precarious without meaningful preservation and climate adaptation efforts.

    However, many of Djerba’s monuments, historical buildings and traditional dwellings have suffered from years of neglect. A chronic lack of local and international funding, as well as weak institutional frameworks for heritage management, mean some of the island’s historic structures have been abandoned. Many other buildings have deteriorated due to a lack of protective measures and maintenance.

    Community organisations such as the Association for the Safeguarding of the Island of Djerba have tried to step in to fill the void left by weak institutional frameworks. Their work ranges from delivering public awareness campaigns to local young people to efforts like re-purposing ancient rainwater tanks to manage periods of drought.

    But these grassroots efforts alone are not enough to stop Djerba’s cultural heritage from deteriorating at its current pace.

    The ruins of a Housh, a traditional dwelling, on the island of Djerba.
    Ahmed Bedoui, CC BY-NC-ND

    In September 2023, the UN Educational, Scientific and Cultural Organization (Unesco) announced that it was adding Djerba to its list of world heritage sites. Tunisia’s culture ministry welcomed the decision. It followed years of efforts by local groups and government officials to add Djerba to the list.

    Djerba’s inclusion offers hope for the long-term preservation of the island’s heritage. A world heritage site designation increases global recognition and enables improved access to sources of funding.

    And since Djerba’s classification, there has been some progress. The culture ministry has established a task force to monitor the construction of buildings and other infrastructure, collect data on designated protected areas, and prepare projects to preserve heritage sites.

    But Djerba’s cultural heritage remains in danger. Improved preservation of these sites will require continuous funding and stringent regulation of tourism and construction activities.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Popular Tunisian island’s cultural heritage at risk due to tourism, neglect and climate change – https://theconversation.com/popular-tunisian-islands-cultural-heritage-at-risk-due-to-tourism-neglect-and-climate-change-223612

    MIL OSI Analysis

  • MIL-OSI USA News: American Steelmakers Are Thriving Under President Trump

    Source: US Whitehouse

    The U.S. steel industry is back under President Donald J. Trump. After languishing under a Biden-era stranglehold — plagued by unfair foreign competition, job losses, and weakened national security as imports flooded the market and domestic production stalled — the steel industry is quickly roaring back to life.

    U.S. steelmakers are proving that strong leadership and protective tariffs are the keys to revitalizing American manufacturing.

    • Ohio-based Cleveland-Cliffs announced record steel shipments in Q2 2025.
      • CEO Lourenco Goncalves: “Cliffs is a major supplier of steel to the automotive manufacturers, and the Trump Administration continues to show strong support to both the domestic steel and the domestic automotive sectors. We have started to see the positive impact that tariffs have on domestic manufacturing, protecting domestic jobs and national security. We expect this trend to continue, promoting the resurgence of the American automotive industry supported by a thriving domestic steel industry.”
    • Indiana-based Steel Dynamics saw a 39% increase in operating income and a 19% increase in adjusted EBITDA in Q2 2025.
    • North Carolina-based Nucor expects its Q2 2025 earnings to be approximately four times higher than the preceding quarter.
    • President Trump’s perpetual Golden Share as part of the investment in Pittsburgh-based U.S. Steel protects the iconic American company’s financial health and ensures its jobs cannot be exported — a win-win for American workers and industry.

    MIL OSI USA News

  • MIL-OSI United Nations: Supercharging Clean Energy Will Repair Humankind’s Relationship with Climate, Fuel Economic Growth, Secretary-General Says, Noting $2 Trillion Invested in 2024

    Source: United Nations General Assembly and Security Council

    Following is UN Secretary-General António Guterres’ address on climate action “A Moment of Opportunity:  Supercharging the Clean Energy Age”, in New York today:

    The headlines are dominated by a world in trouble.  By conflict and climate chaos.  By rising human suffering.  By growing geopolitical divides.  But amidst the turmoil, another story is being written.  And its implications will be profound.

    Throughout history, energy has shaped the destiny of humankind — from mastering fire to harnessing steam to splitting the atom.  Now, we are on the cusp of a new era.  Fossil fuels are running out of road.  The sun is rising on a clean energy age.

    Just follow the money.  Two trillion dollars went into clean energy last year — that’s $800 billion more than fossil fuels and up almost 70 per cent in 10 years.  And new data released today from the International Renewable Energy Agency shows that solar — not so long ago four times the cost of fossil fuels — is now 41 per cent cheaper.  Offshore wind — 53 per cent. And over 90 per cent of new renewables worldwide produced electricity for less than the cheapest new fossil fuel alternative.

