Category: Natural Disasters

  • Trump’s envoy meets Netanyahu for Gaza aid, ceasefire push

    Source: Government of India

    Source: Government of India (4)

    U.S. special envoy Steve Witkoff met Israeli Prime Minister Benjamin Netanyahu on Thursday in a bid to salvage Gaza truce talks and tackle a humanitarian crisis in the enclave, where a global hunger monitor has warned that famine is unfolding.

    Shortly after Witkoff’s arrival, President Donald Trump posted on his Truth Social network: “The fastest way to end the Humanitarian Crises in Gaza is for Hamas to SURRENDER AND RELEASE THE HOSTAGES!!”

    Indirect ceasefire talks between Israel and Palestinian Islamist group Hamas in Doha ended in deadlock last week with the sides trading blame for the impasse and gaps lingering over issues including the extent of an Israeli military withdrawal.

    Witkoff arrived with Israel facing mounting international pressure over the widespread destruction of Gaza and constraints on aid in the territory, with Canada the latest Western power to say it will recognise a Palestinian state.

    Israel on Wednesday sent a response to Hamas’ latest amendments to a U.S. proposal that would see a 60-day ceasefire and the release of some hostages in exchange for Palestinian prisoners, a source familiar with the details said.

    There was no immediate comment from Hamas. Israeli officials have in recent days said Israel might declare that it would annex parts of Gaza if the stalemate continues.

    Gaza medical officials said at least 23 people were reported killed by Israeli fire across the enclave, including 12 people among crowds who had gathered to receive aid around the Netzarim corridor, an area held by Israeli troops in central Gaza.

    The Israeli military said that its troops had fired warning shots to disperse crowds that were endangering them with no casualties identified.

    Since the war began, the Gaza health ministry has recorded 156 deaths from starvation and malnutrition, most of them in recent weeks, including at least 90 children.

    Israel’s Public Broadcaster Kan said Witkoff would also visit an aid distribution site in Gaza.

    Confronted by rising international outrage over images of starving children, Israel said on Sunday it would halt military operations for 10 hours a day in parts of Gaza and designate secure routes for convoys delivering food and medicine.

    CALLS ON HAMAS TO DISARM

    The U.N. Office for the Coordination of Humanitarian Affairs said on Wednesday the United Nations and its partners had been able to bring more food into Gaza in the first two days of pauses, but the volume was “still far from enough”.

    Even with more aid running through Gaza, residents face peril from Israeli forces and Palestinian looters when trying to reach the supplies.

    “I have tried several times to grab a sack of flour. The only time I managed to do so, someone with a knife froze me in the street and took it away, threatening to stab me,” one man from Deir Al-Balah told Reuters, asking not to be identified.

    With the number of Palestinians killed in almost two years of war passing 60,000 this week, pressure has been mounting in Gaza on Hamas to reach a ceasefire deal with Israel.

    “We can save thousands of lives and maybe the war wouldn’t resume,” Rami from Gaza City told Reuters via a chat app.

    Mothers of hostages led a protest outside Netanyahu’s office, calling on the government to end the war.

    “End this nightmare,” said Yael Engel-Lichi, whose nephew had been taken hostage and released in a previous ceasefire. Twenty of the 50 hostages still held by militants in Gaza are believed to still be alive.

    Netanyahu, whose ruling coalition includes two far-right parties who want to conquer Gaza and re-establish Jewish settlements there, has said he will not end the war until Hamas no longer rules the enclave and lays down its arms.

    Hamas has rejected calls to disarm.

    Qatar and Egypt, who are mediating the ceasefire efforts, backed a declaration on Tuesday by France and Saudi Arabia which outlined steps for a two-state solution to the Israeli-Palestinian conflict.

    The declaration says Hamas “must end its rule in Gaza and hand over its weapons to the Palestinian Authority”, which is led by its rivals and exercises limited self-rule in parts of the Israeli-occupied West Bank.

    Israel has ruled out the Palestinian Authority gaining control of Gaza and on Thursday Defence Minister Israel Katz and Justice Minister Yariv Levin voiced support for annexing the West Bank – territory which the Palestinians seek for a state.

    Israel has denounced declarations by France, Britain and Canada since last week that they may recognise a Palestinian state, which Israel says amounts to rewarding Hamas for its October 7, 2023 assault on Israeli territory.

    That attack, when fighters killed 1,200 people and took 251 hostages back to Gaza, precipitated the war.

    German Foreign Minister Johann Wadephul, embarking on a visit to Israel, said negotiations for a two-state solution must begin but that for Germany, the recognition of a Palestinian state would come at the end of that process.

    (Reuters)

  • MIL-OSI USA: Sherrill Statement on the Widespread Famine in Gaza and the Deepening Humanitarian Crisis

    Source: United States House of Representatives – Congresswoman Mikie Sherrill (NJ-11)

    Washington, D.C. — Representative Mikie Sherrill (NJ-11) today issued the following statement urging President Trump and the Israeli government to take immediate action to ensure that aid reaches innocent civilians in Gaza:

    “I am deeply concerned by the famine and perilous security situation in Gaza. In February 2024, I went to the Rafah Crossing in Egypt and saw the backlog of aid trucks being kept out of Gaza. I took my concerns about keeping aid from reaching civilians directly to Prime Minister Netanyahu and President Biden. Restricting life saving aid from reaching civilians was as dangerous then as it is today. Failure to take immediate action now will lead to the deaths of thousands of innocent civilians, including women and children, and the perpetuation of the war. 

    “I was encouraged to see the announcement earlier this week that increased humanitarian aid would be allowed to enter Gaza, but it is not enough. The previous system of distributing aid through the Gaza Humanitarian Foundation was ineffective and directly led to the deaths of civilians at aid sites within days of beginning the operation. It needlessly endangered civilian lives. I immediately called on President Trump to work with the Israeli government and humanitarian organizations operating in Gaza to develop a safer method of delivery aid, but no action was taken. 

    “It is unacceptable that Hamas walked away from the last round of ceasefire negotiations and rejected the proposal agreed to by Israel, the U.S., Egypt, and Qatar. I again urge both parties to return to the negotiating table immediately to reach a ceasefire and bring the hostages home. But that alone will not lead to the end of this conflict. For that to happen, the human suffering must end.

    “It is past time that President Trump stands up for American values and works with the Israeli government to ensure that aid reaches the innocent civilians who desperately need it. Limiting the delivery of aid has only allowed Hamas and criminal gangs to exploit the situation. Ending the humanitarian crisis in Gaza is vital to maintaining America’s values, weakening Hamas’s support, and permanently ending the conflict.”

    ###

    MIL OSI USA News

  • MIL-OSI Security: Illicit firearms: Operation Trigger IX nets 14,260 arrests across Latin America

    Source: Interpol (news and events)

    18 April 2023

    Drugs worth USD 5.7 billion also seized in INTERPOL-led operation targeting key trafficking routes and organized crime groups

    LYON, France – In the biggest firearms operation ever coordinated by INTERPOL, authorities in Central and South America have made 14,260 arrests and seized some 8,263 illicit firearms, as well as 305,000 rounds of ammunition.

    With illicit firearms used by criminals to commit armed robberies and murder, they are also closely associated with the proliferation of a wide range of other crimes using the same trafficking routes.

    The links between illicit firearms and drug manufacturing and trafficking were thrown into sharp relief, with the seizure of 203 tonnes of cocaine and other drugs together worth some USD 5.7 billion, and 372 tonnes of drug precursors during Operation Trigger IX (12 March – 2 April).

    Law enforcement across INTERPOL’s 195 member countries have reported record drug seizures in the past year and, in many cases, a spike in drug-related violence, fueled by the traffic of illegal firearms.

    The operation, which saw an unprecedented level of cooperation across 15 countries, also identified a range of other crimes such as corruption, fraud, human trafficking, environmental crime and terrorist activities.

    Colombian authorities arrested the subject of an INTERPOL Red Notice

    Arrests in Honduras – Operation Trigger IX

    Firearms are closely associated with the proliferation of a wide range of other crimes.

    Border checks – Operation Trigger IX

    Operational hub – Operation Trigger IX

    Marine patrols – Operation Trigger IX

    Operation Trigger IX led to the disruption of 20 organized criminal groups

    Drug seizure – El Salvador

    A woman attempting to smuggle pistols and chargers between Paraguay and Brazil.

    Seizure by Chile – Operation Trigger IX

    Vehicle checks – Operation Trigger IX

    Uruguay saw its largest-ever seizure of ammunition.