    This is not just a shift in power.  This is a shift in possibility.  Yes, in repairing our relationship with the climate.  Already, the carbon emissions saved by solar and wind globally are almost equivalent to what the whole European Union produces in a year.

    But this transformation is fundamentally about energy security and people’s security.  It’s about smart economics.  Decent jobs, public health, advancing the Sustainable Development Goals.  And delivering clean and affordable energy to everyone, everywhere.

    Today, we are releasing a special report with the support of UN agencies and partners — the International Energy Agency, the International Monetary Fund (IMF), International Renewable Energy Agency, the Organisation for Economic Cooperation and Development (OECD) and the World Bank.

    The report shows how far we have come in the decade since the Paris Agreement sparked a clean energy revolution.  And it highlights the vast benefits — and actions needed — to accelerate a just transition globally.

    Renewables already nearly match fossil fuels in global installed power capacity.  And that’s just the beginning.  Last year, almost all the new power capacity built came from renewables.  And every continent on Earth added more renewables capacity than fossil fuels.  The clean energy future is no longer a promise.  It’s a fact.  No government.  No industry. No special interest can stop it.

    Of course, the fossil fuel lobby of some fossil fuel companies will try — and we know the lengths to which they will go. But I have never been more confident that they will fail — because we have passed the point of no return.

    For three powerful reasons.  First, market economics.  For decades, emissions and economic growth rose together.  No more.  In many advanced economies, emissions have peaked, but growth continues.

    In 2023 alone, clean energy sectors drove 10 per cent of global gross domestic product (GDP) growth.  In India, 5 per cent.  The United States, 6 per cent.  China — a leader in the energy transition — 20 per cent.  And in the European Union, nearly 33 per cent.  And clean energy sector jobs now outnumber fossil fuel jobs — employing almost 35 million people worldwide.

    Even Texas — the heart of the American fossil fuel industry — now leads the United States in renewables.  Why?  Because it makes economic sense.

    And yet fossil fuels still enjoy a 9-to-1 advantage in consumption subsidies globally — a clear market distortion.  Add to that the unaccounted costs of climate damages on people and planet — and the distortion is even greater.

    Countries that cling to fossil fuels are not protecting their economies — they are sabotaging them.  Driving up costs.  Undermining competitiveness.  Locking in stranded assets.  And missing the greatest economic opportunity of the twenty-first century.

    Second — renewables are here to stay because they are the foundation of energy security and sovereignty. Let’s be clear:  The greatest threat to energy security today is in fossil fuels.  They leave economies and people at the mercy of price shocks, supply disruptions and geopolitical turmoil.  Just look at Russia’s invasion of Ukraine.  A war in Europe led to a global energy crisis.  Oil and gas prices soared.  Electricity and food bills followed.  In 2022 average households around the world saw energy costs jump 20 per cent.

    Modern and competitive economies need stable, affordable energy. Renewables offer both.  There are no price spikes for sunlight.  No embargoes on wind.  Renewables can put power — literally and figuratively — in the hands of people and governments.  And almost every nation has enough sun, wind, or water to become energy self-sufficient.  Renewables mean real energy security.  Real energy sovereignty.  And real freedom from fossil-fuel volatility.

    The third and final reason why there is no going back on renewables: Easy access.  You can’t build a coal plant in someone’s backyard.  But you can deliver solar panels to the most remote village on Earth.  Solar and wind can be deployed faster, cheaper and more flexibly than fossil fuels ever could.  And while nuclear will be part of the global energy mix, it can never fill the access gaps.

    All of this is a game changer for the hundreds of millions of people still living without electricity — most of them in Africa, a continent bursting with renewable potential. By 2040, Africa could generate 10 times more electricity than it needs — entirely from renewables.

    We are already seeing small-scale and off-grid renewable technologies lighting homes, and powering schools and businesses in remote areas.  And in places like Pakistan for example, people power is fuelling a solar surge — consumers are driving the clean energy boom.

    The energy transition is unstoppable.  But the transition is not yet fast enough or fair enough.  OECD countries and China account for 80 per cent of renewable power capacity installed worldwide.  Brazil and India make up nearly 10 per cent.  Africa — just 1.5 per cent.

    Meanwhile, the climate crisis is laying waste to lives and livelihoods.  Climate disasters in small island States have wiped out over 100 per cent of GDP.  In the United States, they are pushing insurance premiums through the roof.

    And the 1.5-degree limit is in unprecedented peril.  To keep it within reach, we must drastically speed up the reduction of emissions — and the reach of the clean energy transition.  With manufacturing capacity racing, prices plummeting, and COP30 [Thirtieth Session of the Conference of the Parties to the United Nations Framework Convention on Climate Change] fast approaching…  This is our moment of opportunity.  We must seize it.  We can do so by taking action in six opportunity areas.

    First — by using new national climate plans to go all-out on the energy transition.  Too often, governments send mixed messages:  Bold renewable targets on one day.  New fossil fuel subsidies and expansions the next.

    The next national climate plans, or NDCs, are due in a matter of months.  They must bring clarity and certainty.  Group of Twenty (G20) countries must lead. They produce 80 per cent of global emissions.  The principle of common but differentiated responsibilities must apply but every country must do more.  Ahead of COP30 in Brazil this November, they must submit new plans.

    I invite leaders to present their new NDCs at an event I will host in September, during General Assembly High-level week.   These must: cover all emissions, across the entire economy; align with the 1.5-degree limit; integrate energy, climate and sustainable development priorities into one coherent vision; and deliver on global promises to double energy efficiency and triple renewables capacity by 2030, and to accelerate the transition away from fossil fuels.  These plans must be backed by long-term road maps for a just transition to net-zero energy systems — in line with global net-zero by 2050.

    And they must be underpinned by policies that show that the clean energy future is not just inevitable — but investable.  Policies that create clear regulations and a pipeline of projects.  That enhance public-private partnerships — unlocking capital and innovation.  That put a meaningful price on carbon.  And that end subsidies and international public finance for fossil fuels — as promised.

    Second, this is our moment of opportunity to build the energy systems of the twenty-first century.  The technology is moving ahead.  In just 15 years, the cost of battery storage systems for electricity grids has dropped over 90 per cent.

    But here’s the problem.  Investments in the right infrastructure are not keeping up.  For every dollar invested in renewable power, just 60 cents go to grids and storage.  That ratio should be one-to-one.

    We are building renewable power — but not connecting it fast enough.  There’s three times more renewable energy waiting to be plugged into grids than was added last year.  And fossil fuels still dominate the global total energy mix.

    We must act now and invest in the backbone of a clean energy future:  In modern, flexible and digital grids — including regional integration.  In a massive scale-up of energy storage.  In charging networks — to power the electric vehicle revolution.

    On the other hand, we need energy efficiency but also electrification — across buildings, transport and industry. This is how we unlock the full promise of renewables — and build energy systems that are clean, secure and fit for the future.

    Third, this is our moment of opportunity to meet the world’s surging energy demand sustainably.  More people are plugging in.  More cities are heating up — with soaring demand for cooling.  And more technologies — from AI to digital finance — are devouring electricity.  Governments must aim to meet all new electricity demand with renewables.

    AI can boost efficiency, innovation and resilience in energy systems.  And we must take profit in it.  But it is also energy hungry.  A typical AI data centre eats up as much electricity as 100,000 homes.  The largest ones will soon use 20 times that.  By 2030, data centres could consume as much electricity as all of Japan does today.

    This is not sustainable — unless we make it so.  And the technology sector must be out front.  Today I call on every major tech firm to power all data centres with 100 per cent renewables by 2030.

    And — along with other industries — they must use water sustainably in cooling systems.  The future is being built in the cloud.  It must be powered by the sun, the wind and the promise of a better world.

    Fourth, this is the moment of opportunity for a just energy transition. The clean energy that we must deliver must also deliver equity, dignity and opportunity for all.

    That means governments leading a just transition.  With support, education and training — for fossil fuel workers, young people, women, Indigenous Peoples and others — so that they can thrive in the new energy economy.  With stronger social protection — so no one is left behind.  And with international cooperation to help low-income countries that are highly-dependent on fossil fuels and struggling to make the shift.

    But justice doesn’t stop here.  The critical minerals that power the clean energy revolution are often found in countries that have long been exploited.  And today, we see history repeating.  Communities mistreated.  Rights trampled.  Environments trashed.  Nations stuck at the bottom of value chains — while others reap rewards.  And extractive models digging deeper holes of inequality and harm.  This must end.