    Operational highlights

    INTERPOL gathered firearms experts from participating countries at an operational hub in Foz do Iguaçu in the tri-border area of Argentina, Brazil, and Paraguay, to support frontline actions and ensure the swift exchange and cross-checking of intelligence.

    On the ground, coordinated actions led to the disruption of 20 organized criminal groups, including the arrest of members of Primeiro Comando da Capital, Mara Salvatrucha and the Balkans Cartel, all involved in firearms trafficking.

    In Uruguay, 100,000 pieces of ammunition trafficked internationally by two European nationals were seized by authorities, marking the country’s largest-ever such seizure.

    Authorities in Brazil and Paraguay shut down several firearms dealerships following the identification of irregular transfers and unlicensed sales.

    Other operational results include:

    • 11 victims were rescued in Paraguay, when authorities dismantled a human trafficking ring.
    • In cooperation with Venezuela, police in Colombia arrested a Venezuelan national subject to an INTERPOL Red Notice for terrorism and arms trafficking.
    • A 32 year old woman was arrested at the land border between Paraguay and Brazil with eight pistols and 16 chargers taped to her body.

    Looking ahead, some 30 investigations were opened as a result of actions on the ground, and authorities identified 15 new modus operandi for the illicit manufacturing, trafficking and concealment of firearms, with INTERPOL’s Purple Notice leveraged to help alert member countries.

    Officers perform real-time checks against INTERPOL’s databases during Operation Trigger IX.

    Operational hub – Brazil

    Border checks between Argentina and Brazil

    Seizure by Honduras – Operation Trigger IX

    Police checks by Argentina – Operation Trigger IX

    Authorities shut down several firearms dealerships in Brazil and Paraguay

    Authorities had immediate access to the INTERPOL Ballistic Information Network

    Arrest in Paraguay – Operation Trigger IX

    El Salvador firearms dealership checks – El Salvador

    INTERPOL’s global reach

    “The fact that an operation targeting illicit firearms resulted in such massive drugs seizures is further proof, if needed, that these crimes are intertwined,” said INTERPOL Secretary General Jürgen Stock.

    “The results, coming just weeks after our Americas Regional Conference was highlighting the need for greater information sharing on these linked organized crime activities, also demonstrate the unique value of INTERPOL in supporting efforts in the field.  

    “The organized crime networks behind all of these illicit activities have only one priority, which is profit. We, as law enforcement, must be equally determined to dismantle them across every region and globally,” concluded Secretary General Stock.

    Valdecy Urquiza, INTERPOL’s Vice-President for the Americas, highlighted the value of joint initiatives such as Trigger IX in prioritizing national and regional efforts against illicit flows. “Intelligence-led investigations and operations enable police to cooperate internationally and remove illicit firearms from circulation to protect the public,” said Mr Urquiza.

    INTERPOL global tools used by investigators during the operation include the Illicit Arms Records and Tracing Management System (iARMS), the only global database of illicit firearms, including stolen, lost and trafficked/smuggled firearms.

    Authorities also had immediate access to the INTERPOL Ballistic Information Network (IBIN), enabling law enforcement officials to compare images of ballistic fingerprints from fired casings and projectiles to establish links between crimes worldwide.

    Tracing the history and ownership of recovered firearms provides crucial investigative leads. Every firearm is unique and can be identified by its serial number, make, model and calibre as well as by its ballistic ‘fingerprint’. Comparing ballistics evidence of recovered cartridge casings and ammunition is therefore crucial to investigations.

    During the operation, INTERPOL’s Firearms Programme was supported by INTERPOL’s Regional Bureaus in Argentina and El Salvador, its Drugs and Fugitives units, and its Command and Coordination Centre.

    More than 100 national law enforcement agencies were involved in the operation, including the collaboration of US Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) and Homeland Security Investigations (HSI), which supported participating countries.

    Participating countries: Argentina, Bolivia, Brazil, Chile, Colombia, Costa Rica, Ecuador, El Salvador, Guatemala, Honduras, Mexico, Panama, Paraguay, Peru, Uruguay.

    Operation Trigger IX was funded by the European Union and carried out under the framework of Project Disrupt.

    MIL Security OSI

  • MIL-OSI Security: Europe: Drug trafficking, organized crime increasing by “an order of magnitude”

    Source: Interpol (news and events)

    8 May 2023

    At INTERPOL’s 50th European Regional Conference, delegates have gathered to discuss common crime threats from drug trafficking to cybercrime.

    OHRID, North Macedonia – Strengthening international police cooperation to counter the rapidly escalating threat posed by organized crime networks was the key focus of INTERPOL’s 50th European Regional Conference.

    The three-day (8-10 May) conference brings together more than 140 participants from 53 countries in Europe and beyond to discuss the most pressing crime issues facing the region.

    The conference takes place in Ohrid, North Macedonia, which itself marks 30 years as an INTERPOL member country this year.

    “These past 30 years, through our membership in the world’s largest police organization, have witnessed our commitment and willingness to be engaged in global police cooperation,” said Oliver Spasovski, Minister of Interior of the Republic of North Macedonia, in remarks during the conference’s opening ceremony.

    “With the establishment of the global INTERPOL I-24/7 communication system, our country was among the first to connect with this global police family, to exchange information between members and the General Secretariat, as well as directly access global criminal databases,” the Minister added.

    Unprecedented scale

    Fueled by historic levels of drug trafficking, organized crime groups are increasingly posing a direct threat to state authority in many countries, and there is evidence that levels of violence related to these criminal networks is also increasing.

    “Organized crime is a top concern,” said INTERPOL President Ahmed Naser al-Raisi in the conference’s opening ceremony. “These transnational crimes not only threaten the safety and security of the region, but also have a spillover effect on the rest of the world.”

    Last month, INTERPOL announced its largest ever firearms trafficking operations, which saw more than 14,000 suspects arrested across Central and South America, and an unprecedented USD 5.7 billion in illegal narcotics seized.

    “Over the last five years, [drug] trafficking and consumption have increased by an order of magnitude, with Europe one of the main transit and destination markets,” said INTERPOL Secretary General Jürgen Stock.

    “We continue to see record seizures at European borders and ports, and a corresponding rise in violent crime, corruption and money laundering of unprecedented scale,” added Secretary General Stock.

    The global scale of many organized crime networks, often spanning multiple continents, has underlined that international cooperation through INTERPOL is often the only means for police in Europe and other regions to bring fugitives to justice or gather crucial intelligence.

    European crime landscape

    Beyond drug trafficking, the results of INTERPOL’s 2022 Global Crime Trend report, which surveyed police across the Organization’s 195-country membership, show that money laundering and cyber or cyber-enabled crimes also top European law enforcement’s list of concerns.

    Money laundering ranked second among the crime trends most frequently indicated by member countries in the region as posing a ‘high’ or ‘very high’ threat, with financial fraud also ranking very high.

    The report notes that the use of online tools by criminals to perpetrate financial fraud schemes has also rapidly expanded in recent years, particularly since the COVID-19 pandemic.

    Especially concerning, 76 per cent of police respondents from Europe expect online child sexual exploitation and abuse to increase or increase significantly in the next three to five years.

    The report notes that the demand for livestreaming abuse has steadily increased in recent years, likely intensifying during the pandemic. While live distance child abuse most often take place in Southeast Asia, cases in the European Union have also recently been detected.

    Keeping Europe safe

    Founded in the heart of Europe – in Vienna – during the region’s interwar period 100 years ago, INTERPOL’s history is closely intertwined with that of Europe.

    Established in a 1920s context of geopolitical upheaval and concerns of rising international crime, the Organization’s founding representatives agreed that only through collaboration could police combat transnational crime threats – a common goal shared throughout periods of political or economic tension.

    Later, in one of the Organization’s darkest chapters, the Nazis assumed control of the International Criminal Police Commission – as INTERPOL was then called – after deposing its President. In 1946, Belgium spearheaded INTERPOL’s rebuilding in the new postwar era.

    Today, European member countries remain global leaders in their use of and contribution to INTERPOL capabilities – and this activity is quickly growing. With regards to INTERPOL databases, European member countries contribute more records, undertake more searches and – crucially – receive more hits than any other region.

    New historical peaks for records, searches and hits in INTERPOL databases from European member countries were reached in 2022. In the past year alone, searches of INTERPOL databases by European law enforcement have risen by nearly a third.

    The figures underscore the fundamental place INTERPOL capabilities occupy in European countries’ approaches to keeping their communities safe.

    MIL Security OSI

  • MIL-OSI Security: President Trump Ends Unfair “De Minimis” Tariff Exemption, A Major Victory in Securing the Homeland

    Source: US Department of Homeland Security

    President Trump’s Executive Order empowers DHS to continue cracking down on smuggling and unfair trade practices

    WASHINGTON – President Trump signed an Executive Order suspending duty-free de minimis tariff exemptions for low-value shipments from all countries. His order empowers Homeland Security Secretary Kristi Noem to close this loophole which was used to avoid tariffs and smuggle deadly synthetic opioids like fentanyl into the United States.

    “For decades, bad actors have taken advantage of America’s de minimis process by smuggling in deadly narcotics, harmful products, and other contraband in hidden products,” said Department of Homeland Security Assistant Secretary Tricia McLaughlin. “This loophole led to the death of thousands of Americans, fueled the opioid crisis, and harmed U.S. consumers. This decision to end de minimis will save American lives, increase revenue, and protect the American consumer and entrepreneur.”

    Under the de minimis treatment, imported goods that are valued at or under $800 were exempt from tariff duties. Countries exploited this system to flood the American market with cheap goods that undercut American manufacturers and cost American jobs. This exemption also allowed drug cartels and other criminal organizations to smuggle drugs and other contraband into our country.

    Over the past decade the volume of de minimis shipments to the United States exploded, growing from 134 million shipments in 2015 to over 1.36 billion shipments in 2024. De minimis shipments accounted for 90% of all cargo seizures in FY 24. These shipments often broke the law with 98% of narcotics seized from cargo falling under the de minimis exemption, as well as 97% of counterfeit items seized.

    Now, thanks to President Trump’s Executive Order, this loophole is closed. U.S. Customs and Border Protection is empowered to enforce tariffs on these goods and can continue to protect the homeland from the smuggling of deadly synthetic opioids like fentanyl and counterfeit goods. This will save American lives, protect American jobs, and restore billions in lost revenue.

    # # #

    MIL Security OSI

  • MIL-OSI: The Pink Salt Trick Recipe for Fast Weight Loss Trend in 2025: Why Trimology Is the Science-Backed Alternative

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, July 31, 2025 (GLOBE NEWSWIRE) —

    Pink Salt Trick Recipe Explained: Why It’s Trending for Weight Loss

    A viral wellness trend called the “Pink Salt Trick” has swept social media—particularly TikTok, Instagram, and wellness blogs. The hype: a morning ritual mixing Himalayan pink salt, water, lemon and honey claims to boost metabolism, reduce bloating, and even accelerate fat loss. But credible medical sources now label it a pseudoscientific fad with no proven weight‑loss benefits—and potential risks for high blood pressure sufferers.

    Enter Trimology, a science‑backed supplement brand positioned as a safer, evidence‑based alternative. Rather than quick fixes or social media stunts, Trimology takes its inspiration from a traditional Ugandan weight‑maintenance ritual: women consuming bitter green bananas rich in resistant starch (RS2), which naturally support gut microbiome health and metabolic resilience. Trimology translates that ritual into a modern capsule form by delivering concentrated RS2 plus supporting pre‑ and probiotics. 

    While the Pink Salt Trick rides on viral popularity, Trimology is introduced as a metabolic reset system—one that doesn’t promise overnight miracles, but rather aims for sustainable internal recalibration through gut‑brain‑fat signaling pathways. Want to Learn More About Trimology? Click Here

    Why Trimology Is the Safer, Science‑Backed Alternative

    Enter Trimology — a next‑generation, gut‑first weight‑loss supplement designed to offer credible, long‑term benefit rather than a viral illusion. Unlike the Pink Salt Trick, which hinges on vague mineral magic and untested methods, Trimology is rooted in microbiome science and targeted metabolic support.

    • Biological foundation: Trimology blends resistant starch (RS2), chicory inulin, and a signature probiotic triad (including Clostridium butyricum, Akkermansia muciniphila, Bifidobacterium infantis) to feed fat‑regulating gut bacteria and restore healthy metabolic signals.
    • Ancient inspiration: Derived from research into a traditional Ugandan practice—women consuming bitter green bananas rich in RS2 stayed lean well into older age—Trimology replicates the benefits in a clean capsule instead of a literal banana ritual.
    • Transparent formulation: Ingredients and microbial strains are fully disclosed, sourced at pharmaceutical quality, and backed by peer‑reviewed research—not buried in proprietary blends.
    • User‑friendly delivery: One capsule taken daily with breakfast. No meal‑timing restrictions, no yo‑yo dieting, no fasting requirements—just simple consistency. That ease of use appeals especially to women juggling busy schedules.
    • Safety and clarity: Trimology does not rely on caffeine, stimulants, hormone disruptors, or laxatives. It’s not sold as a cure, but a metabolic reset—respecting the body’s natural systems with traceable ingredients and no outrageous promises.

    While the Pink Salt Trick offers instant visual appeal and anecdotal enthusiasm, Trimology emphasizes measured improvement, restoring the gut‑brain‑fat axis, promoting satiety, and supporting energy through internal recalibration—not by shocking the system or inflating expectations. Unlock the Full Story Behind Trimology– Learn More Now

    Why the Internet Believed Deep‑Fake Celebrities Promoted the Pink Salt Trick

    The Pink Salt Trick’s rapid rise is strongly tied to deep‑fake endorsements and manipulated celebrity faces. Reports indicate that creators used AI‑generated clips mimicking well‑known public figures “trying” or “endorsing” the trend. Sensational headlines and algorithm‑driven reach amplified the illusion of legitimacy.

    The strategy tapped into users’ trust in celebrities, piggy‑backing on FOMO (fear of missing out) by suggesting these are insider weight‑loss secrets. Social platforms prioritized visually compelling before‑after testimonials and simplified recipes—despite medical experts warning the trend is unsupported or potentially unsafe.

    In essence, trust was manufactured—the product had no clinical trials, no published data—but looked persuasive because of faux celebrity endorsement and viral momentum. In contrast, Trimology emphasizes transparency, open ingredient sourcing, and no misleading influencer claims.

    Why the Pink Salt Trick Doesn’t Work — and Might Be Harmful

    At first glance, the Pink Salt Trick Recipe seems harmless. After all, pink Himalayan salt is often marketed as a “natural” source of minerals like magnesium, calcium, and potassium. But when used improperly—or in excess—it becomes not only ineffective, but potentially dangerous.

    Here’s why:

    • Too much sodium: One teaspoon of pink Himalayan salt contains about 2,300 mg of sodium—the maximum daily limit recommended by most health authorities. Those doing the trick multiple times a day (as some videos suggest) could be ingesting well over the safe threshold, increasing risk of high blood pressure, fluid retention, and cardiovascular strain.
    • No real metabolic effect: Despite its reputation, there is no clinical evidence that pink salt boosts metabolism, burns fat, or suppresses appetite in any meaningful way. The minor effects people feel—such as increased fullness or reduced cravings—are likely due to hydration or placebo, not salt-specific properties.
    • Dehydration and electrolyte imbalance: In some versions of the trick, users consume large quantities of saltwater without adjusting their hydration elsewhere. This can disrupt the body’s sodium-potassium balance, especially dangerous for people with kidney conditions, hypertension, or existing heart issues.
    • No support for gut health: While pink salt may contain trace minerals, it offers no prebiotic or probiotic benefit, meaning it does nothing to support the gut microbiome—which scientists now agree plays a crucial role in regulating metabolism, insulin sensitivity, and weight stability.
    • Not FDA-regulated: Most of the Pink Salt Trick kits sold online are unregulated and vary widely in quality. Some are sourced from poorly tested suppliers and may contain microplastics or industrial contaminants.

    In contrast, Trimology was developed to avoid all of these pitfalls. Its probiotic strains and resistant starches are carefully dosed for metabolic safety, backed by lab data, and formulated in cGMP-certified facilities. There’s no sodium loading, no electrolyte disruption, and no gimmicky biohacks.

    Trimology’s gut-first approach helps re-establish satiety signaling, healthy blood sugar control, and long-term fat regulation—all while nurturing the digestive ecosystem, not irritating it. Its gradual, cumulative effects are exactly what the body needs—not a one-time shock that confuses internal systems and creates dependency.

    Perhaps most importantly, Trimology doesn’t promise miracles. It encourages consistency, not urgency, which is critical in breaking the cycle of fad-based dieting that trends like the Pink Salt Trick perpetuate. Trimology provides a more intelligent, research-backed solution

    How Trimology Supports Weight Loss

    Trimology supports weight loss by targeting foundational metabolic pathways—not by temporary suppression or dehydration. Its key strategy: nourish beneficial gut bacteria with RS2 and inulin to optimize butyrate production. Butyrate enhances insulin sensitivity, reduces systemic inflammation, and reinforces the gut lining—helping the body regulate blood sugar and fat storage more effectively.