    Developing countries can play a major role in diversifying sources of supply. The UN Panel on Critical Energy Transition Minerals has shown the way forward — with a path grounded in human rights, justice and equity.

    Today, I call on governments, businesses and civil society to work with us to deliver its recommendations.  Let’s build a future that is not only green — but just.  Not only fast — but fair.  Not only transformative — but inclusive.

    Fifth, we have a moment of opportunity to use trade and investment to supercharge the energy transition.  Clean energy needs more than ambition.  It needs access — to technologies, materials and manufacturing.

    But these are concentrated in just a few countries.  And global trade is fragmenting.

    Trade policy must support climate policy.  Countries committed to the new energy era must come together to ensure that trade and investment drive it forward.  By building diverse, secure and resilient supply chains.  By cutting tariffs on clean energy goods.  By unlocking investment and trade — including through South-South cooperation. And by modernizing outdated investment treaties — starting with Investor-State Dispute Settlement provisions.

    Today, fossil fuel interests are weaponizing these provisions to delay the transition, particularly in several developing countries.  Reform is urgent.  The race for the new must not be a race for the few.  It must be a relay — shared, inclusive and resilient.  Let’s make trade a tool for transformation.

    Sixth and finally, this is our moment of opportunity to unleash the full force of finance — driving investment to markets with massive potential.  Despite soaring demand and vast renewables potential — developing countries are being locked out of the energy transition.

    Africa is home to 60 per cent of the world’s best solar resources.  But it received just 2 per cent of global clean energy investment last year.  Zoom out, and the picture is just as stark.

    In the last decade, only 1 in every 5 clean energy dollars went to emerging and developing countries outside China.  To keep the 1.5-degree limit alive — and deliver universal energy access – annual clean energy investment in those countries must rise more than fivefold by 2030.

    That demands bold national policies.  And concrete international action to:  Reform the global financial architecture.  Drastically increase the lending capacity of multilateral development banks — making them bigger, bolder and better able to leverage massive amounts of private finance at reasonable costs.  And take effective action on debt relief — and scale up proven tools like debt for climate swaps.

    Today, developing countries pay outlandish sums for both debt and equity financing — in part because of outdated risk models, bias and broken assumptions that boost the cost of capital.  Credit ratings agencies and investors must modernize.

    We need a new approach to risk that reflects:  the promise of clean energy; the rising cost of climate chaos; and the danger of stranded fossil fuel assets.  I urge parties to unite to solve the complex challenges facing some developing countries in the energy transition — such as early retirement of coal plants.

    The fossil fuel age is flailing and failing.  We are in the dawn of a new energy era.  An era where cheap, clean, abundant energy powers a world rich in economic opportunity.  Where nations have the security of energy autonomy.  And the gift of power is a gift for all.

    That world is within reach.  But it won’t happen on its own.  Not fast enough.  Not fair enough.  It is up to us.  We have the tools to power the future for humanity.  Let’s make the most of them.  This is our moment of opportunity.

    MIL OSI United Nations News

  • MIL-OSI Canada: Reflecting on one year since the Jasper wildfire

    Source: Government of Canada News (2)

    The Government of Canada stands with Jasperites as work continues to rebuild the beautiful mountain community of Jasper and Jasper National Park

    July 22, 2025 – Jasper, Alberta – PrairiesCan

    One year ago, emergency responders, community members, visitors, friends, and neighbours all banded together to safely evacuate more than 20,000 people from Jasper and Jasper National Park. Those heroic efforts were the beginning of a long road for the community. Within days, multiple wildfires would converge to take the life of a brave firefighter, destroy over 30 per cent of the structures in Jasper, uproot the lives of residents and workers, and leave a lasting impact on the landscape.

    Today, the Honourable Eleanor Olszewski, Minister of Emergency Management and Community Resilience and Minister responsible for Prairies Economic Development Canada, joined Jasperites to reflect, to grieve, and to remember. At the commemorative event, Minister Olszewski paid tribute to the tremendous courage, strength, and resiliency that community members have shown over the past year, while also acknowledging the ongoing commitment to collaboration by countless people and organizations to assist Jasper to build back stronger.

    MIL OSI Canada News

  • MIL-OSI USA: ICYMI: California’s economic leadership shines in three recent studies

    Source: US State of California Governor

    Jul 22, 2025

    What you need to know: California is cementing its role as a global economic powerhouse — new data highlights the Golden State’s leadership in innovation, business growth, and AI readiness.