    The included probiotic strains further support natural hunger regulation: Akkermansia is linked with improved satiety hormone function and better insulin response; Clostridium butyricum promotes sustained butyrate output; and Bifidobacterium infantis may help stabilize mood, reduce food cravings, and normalize ghrelin/leptin balance.

    Users are advised to take a single capsule each morning with water or coffee—no complex fasting windows, no food tracking. Over time (usually 2–4 weeks), users report sharper energy, fewer cravings, less bloating, and gradual weight reduction—consistent with internal metabolic reset before visible change.

    Trimology positions weight loss not as an immediate outcome, but as a secondary benefit of restoring internal harmony and resilience—ideally paired with healthy eating and movement, but not dependent on them.

    Key Ingredients of Trimology

    Trimology’s formula stands on five core active components:

    • Pharmaceutical‐grade RS2 (resistant starch): sourced from green banana or potato starch; resists digestion until it reaches the colon, where specific bacteria ferment it, producing butyrate—a short-chain fatty acid central to metabolic regulation.
    • Chicory root (inulin): a soluble fiber and prebiotic that nourishes a diverse gut microbiome, amplifying butyrate production and improving digestion and glucose response.
    • Clostridium butyricum: a robust butyrate-producer that helps lower inflammation, stabilize gut environment, and support fat-burning pathways.
    • Akkermansia muciniphila: known to improve gut barrier integrity, increase satiety hormone responses, and enhance insulin sensitivity—like a natural appetite regulator.
    • Bifidobacterium infantis: associated with reduced cravings, hormone regulation, better digestion, and mood balance—all supportive of sustainable weight.

    These ingredients were chosen not for hype, but for measurable roles in reactivating the gut‑brain‑fat axis. Together, they form what Trimology refers to as the “Signal Reset Triad”—a synergy that supports calm inflammatory processes, improved satiety, and metabolic resilience.

     Visit Trimology Official Website To Know More About ……..

    What Makes Trimology Different From Other Weight Loss Supplements

    Trimology diverges from traditional fat burners or appetite suppressants in several key ways:

    1. No stimulants or synthetic hormones: unlike energizing fat‑burners loaded with caffeine or hormone‑mimicking compounds, Trimology works through microbiome support—not chemical triggers.
    2. Transparent labeling: ingredients are clearly identified, including specific probiotic strains and prebiotic sources. No proprietary blends or ambiguous fillers—each component was selected based on clinical research.
    3. Simplicity and compatibility: single capsule daily, compatible with most lifestyles and diet plans. No food tracking, no cycles, no loading phases. Reviewers consistently praise its integration ease and non‑aggressive positioning.
    4. Sustainable orientation: Trimology encourages long‑term use to rebuild metabolic signaling—not short bursts of weight loss that fade when the supplement ends.
    5. Gut‑focused rather than symptom focused: Rather than treating appetite or bloating as surface issues, Trimology treats them as symptoms of disrupted gut‑brain communication, aiming for root‑cause recalibration.

    Why Women Over 30 Are More Likely to Fall for These Weight Loss Trends

    Women over 30—especially in their late 30s and 40s—often encounter metabolic shifts as hormonal cycles evolve and gut microbiome diversity diminishes. Age-related declines in resistant starch intake, poorer insulin sensitivity, and changing satiety hormone patterns can make weight less responsive to diet and exercise alone.

    Traditional diet programs often backfire for this demographic, causing fatigue, rebound weight gain, or hormonal disruption. Many women report frustration after trying numerous programs with limited long-term results. This vulnerability makes them more susceptible to quick-fix trends like the Pink Salt Trick—offering false hope with minimal effort and social proof.

    Trimology acknowledges these real challenges. Unlike superficial hacks, it works by targeting age‑sensitive systems: gut‑brain communication, butyrate deficit recovery, and hormone stability. Its gentle, supportive approach aligns with women’s busy lives and biological realities: a daily capsule versus restrictive detoxes or influencer‑pushed gimmicks.

    By addressing the invisible drivers of metabolic slowdown—not just calories or fat—Trimology offers a credible alternative for those most affected by modern metabolic.

    Is This Product Backed by Science?

    Yes—while Trimology is a supplement, its formula is built on published scientific research into resistant starch, gut microbiota, and metabolic signaling.

    • RS2 has been shown in multiple studies to increase butyrate production, reduce inflammation, and support healthy glycemic response.
    • Akkermansia muciniphila has clinical data linking it to improved insulin sensitivity and satiety hormone levels.
    • Clostridium butyricum is documented for its resilience and butyrate‑producing capacity.
    • Bifidobacterium infantis has been associated with reduced appetite and improved digestion.

    Although Trimology capsules themselves haven’t undergone large‑scale clinical trials, each ingredient is supported by peer‑reviewed research. Independent reviewers and affiliate health blogs repeatedly cite these scientific underpinnings in endorsement articles.

    Furthermore, Trimology emphasizes ingredient sourcing transparency, avoids false claims or miracle marketing, and communicates realistic expectations—traits aligned with science‑based consumer trust.

    Where To Get Trimology?

    Trimology is available exclusively through its official website. This direct‑to‑consumer model helps ensure authenticity, clarity in pricing and subscription options, and avoids counterfeit distribution common in third‑party marketplaces.

    In contrast to viral “Pink Salt Trick” videos with undisclosed affiliate links, Trimology’s official site provides detailed ingredient listings, FAQ sections, customer support contacts, and opt‑out cancellation policies at no hidden fees.

    Users should purchase only via the official domain to avoid scams or unauthorized resellers. Many reviewers also recommend starting with the introductory offer (typically 30‑day supply) before committing to longer subscriptions.

    Final Thoughts: Why This Trend Matters More Than It Seems

    On the surface, the Pink Salt Trick appears harmless: a pinch of salt, a glass of water, maybe lemon and honey. But beneath the glossy viral veneer lies the risk of misinformation, procedural mimicry, and potential health issues for those with hypertension or kidney conditions.

    This trend exemplifies what happens when social media bypasses scientific validation—when AI‑generated celebrity testimonials and simplified ritual hacks displace rigorous evidence and expert guidance. It’s a warning sign: even well‑meaning health culture can propagate dangerous fads fast.

    Trimology represents the opposite trajectory. It doesn’t promise instant transformation but offers a model of sustainable metabolic realignment rooted in gut science, real‑food traditions, and transparent sourcing. It shifts the narrative from external fixes to internal recalibration.

    In a cultural moment flooded with wellness trends, the difference between viral popularity and scientific credibility matters. The Pink Salt Trick may vanish as its lack of efficacy becomes clearer; Trimology, by contrast, seeks longer‑term trust through measurable ingredients and consumer empowerment.

    For consumers—especially women over 30—it’s a reminder to prioritize evidence over endorsement, gut‑health over gimmicks, and sustainable support over superficial trend chasing.

    Media Contact:
    Brand website: https://trimologyweight.com/
    Project name: Trimology
    Email: support@trimologyweight.com
    Phone: +1 (302) 467-2939

    Attachment

    The MIL Network

  • MIL-OSI: The Pink Salt Trick Recipe for Fast Weight Loss Trend in 2025: Why Trimology Is the Science-Backed Alternative

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, July 31, 2025 (GLOBE NEWSWIRE) —

    Pink Salt Trick Recipe Explained: Why It’s Trending for Weight Loss

    A viral wellness trend called the “Pink Salt Trick” has swept social media—particularly TikTok, Instagram, and wellness blogs. The hype: a morning ritual mixing Himalayan pink salt, water, lemon and honey claims to boost metabolism, reduce bloating, and even accelerate fat loss. But credible medical sources now label it a pseudoscientific fad with no proven weight‑loss benefits—and potential risks for high blood pressure sufferers.

    Enter Trimology, a science‑backed supplement brand positioned as a safer, evidence‑based alternative. Rather than quick fixes or social media stunts, Trimology takes its inspiration from a traditional Ugandan weight‑maintenance ritual: women consuming bitter green bananas rich in resistant starch (RS2), which naturally support gut microbiome health and metabolic resilience. Trimology translates that ritual into a modern capsule form by delivering concentrated RS2 plus supporting pre‑ and probiotics. 

    While the Pink Salt Trick rides on viral popularity, Trimology is introduced as a metabolic reset system—one that doesn’t promise overnight miracles, but rather aims for sustainable internal recalibration through gut‑brain‑fat signaling pathways. Want to Learn More About Trimology? Click Here

    Why Trimology Is the Safer, Science‑Backed Alternative

    Enter Trimology — a next‑generation, gut‑first weight‑loss supplement designed to offer credible, long‑term benefit rather than a viral illusion. Unlike the Pink Salt Trick, which hinges on vague mineral magic and untested methods, Trimology is rooted in microbiome science and targeted metabolic support.

    • Biological foundation: Trimology blends resistant starch (RS2), chicory inulin, and a signature probiotic triad (including Clostridium butyricum, Akkermansia muciniphila, Bifidobacterium infantis) to feed fat‑regulating gut bacteria and restore healthy metabolic signals.
    • Ancient inspiration: Derived from research into a traditional Ugandan practice—women consuming bitter green bananas rich in RS2 stayed lean well into older age—Trimology replicates the benefits in a clean capsule instead of a literal banana ritual.
    • Transparent formulation: Ingredients and microbial strains are fully disclosed, sourced at pharmaceutical quality, and backed by peer‑reviewed research—not buried in proprietary blends.
    • User‑friendly delivery: One capsule taken daily with breakfast. No meal‑timing restrictions, no yo‑yo dieting, no fasting requirements—just simple consistency. That ease of use appeals especially to women juggling busy schedules.
    • Safety and clarity: Trimology does not rely on caffeine, stimulants, hormone disruptors, or laxatives. It’s not sold as a cure, but a metabolic reset—respecting the body’s natural systems with traceable ingredients and no outrageous promises.

    While the Pink Salt Trick offers instant visual appeal and anecdotal enthusiasm, Trimology emphasizes measured improvement, restoring the gut‑brain‑fat axis, promoting satiety, and supporting energy through internal recalibration—not by shocking the system or inflating expectations. Unlock the Full Story Behind Trimology– Learn More Now

    Why the Internet Believed Deep‑Fake Celebrities Promoted the Pink Salt Trick

    The Pink Salt Trick’s rapid rise is strongly tied to deep‑fake endorsements and manipulated celebrity faces. Reports indicate that creators used AI‑generated clips mimicking well‑known public figures “trying” or “endorsing” the trend. Sensational headlines and algorithm‑driven reach amplified the illusion of legitimacy.

    The strategy tapped into users’ trust in celebrities, piggy‑backing on FOMO (fear of missing out) by suggesting these are insider weight‑loss secrets. Social platforms prioritized visually compelling before‑after testimonials and simplified recipes—despite medical experts warning the trend is unsupported or potentially unsafe.

    In essence, trust was manufactured—the product had no clinical trials, no published data—but looked persuasive because of faux celebrity endorsement and viral momentum. In contrast, Trimology emphasizes transparency, open ingredient sourcing, and no misleading influencer claims.

    Why the Pink Salt Trick Doesn’t Work — and Might Be Harmful

    At first glance, the Pink Salt Trick Recipe seems harmless. After all, pink Himalayan salt is often marketed as a “natural” source of minerals like magnesium, calcium, and potassium. But when used improperly—or in excess—it becomes not only ineffective, but potentially dangerous.

    Here’s why:

    • Too much sodium: One teaspoon of pink Himalayan salt contains about 2,300 mg of sodium—the maximum daily limit recommended by most health authorities. Those doing the trick multiple times a day (as some videos suggest) could be ingesting well over the safe threshold, increasing risk of high blood pressure, fluid retention, and cardiovascular strain.
    • No real metabolic effect: Despite its reputation, there is no clinical evidence that pink salt boosts metabolism, burns fat, or suppresses appetite in any meaningful way. The minor effects people feel—such as increased fullness or reduced cravings—are likely due to hydration or placebo, not salt-specific properties.
    • Dehydration and electrolyte imbalance: In some versions of the trick, users consume large quantities of saltwater without adjusting their hydration elsewhere. This can disrupt the body’s sodium-potassium balance, especially dangerous for people with kidney conditions, hypertension, or existing heart issues.
    • No support for gut health: While pink salt may contain trace minerals, it offers no prebiotic or probiotic benefit, meaning it does nothing to support the gut microbiome—which scientists now agree plays a crucial role in regulating metabolism, insulin sensitivity, and weight stability.
    • Not FDA-regulated: Most of the Pink Salt Trick kits sold online are unregulated and vary widely in quality. Some are sourced from poorly tested suppliers and may contain microplastics or industrial contaminants.

    In contrast, Trimology was developed to avoid all of these pitfalls. Its probiotic strains and resistant starches are carefully dosed for metabolic safety, backed by lab data, and formulated in cGMP-certified facilities. There’s no sodium loading, no electrolyte disruption, and no gimmicky biohacks.

    Trimology’s gut-first approach helps re-establish satiety signaling, healthy blood sugar control, and long-term fat regulation—all while nurturing the digestive ecosystem, not irritating it. Its gradual, cumulative effects are exactly what the body needs—not a one-time shock that confuses internal systems and creates dependency.

    Perhaps most importantly, Trimology doesn’t promise miracles. It encourages consistency, not urgency, which is critical in breaking the cycle of fad-based dieting that trends like the Pink Salt Trick perpetuate. Trimology provides a more intelligent, research-backed solution

    How Trimology Supports Weight Loss

    Trimology supports weight loss by targeting foundational metabolic pathways—not by temporary suppression or dehydration. Its key strategy: nourish beneficial gut bacteria with RS2 and inulin to optimize butyrate production. Butyrate enhances insulin sensitivity, reduces systemic inflammation, and reinforces the gut lining—helping the body regulate blood sugar and fat storage more effectively.

    The included probiotic strains further support natural hunger regulation: Akkermansia is linked with improved satiety hormone function and better insulin response; Clostridium butyricum promotes sustained butyrate output; and Bifidobacterium infantis may help stabilize mood, reduce food cravings, and normalize ghrelin/leptin balance.

    Users are advised to take a single capsule each morning with water or coffee—no complex fasting windows, no food tracking. Over time (usually 2–4 weeks), users report sharper energy, fewer cravings, less bloating, and gradual weight reduction—consistent with internal metabolic reset before visible change.

    Trimology positions weight loss not as an immediate outcome, but as a secondary benefit of restoring internal harmony and resilience—ideally paired with healthy eating and movement, but not dependent on them.

    Key Ingredients of Trimology

    Trimology’s formula stands on five core active components:

    • Pharmaceutical‐grade RS2 (resistant starch): sourced from green banana or potato starch; resists digestion until it reaches the colon, where specific bacteria ferment it, producing butyrate—a short-chain fatty acid central to metabolic regulation.
    • Chicory root (inulin): a soluble fiber and prebiotic that nourishes a diverse gut microbiome, amplifying butyrate production and improving digestion and glucose response.
    • Clostridium butyricum: a robust butyrate-producer that helps lower inflammation, stabilize gut environment, and support fat-burning pathways.
    • Akkermansia muciniphila: known to improve gut barrier integrity, increase satiety hormone responses, and enhance insulin sensitivity—like a natural appetite regulator.
    • Bifidobacterium infantis: associated with reduced cravings, hormone regulation, better digestion, and mood balance—all supportive of sustainable weight.

    These ingredients were chosen not for hype, but for measurable roles in reactivating the gut‑brain‑fat axis. Together, they form what Trimology refers to as the “Signal Reset Triad”—a synergy that supports calm inflammatory processes, improved satiety, and metabolic resilience.

     Visit Trimology Official Website To Know More About ……..

    What Makes Trimology Different From Other Weight Loss Supplements

    Trimology diverges from traditional fat burners or appetite suppressants in several key ways:

    1. No stimulants or synthetic hormones: unlike energizing fat‑burners loaded with caffeine or hormone‑mimicking compounds, Trimology works through microbiome support—not chemical triggers.
    2. Transparent labeling: ingredients are clearly identified, including specific probiotic strains and prebiotic sources. No proprietary blends or ambiguous fillers—each component was selected based on clinical research.
    3. Simplicity and compatibility: single capsule daily, compatible with most lifestyles and diet plans. No food tracking, no cycles, no loading phases. Reviewers consistently praise its integration ease and non‑aggressive positioning.
    4. Sustainable orientation: Trimology encourages long‑term use to rebuild metabolic signaling—not short bursts of weight loss that fade when the supplement ends.
    5. Gut‑focused rather than symptom focused: Rather than treating appetite or bloating as surface issues, Trimology treats them as symptoms of disrupted gut‑brain communication, aiming for root‑cause recalibration.

    Why Women Over 30 Are More Likely to Fall for These Weight Loss Trends

    Women over 30—especially in their late 30s and 40s—often encounter metabolic shifts as hormonal cycles evolve and gut microbiome diversity diminishes. Age-related declines in resistant starch intake, poorer insulin sensitivity, and changing satiety hormone patterns can make weight less responsive to diet and exercise alone.