    SACRAMENTO – California continues to dominate as an economic leader nationwide. As the fourth largest economy in the world, California is fostering growth in sectors across the board, creating jobs and spurring economic activity.

    “California is where a diverse class of dreamers and doers meet more access to venture capital funding, more Fortune 500 companies, and more business starts than anywhere else in the nation. That is how we regularly punch above our weight in economic success on a global scale.”

    Governor Gavin Newsom

    According to recent reporting: 

    ➜ Eight California cities ranked among the 25 fastest-growing for trade between businesses, referred to as business-to-business payments growth, since January 2025 – more than any other state. 

    ➜ Three city regions – San Francisco, San Jose and Los Angeles – are among the top 10 in the country when it comes to having everything in place to launch big AI businesses, according to a recent report from Brookings. No other state has more than one region in the top 10.

    ➜ Nearly four times more companies launched their headquarters in California than relocated out of state, according to data from a recent report by the Public Policy Institute of California (PPIC). 

    When it comes to economic leadership, California leads the nation as:

    Furthering the state’s initiative to support business development, the California Competes Tax Credit this week opened its first application window for the fiscal year. With special consideration given to businesses within the “strengthen” and “accelerate” sector categories as outlined in the California Jobs First Economic Blueprint, California Competes aims to invest in the state’s key economic sectors that will drive innovation and access to good-paying jobs. Learn more and apply here by August 11.

    Recent news

    News What you need to know: Governor Gavin Newsom calls on the President to send every soldier home now – this dangerous militarization must end. Los Angeles, California – As pressure continues mounting for the President to end the unlawful deployment of soldiers in…

    News SACRAMENTO – Governor Gavin Newsom has approved the prepositioning of firefighting resources in Sierra and Plumas counties in response to critical fire weather conditions forecasted to impact Northern California starting Sunday, July 20, through Tuesday, July 22,…

    News SACRAMENTO – Governor Gavin Newsom and Acting Governor Eleni Kounalakis issued the following statement regarding the deaths of Los Angeles County Sheriff’s Department Detectives Joshua Kelley-Eklund, Victor Lemus, and William Osborn:“Detectives Kelley-Eklund,…

    MIL OSI USA News

  • MIL-OSI Canada: Supporting Jasper through recovery: Premier Smith

    Source: Government of Canada regional news (2)

    MIL OSI Canada News

  • MIL-OSI USA: NREL and Google Host Artificial Intelligence Hackathon To Tackle Data Center Energy Challenges

    Source: US National Renewable Energy Laboratory

    Experts Explore Potential of Google AI Tools To Mitigate Potential Energy Limits for Quick Growth of US Data Centers


    NREL and Google teamed up to host a hackathon, bringing together leading researchers from nine U.S. Department of Energy (DOE) national laboratories to explore and leverage Google’s generative artificial intelligence (AI) and large language model tools to address an array of critical challenges related to energy limitations for U.S. data centers.

    Overcoming these challenges is critical to enable scaling for future technologies while ensuring energy reliability and affordability.

    According to Google’s AI definition, fittingly, a hackathon is a collaborative event where people with diverse skills, often programmers and designers, come together to work intensively on a specific project, typically within a short time frame.

    The original idea for the hackathon emerged out of discussions with Google’s public sector team and NREL’s computational science team.

    “Both groups were interested in exposing scientists to some of the latest and greatest AI models to test out what they’re really capable of, but both groups also wanted a targeted application,” said Ray Grout, director of the computational science center at NREL. “Exploring data center energy challenges was a natural fit given the growing demand of energy for AI, and the interest in the topic for the labs and Google.”

    Roughly 50 top minds, including six NREL computational and data scientists, participated in the two-day event, which took place June 17–18 in Washington, D.C. Participants engaged in hands-on experimentation, applying cutting-edge AI capabilities to real-world problems in geospatial analytics, energy systems, data center optimization, and digital-twin development. The hackathon provided a unique platform for participants to directly engage with Google’s AI tools, particularly Gemini, and explore their applicability to a diverse range of scientific and engineering problems.