    Traditional diet programs often backfire for this demographic, causing fatigue, rebound weight gain, or hormonal disruption. Many women report frustration after trying numerous programs with limited long-term results. This vulnerability makes them more susceptible to quick-fix trends like the Pink Salt Trick—offering false hope with minimal effort and social proof.

    Trimology acknowledges these real challenges. Unlike superficial hacks, it works by targeting age‑sensitive systems: gut‑brain communication, butyrate deficit recovery, and hormone stability. Its gentle, supportive approach aligns with women’s busy lives and biological realities: a daily capsule versus restrictive detoxes or influencer‑pushed gimmicks.

    By addressing the invisible drivers of metabolic slowdown—not just calories or fat—Trimology offers a credible alternative for those most affected by modern metabolic.

    Is This Product Backed by Science?

    Yes—while Trimology is a supplement, its formula is built on published scientific research into resistant starch, gut microbiota, and metabolic signaling.

    • RS2 has been shown in multiple studies to increase butyrate production, reduce inflammation, and support healthy glycemic response.
    • Akkermansia muciniphila has clinical data linking it to improved insulin sensitivity and satiety hormone levels.
    • Clostridium butyricum is documented for its resilience and butyrate‑producing capacity.
    • Bifidobacterium infantis has been associated with reduced appetite and improved digestion.

    Although Trimology capsules themselves haven’t undergone large‑scale clinical trials, each ingredient is supported by peer‑reviewed research. Independent reviewers and affiliate health blogs repeatedly cite these scientific underpinnings in endorsement articles.

    Furthermore, Trimology emphasizes ingredient sourcing transparency, avoids false claims or miracle marketing, and communicates realistic expectations—traits aligned with science‑based consumer trust.

    Where To Get Trimology?

    Trimology is available exclusively through its official website. This direct‑to‑consumer model helps ensure authenticity, clarity in pricing and subscription options, and avoids counterfeit distribution common in third‑party marketplaces.

    In contrast to viral “Pink Salt Trick” videos with undisclosed affiliate links, Trimology’s official site provides detailed ingredient listings, FAQ sections, customer support contacts, and opt‑out cancellation policies at no hidden fees.

    Users should purchase only via the official domain to avoid scams or unauthorized resellers. Many reviewers also recommend starting with the introductory offer (typically 30‑day supply) before committing to longer subscriptions.

    Final Thoughts: Why This Trend Matters More Than It Seems

    On the surface, the Pink Salt Trick appears harmless: a pinch of salt, a glass of water, maybe lemon and honey. But beneath the glossy viral veneer lies the risk of misinformation, procedural mimicry, and potential health issues for those with hypertension or kidney conditions.

    This trend exemplifies what happens when social media bypasses scientific validation—when AI‑generated celebrity testimonials and simplified ritual hacks displace rigorous evidence and expert guidance. It’s a warning sign: even well‑meaning health culture can propagate dangerous fads fast.

    Trimology represents the opposite trajectory. It doesn’t promise instant transformation but offers a model of sustainable metabolic realignment rooted in gut science, real‑food traditions, and transparent sourcing. It shifts the narrative from external fixes to internal recalibration.

    In a cultural moment flooded with wellness trends, the difference between viral popularity and scientific credibility matters. The Pink Salt Trick may vanish as its lack of efficacy becomes clearer; Trimology, by contrast, seeks longer‑term trust through measurable ingredients and consumer empowerment.

    For consumers—especially women over 30—it’s a reminder to prioritize evidence over endorsement, gut‑health over gimmicks, and sustainable support over superficial trend chasing.

    Media Contact:
    Brand website: https://trimologyweight.com/
    Project name: Trimology
    Email: support@trimologyweight.com
    Phone: +1 (302) 467-2939

    Attachment

    The MIL Network

  • MIL-OSI Security: Hays man sentenced to 4 years in prison on gun charges

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    BILLINGS – A Hays man who possessed illegal firearms was sentenced today to 48 months in prison to be followed by 3 years of supervised release, U.S. Attorney Kurt Alme said.

    Wylon Alfred Plainfeather, 54, pleaded guilty in March 2025 to one count of possession of an unregistered firearm and one count of possession of an unregistered silencer.

    U.S. District Judge Susan P. Watters presided.

    The government alleged in court documents that on December 27, 2022, law enforcement officers responded to a Billings residence to search for a probationer. The probationer was not present, but officers searched the house and found three firearms in the basement.

    As law enforcement was preparing to leave the residence following the search, Plainfeather pulled into the driveway. He admitted owning all three guns and acknowledged one was a sawed-off shotgun and another, a .22 caliber rifle, had a tube on it. Plainfeather said he fired the gun with the tube and claimed it was not very effective at making it quieter. He said he got all the firearms from the reservation and that he traded for them. Law enforcement officers confirmed the firearms were in operable condition but not registered to Plainfeather (or anyone else) in the National Firearms Registration and Transfer Record (NFRTR).

    Assistant U.S. Attorney Kelsey Hendricks prosecuted the case. The investigation was conducted by the ATF, Montana Division of Criminal Investigation, and Montana Probation and Parole.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    XXX

    MIL Security OSI

  • MIL-OSI Analysis: Will the latest diplomatic moves to end the war in Gaza work?

    Source: The Conversation – UK – By Jonathan Este, Senior International Affairs Editor, Associate Editor, The Conversation

    This article was first published in The Conversation UK’s World Affairs Briefing email newsletter. Sign up to receive weekly analysis of the latest developments in international relations, direct to your inbox.


    It feels as if things are moving at completely different speeds in Gaza and in the outside world. From the embattled Gaza Strip the narrative is depressingly familiar. Dozens more Palestinian civilians have been killed in the past 24 hours as they try to get hold of scarce supplies of food.

    Aid agencies report that despite air drops of supplies and “humanitarian pauses” in the fighting, the amount of food getting through to the starving people of Gaza remains pitifully insufficient.

    Two more children are reported to have died of starvation, bringing the total number of hunger-related deaths to 159, according to Palestinian sources quoted by al-Jazeera.

    US envoy Steve Witkoff arrived in Jerusalem for more talks as the US president Donald Trump posted his latest bout of social media diplomacy on his TruthSocial site, a message which appears pretty faithful to the Netanyahu government’s position: “The fastest way to end the Humanitarian Crises in Gaza is for Hamas to SURRENDER AND RELEASE THE HOSTAGES!!”

    Both sides continue to reject the other side’s demands, bringing ceasefire negotiations to an effective standstill.

    In the outside world, meanwhile, events seem to be gathering pace. A “high-level conference” at the United Nations in New York brought together representatives of 17 states, the European Union and the Arab League, resulting in “a comprehensive and actionable framework for the implementation of the two-state solution and the achievement of peace and security for all”.


    Sign up to receive our weekly World Affairs Briefing newsletter from The Conversation UK. Every Thursday we’ll bring you expert analysis of the big stories in international relations.


    What first catches the eye about this proposal, which was signed by Saudi Arabia,
    Qatar, Egypt and Jordan, is that it links a peace deal with the disarming and disbanding of Hamas. It also condemns the militant group’s savage attack on southern Israel on October 23 2023, which was the catalyst for the latest and arguably most grievous chapter of this eight-decade conflict. It’s the first time the Arab League has taken either of these positions.

    The New York declaration, as it has been dubbed, envisages the complete withdrawal of Israeli security forces from Gaza and an end to the displacement of Palestinians. Government will be the responsibility of the Palestinian Authority (PA), and a conference to be scheduled in Egypt will design a plan for the reconstruction of Gaza, much of which has been destroyed in the 20-month assault by the Israel Defense Forces.

    It is, writes Scott Lucas, a “bold initiative” which, “in theory could end the Israeli mass killing in Gaza, remove Hamas from power and begin the implementation of a process for a state of Palestine. The question is whether it has any chance of success.”

    Lucas, an expert in US and Middle East politics at the Clinton Institute of University College Dublin, is not particularly sanguine about the short-term prospects for a ceasefire and the alleviation of the desperate conditions for the people of Gaza. But what it represents more than anything else, is “yet another marker of Israel’s increasing isolation”.

    He points to recent announcements that France, the UK (subject to conditions) and Canada will recognise the state of Palestine at the UN general assembly in September. The prospect of normalisation between Israel and Arab states, at the top of the agenda a few short years ago, is now very unlikely. And in the US, which remains Israel’s staunchest ally, a Gallup poll recently found that public opinion is turning against Israel and its prime minister, Benjamin Netanyahu.