    The hackathon brought together leading researchers from across DOE’s national laboratories to explore and leverage Google’s generative AI tools. Photo from Beth Hartman, Google

    Google’s AI platform includes several tools that enable researchers to accelerate and expand their work overall. Among the tools are Agentspace and its included agents like Idea Generation and Deep Research. Idea Generation, an agent premade by Google, has the goal of helping with innovation and problem-solving for enterprise users by combining advanced AI with a unique tournament-style competition framework to generate and rank ideas. Deep Research enables researchers to gather, analyze, and understand internal and external information.

    Other tools help improve operational efficiency, allowing researchers to inform their work by more quickly finding resources across labs and agencies. Finally, many tools address specific use cases like geospatial reasoning, population dynamics, and weather forecasting. For example, one demonstration that the Google geospatial team showed at the hackathon used geospatial reasoning and weather forecasting for predicting grid outages. Google teams represented at the hackathon included Google Public Sector, DeepMind, Google Research, and Climate Ops.

    Google’s geospatial reasoning team developed a demo for the hackathon showing outage predictions based on weather forecasting models. Image from Beth Hartman, Google

    “Google was honored to partner with NREL and work with so many DOE labs at this collaborative event,” said Regiuel Days, account executive for federal science and research at Google. “These critical research institutions provide our country with essential insights into key issues such as grid resilience, energy security, and data center optimization. Combined with Google’s data and cutting-edge AI models, we can work together to more quickly find solutions to the big challenges we face.”

    Hackathon Experience and Outcomes

    The hackathon successfully demonstrated the potential of generative AI in accelerating research, automating complex tasks, and generating novel insights.

    During the two-day event, experts teamed up to collaborate and explore the various identified challenges. Some participants focused on geospatial analytics, leveraging Gemini to process and interpret spatial data. Other researchers utilized Gemini’s code-generation and debugging capabilities, while others found Gemini valuable for in-depth research and brainstorming.

    Hackathon participants engaged in collaborative, hands-on experimentation, applying cutting-edge AI capabilities to real-world problems. Photo from Beth Hartman, Google

    NREL’s Gabriel Steenberg was one of several researchers to explore specialized problems. Steenberg explored the Population Dynamics Foundation model to predict power grid behavior, feeding it county-level data to see if it could predict interconnections in other counties. Other laboratories with staff in person at the event included Argonne National Laboratory, Idaho National Laboratory, Jefferson Laboratory, Lawrence Berkeley National Laboratory, National Energy Technology Laboratory, Oakridge National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories.

    The labs explored solutions such as using Vertex AI and Google Earth Engine to better understand data-center load balancing, real-time water data, and cybersecurity. Through these topic explorations, Google gained insights into how national laboratories envision using their AI tools, especially concerning specialized applications like geospatial reasoning, digital twins, and autonomous engineering.

    The hackathon served as a valuable collaborative step, fostering innovation and providing crucial insights into the evolving landscape of generative AI for scientific research. The event generated robust discussion, shared learning, and discoveries and identified opportunities for future follow-on events.

    “We have so many experts across the national labs working on energy challenges, and Google has so many experts developing and deploying AI solutions. This was a great way to get everyone in the same room to figure out what we can do already and where there is more work to be done,” Grout said.

    “Throughout this interactive, guided exploration of Google’s AI models and tools, we learned a tremendous amount about what types of challenges the labs are focused on solving,” said Beth Hartman, Google’s industry executive for federal science and research. “This helps us to better understand how we can help more specifically. Going forward, we are focused on providing the labs with increased access to the models that best support their work. We are also planning to host more hackathons in partnership with the labs and will continue to invite all 17 DOE labs to participate. Stay tuned!”

    Learn more about NREL’s computational science and AI research.

    MIL OSI USA News

  • MIL-OSI USA: SBA Relief Still Available to Missouri Small Businesses, Private Nonprofits and Residents Affected by April Storms

    Source: United States Small Business Administration

    SACRAMENTO, Calif. – The U.S. Small Business Administration (SBA) is reminding eligible small businesses, private nonprofits, and residents in Missouri of the Aug. 22 deadline to apply for low interest federal disaster loans to offset physical damage caused by severe storms, tornadoes, straight-line winds, heavy rains, large hail, flooding and flash flooding occurring April 29.

    The disaster declaration covers the Missouri counties of Barry, Christian, Dade, Dallas, Greene, Jasper, Lawrence, McDonald, Newton, Polk, Stone and Webster as well as the Kansas county of Cherokee, and the Oklahoma county of Ottawa.

    Small businesses and nonprofits are eligible to apply for business physical disaster loans and may borrow up to $2 million to repair or replace disaster-damaged or destroyed real estate, machinery and equipment, inventory, and other business assets.

    Homeowners and renters are eligible to apply for home and personal property loans and may borrow up to $100,000 to replace or repair personal property, such as clothing, furniture, cars, and appliances. Homeowners may apply for up to $500,000 to replace or repair their primary residence.

    Applicants may also be eligible for a loan increase of up to 20% of their physical damage, as verified by the SBA, for mitigation purposes. Eligible mitigation improvements include strengthening structures to protect against high wind damage, upgrading to wind rated garage doors, and installing a safe room or storm shelter to help protect property and occupants from future damage.

    “One distinct advantage of SBA’s disaster loan program is the opportunity to fund upgrades reducing the risk of future storm damage,” said Chris Stallings, associate administrator of the Office of Disaster Recovery and Resilience at the SBA. “I encourage businesses and homeowners to work with contractors and mitigation professionals to improve their storm readiness while taking advantage of SBA’s physical damage loans.”

    SBA’s Economic Injury Disaster Loan (EIDL) program is available to eligible small businesses, small agricultural cooperatives, nurseries and private nonprofit (PNP) organizations impacted by financial losses directly related to this disaster. The SBA is unable to provide disaster loans to agricultural producers, farmers, or ranchers, except for aquaculture enterprises.

    Interest rates can be as low as 4% for small businesses, 3.625% for nonprofits, and 2.813% for homeowners and renters with terms up to 30 years. Interest does not begin to accrue, and payments are not due until 12 months from the date of the first loan disbursement. The SBA sets loan amounts and terms, based on each applicant’s financial condition.

    To apply online, visit sba.gov/disaster. Applicants may also call SBA’s Customer Service Center at (800) 659-2955 or email disastercustomerservice@sba.gov for more information on SBA disaster assistance. For people who are deaf, hard of hearing, or have a speech disability, please dial 7-1-1 to access telecommunications relay services.

    The deadline to return physical damage applications is Aug. 22.

    ###

    About the U.S. Small Business Administration

    The U.S. Small Business Administration helps power the American dream of business ownership. As the only go-to resource and voice for small businesses backed by the strength of the federal government, the SBA empowers entrepreneurs and small business owners with the resources and support they need to start, grow, expand their businesses, or recover from a declared disaster. It delivers services through an extensive network of SBA field offices and partnerships with public and private organizations. To learn more, visit www.sba.gov.

    MIL OSI USA News

  • MIL-OSI United Kingdom: Oxford landlord found guilty of failing to comply with HMO licence conditions

    Source: City of Oxford

    Published: Tuesday, 22 July 2025

    An Oxford landlord has been fined £5,500 after being found guilty of failing to comply with HMO licence conditions at a home in Headington.

    Aslam Javid Dogar, (61), of Lime Walk in Oxford, was found guilty of nine counts of failing to comply with the conditions of the HMO licence for 182 Headington Road.  

    The failure to comply with licence conditions included: 

    • an inadequate fire alarm system  
    • fire doors that had not been maintained in good order and repair 
    • a lack of guarding on the staircase and landing between the first and second floors 
    • no mechanical ventilation fitted in either kitchen or bathroom  
    • the property being generally in a poor state of repair 

    Alongside the £5,500 fine, Dogar was ordered to pay costs of £3,678 and a victim surcharge of £2,000 at Oxford Magistrates’ Court on 8 July 2025. 

    “Some landlords are taking advantage of the city’s housing shortage to rent out badly maintained properties to multiple occupants.  

    The HMO licensing scheme was introduced to raise standards in the city’s private rental sector and make sure all rented homes are safe for tenants to live in.  

    The message to landlords is clear, if you don’t meet your legal obligations to your tenants and keep your properties up to the required standard then the city council will prosecute you.  

    I am pleased by the substantial fine charged in this particular case as it serves as a deterrent to other landlords, and serves notice that HMO standards will be upheld.” 

    – Councillor Linda Smith, Cabinet Member for Housing

    If you suspect a property may be an unlicensed HMO or know of an HMO which is unsafe, in poor repair or you have concerns about its management, you can report it anonymously for investigation on the Council’s website.  

    For more information contact: 

    Oxford City Council 

    Press Office 

    01865 252096 

    pressoffice@oxford.gov.uk 
     

    MIL OSI United Kingdom