    Read more:
    New peace plan increases pressure on Israel and US as momentum grows for Palestinian statehood


    But how important are the declarations by France, the UK and Canada of intent to potentially recognise Palestinian statehood, asks Malak Benslama-Dabdoub. As expert in international law at Royal Holloway University of London, who has focused on the question of Palestinian statelessness, Benslama-Dabdoub thinks that the French and British pledges bear closer examination.

    The French declaration was made on July 24 on Twitter by the president, Emmanuel Macron. Macron envisages a “demilitarised” state, something Benslama-Dabdoub sees as a serious problem, as it effectively denies the fundamental right of states to self-determination and would rob a future Palestinian state of the necessary right to self-defence.

    The declaration by the UK prime minister that Britain may also recognise Palestinian statehood in September is framed as a threat rather than a pledge. Unless Israel agrees to a ceasefire, allows the UN to recommence humanitarian efforts and engages in a long-term sustainable peace process, the UK will go ahead with recognising Palestine at the UN.

    You have to consider that the UK government’s statement said that the position has always been that “Palestinian statehood is the inalienable right of the Palestinian people”. So to frame this as a threat rather than a demand is arguably to deny that “inalienable right”.




    Read more:
    UK to recognise Palestinian statehood unless Israel agrees to ceasefire – here’s what that would mean


    Paul Rogers also sees serious problems with the pledges to recognise Palestinian statehood. Demands for Hamas to disarm and play no further role in Palestinian government he sees as a non-starter as is the thought of a demilitarised Palestine. “Neither plan has the slightest chance of getting off the ground.”

    Rogers, who has researched and written on the Middle East for more than 30 years, also thinks that without the full backing of the US there is very little chance that a peace plan could succeed.

    Rogers finds it hard to believe that Washington will change tack on the Palestinian question, “unless the US president somehow gets the idea that his own reputation is being damaged”. There’s always a chance of this. News from the Gaza Strip is relentlessly horrifying and the aforementioned polls suggest many voters are reassessing their views of the conflict. But Trump is heavily indebted for his re-election to the far-right Christian Zionist movement, who wield a great deal of power with the White House.

    The other thing that might influence the conflict is if enough of the IDF’s top brass recognise the futility of waging what has always been an unwinnable conflict. This, writes Rogers, is whispered about in Israel’s military circles and one eminent retired general, Itzhak Brik, has come out and said: “Hamas has defeated us.”

    These, writes Rogers, are currently the only routes to an end to the conflict.




    Read more:
    UK and France pledges won’t stop Netanyahu bombing Gaza – but Donald Trump or Israel’s military could


    Inside Trumpian diplomacy

    We mentioned earlier that the Canadian prime minister, Mark Carney, has also pledged to recognise the state of Palestine in September. This was immediately greeted by Trump with the threat that he does so it will derail a trade deal with the US. Whether this will cut any ice with Carney, who had to make concessions to get the trade deal done in the first place, remains to be seen.

    But there’s a broader point here, writes Stefan Wolff. As Wolff reports, this week the foreign ministers of the Democratic Republic of Congo and Rwanda got together in Washington to sign a ceasefire deal, brokered by the US. Trump also claims to have successfully ended a conflict between India and Pakistan at the end of May and hostilities between Thailand and Cambodia earlier this month.

    Meanwhile his efforts to secure peace deals, or even a lasting ceasefire, in Gaza or Ukraine have been unsuccessful.

    Wolff considers why some countries respond to Trump’s diplomatic efforts while others don’t. There are a number of reasons, principally the US president’s ability to apply leverage through trade deals or sanctions and the differing complexity of the conflicts.

    He also points to the depleted resources of the US state department, Trump’s use of personal envoys with little foreign affairs experience and the US president’s insistence on making all the important decisions himself. He concludes: “The White House simply may not have the bandwidth for the level of engagement that would be necessary to get to a deal in Ukraine and the Middle East.”




    Read more:
    Why Donald Trump has stopped some conflicts but is failing with Ukraine and Gaza


    One US government department whose resources haven’t been depleted under Donald Trump is the US Immigration and Customs Enforcement agency, known as Ice. Part of the Department of Homeland Security, Ice has been responsible for identifying and detaining non-citizens and undocumented migrants.

    Their agents carry guns, wear masks and typically operate in plain clothes, although they often wear military kit. The agency received massive funding via Trump’s One Bzig Beautiful Bill Act earlier this month, which will allow the agency to recruit hundreds, if not thousands, of new agents. The number of arrests is increasing steadily, as is the disquiet their operations are prompting in many American cities, where opposition protests are also growing.

    Dafydd Townley, an expert in US politics at the University of Portsmouth, explains how Ice operates and where it sits in Donald Trump’s plan to deport millions of illegal migrants from the US.




    Read more:
    Masked and armed agents are arresting people on US streets as aggressive immigration enforcement ramps up


    World Affairs Briefing from The Conversation UK is available as a weekly email newsletter. Click here to get updates directly in your inbox.


    ref. Will the latest diplomatic moves to end the war in Gaza work? – https://theconversation.com/will-the-latest-diplomatic-moves-to-end-the-war-in-gaza-work-262380

    MIL OSI Analysis

  • MIL-OSI Security: CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization

    Source: US Department of Homeland Security

    Summary

    The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement. The purpose of this advisory is to highlight identified cybersecurity issues, thereby informing security defenders in other organizations of potential similar issues and encouraging them to take proactive measures to enhance their cybersecurity posture. This advisory has been coordinated with the organization involved in the hunt engagement.

    In 2024, CISA led a proactive hunt engagement at a U.S. critical infrastructure organization with the support of USCG analysts. During hunts, CISA proactively searches for evidence of malicious activity or malicious cyber actor presence on customer networks. The organization invited CISA to conduct a proactive hunt to determine if an actor had been present in the organization’s environment. (Note: Henceforth, unless otherwise defined, “CISA” is used in this advisory to refer to the hunt team as an umbrella for both CISA and USCG analysts).

    During this engagement, CISA did not identify evidence of malicious cyber activity or actor presence on the organization’s network, but did identify cybersecurity risks, including:

    • Insufficient logging;
    • Insecurely stored credentials;
    • Shared local administrator (admin) credentials across many workstations;
    • Unrestricted remote access for local admin accounts;
    • Insufficient network segmentation configuration between IT and operational technology (OT) assets; and
    • Several device misconfigurations.

    In coordination with the organization where the hunt was conducted, CISA and USCG are sharing cybersecurity risk findings and associated mitigations to assist other critical infrastructure organizations with improving their cybersecurity posture. Recommendations are listed for each of CISA’s findings, as well as general practices to strengthen cybersecurity for OT environments. These mitigations align with CISA and the National Institute for Standards and Technology’s (NIST) Cross-Sector Cybersecurity Performance Goals (CPGs), and with mitigations provided in the USCG Cyber Command’s (CGCYBER) 2024 Cyber Trends and Insights in the Marine Environment (CTIME) Report.

    Although no malicious activity was identified during this engagement, critical infrastructure organizations are advised to review and implement the mitigations listed in this advisory to prevent potential compromises and better protect our national infrastructure. These mitigations include the following (listed in order of importance):

    • Do not store passwords or credentials in plaintext. Instead, use secure password and credential management solutions such as encrypted password vaults, managed service accounts, or built-in secure features of deployment tools.
      • Ensure that all credentials are encrypted both at rest and in transit. Implement strict access controls and regular audits to securely manage scripts or tools accessing credentials.
      • Use code reviews and automated scanning tools to detect and eliminate any instances of plaintext credentials on hosts or workstations.
      • Enforce the principle of least privilege, only granting users and processes the access necessary to perform their functions.
    • Avoid sharing local administrator account credentials. Instead, provision unique, complex passwords for each account using tools like Microsoft’s Local Administrator Password Solution (LAPS) that automate password management and rotation.
    • Enforce multifactor authentication (MFA) for all administrative access, including local and domain accounts, and for remote access methods such as Remote Desktop Protocol (RDP) and virtual private network (VPN) connections.
    • Implement and enforce strict policies to only use hardened bastion hosts isolated from IT networks equipped with phishing-resistant MFA to access industrial control systems (ICS)/OT networks, and ensure regular workstations (i.e., workstations used for accessing IT networks and applications) cannot be used to access ICS/OT networks.
    • Implement comprehensive (i.e., large coverage) and detailed logging across all systems, including workstations, servers, network devices, and security appliances.
      • Ensure logs capture information such as authentication attempts, command-line executions with arguments, and network connections.
      • Retain logs for an appropriate period to enable thorough historical analysis (adhering to organizational policies and compliance requirements) and aggregate logs in an out-of-band, centralized location, such as a security information event management (SIEM) tool, to protect them from tampering and facilitate efficient analysis.

    For more detailed mitigations addressing the identified cybersecurity risks, see the Mitigations section of this advisory.

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See Appendix: MITRE ATT&CK Tactics and Techniques for a table of potential activity mapped to MITRE ATT&CK tactics and techniques.

    Overview

    Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard (USCG) analysts (collectively referred to as CISA in this report) conducted a threat hunt engagement at a critical infrastructure organization in 2024. During this hunt, CISA proactively searched for evidence of malicious activity or the presence of a malicious cyber actor on the customer’s network using host, network, industrial control system (ICS), and commercial cloud and open-source analysis tools. CISA searched for evidence of activity by looking for specific exploitation tactics, techniques, and procedures (TTPs) and associated artifacts.

    While CISA did not find evidence of threat actor presence on the organization’s network, the team did identify several cybersecurity risks. These findings are listed below in order of risk. Technical details of each identified cyber risk are included, along with the potential impact from threat actor exploitation of each risk (recommendations for mitigating each risk are listed in the Mitigations section below).

    Several of these findings align with those observed during similar engagements conducted by US Coast Guard Cyber Command (CGCYBER), which are documented in their 2024 Cyber Trends and Insights in the Marine Environment (CTIME) report. The authoring agencies encourage critical infrastructure organizations to review the CTIME report to understand trends in the techniques/attack paths threat actors are using to compromise at-risk organizations, and what mitigations organizations should implement to prevent a successful attack.

    Key Findings

    Shared Local Admin Accounts with Non-Unique Passwords Stored as Plaintext

    Details: CISA identified a few local admin accounts with non-unique passwords; these accounts were shared across many hosts. The credentials for each account were stored plaintext in batch scripts. CISA discovered these authorized scripts were configured to create user accounts with local admin privileges and then set identical, non-expiring passwords—these passwords were stored in plaintext in the script. One script was configured to create an admin account (set with a password stored in the script in plaintext) and automatically add to the admin group. The account was set as the local admin account on many other hosts.

    Potential Impact: The storage of local admin credentials in plaintext scripts across numerous hosts increases the risk of widespread unauthorized access, and the usage of non-unique passwords facilitates lateral movement throughout the network. Malicious actors with access to workstations with either of these batch scripts could obtain the passwords for these local admin accounts by searching the filesystem for strings like net user /add, identifying scripts containing usernames and passwords [T1552.001], and accessing these accounts to move laterally.

    For example, during a controlled security validation exercise (with explicit permission from the customer), CISA used the credentials found in one of the scripts to log into its associated admin account locally on a workstation [T1078.003], and then establish a Remote Desktop Protocol (RDP) connection to another workstation [T1021.001]. This demonstrated that the credentials allowed local login to an admin account and enabled lateral movement to any workstation with the account. While using this account, the user had local admin privileges on many workstations. Upon initiating the RDP session, the system issued out a notification that another user was currently logged in and that continuing the session would disconnect the existing user, confirming that the account can be accessed remotely via RDP.

    The uniform use of local admin accounts with identical, non-expiring passwords across numerous hosts, coupled with the storage of these credentials in plaintext within accessible scripts, elevates the risk of unauthorized access and lateral movement throughout the network.

    With local admin access, malicious cyber actors can:

    • Modify existing accounts or create new accounts [T1098], potentially escalating privileges or maintaining persistent access.
    • Install malicious browser extensions on compromised systems [T1112].
    • Communicate with compromised systems using standard application layer protocols [T1071], which may bypass certain security monitoring tools.
    • Modify local policies to escalate privileges or disable security features [T1484].
    • Alter system configurations or install software that executes at startup [T1547], ensuring continued access and persistence.
    • Hijack the execution flow of applications to inject malicious code [T1574].

    The widespread distribution of plaintext credentials and the use of identical passwords across hosts increases the risk of unauthorized access throughout the network. This vulnerability heightens the potential for attackers to conduct unauthorized activities, which may impact the confidentiality, integrity, and availability of the organization’s assets.

    Note: This finding was associated with workstations only; servers and other devices were not affected.

    Insufficient Network Segmentation Configuration Between IT and Operational Technology Environments

    Details: While assessing interconnectivity between the customer’s IT and operational technology (OT) environments, CISA identified that the OT environment was not properly configured. Specifically, standard user accounts could directly access the supervisory control and data acquisition (SCADA) virtual local area network (VLAN) directly from IT hosts.

    First, CISA determined it was possible to establish a connection via port 21 from a user workstation in the IT network to a system within the SCADA VLAN. The test established that a network path was available, the remote host was reachable, the port was open and listening for connections, and that the port was directly accessible between the IT and SCADA VLANs, with misconfigured network-level restrictions—for example, firewalls or access control lists (ACLs)—blocking the Transmission Control Protocol (TCP) connection on the port. This test was conducted using a standard user account on a regular IT workstation without administrative privileges [T1078].

    Second, CISA discovered that the customer did not have sufficient secured bastion hosts dedicated for accessing SCADA and heating, ventilation, and air conditioning (HVAC) systems. A bastion host­—sometimes referred to as a jump box or jump server—is a specialized, highly secured system (often a server or dedicated workstation) that serves as the sole access point between a network segment (such as an internal IT network) and a protected internal network (like an OT or ICS environment). By inspecting and filtering all inbound and outbound traffic, a bastion host is designed to prevent unauthorized access and lateral movement, ensuring that only authenticated and authorized users can interact with internal systems. Though several hosts were designated as bastion hosts for remote access to SCADA and HVAC systems, they lacked the enhanced security configuration, dedicated monitoring, and specialized scrutiny expected of bastion hosts.

    Potential Impact: Insufficient OT network segmentation configuration, network access control (NAC), and the ability of a non-privileged user within the IT network to use their credentials to access the critical SCADA VLAN [T1078] presents a security and safety risk. Given that SCADA and HVAC systems control physical processes, compromises of these systems can have real-world consequences, including risks to personnel safety, infrastructure integrity, and equipment functionality.

    Malicious actors could further exploit potentially unsecured workstations with access to OT systems, and insufficient network segmentation configuration between IT and OT systems, in the following ways:

    • Use RDP or Secure Shell (SSH) protocols to move laterally from compromised IT workstations to OT systems [T1021.001] [T1021.004].
    • Execute commands and scripts using scripting languages like PowerShell to attack OT systems [T1059].
    • Map network connections to identify paths to OT systems [T1049].
    • Gather information about network configurations to plan attacks on OT systems [T1016].

    By exploiting these weaknesses, attackers can potentially gain unauthorized access to critical OT systems, manipulate physical processes, disrupt operations, and cause harm.

    Insufficient Log Retention and Implementation

    Details: CISA was unable to hunt for every MITRE ATT&CK® procedure in the scoped hunt plan partly because the organization’s event logging system was insufficient for this analysis. For example, Windows event logs from workstations were not being forwarded to the organization’s security information event management (SIEM), verbose command line auditing was not enabled (meaning command line arguments were not being captured in Event ID 4688), logging in the SIEM was not as comprehensive as required for the analysis, and log retention did not allow for a thorough analysis of historical activity.

    Potential Impact: The absence of comprehensive and detailed logs, along with a lack of an established baseline for normal network behavior, prevented CISA from performing thorough behavior and anomaly-based detection. This limitation hindered the ability to hunt for certain TTPs, such as living-off-the-land techniques, the use of valid accounts [T1078], and other TTPs used by sophisticated threat actors. Such techniques often do not produce discrete indicators of compromise or trigger alerts from antivirus software, intrusion detection systems (IDS), or endpoint detection and response (EDR) solutions. Further, the lack of workstation logs in the organization’s SIEM meant CISA could not analyze authentication events to identify anomalous activities, such as unauthorized access using local administrator credentials. This gap exposes networks to undetected lateral movement and unauthorized access.

    Insufficient logging can prevent the detection of malicious activity by hindering investigations, which makes detection of threat actors more challenging and leaves the network susceptible to undetected threats.

    Additional Findings

    Misconfigured sslFlags on a Production Server

    Details: CISA used PowerShell to examine the ApplicationHost.config file[1]—a central configuration file for Internet Information Services (IIS) that governs the behavior of the web server and its applications and websites—on a production IIS server. CISA observed an HTTPS binding configured with sslFlags==“0”, which keeps IIS in its legacy “one-certificate-per-IP” mode. This mode disables modern certificate-management features, and because mutual Transport Layer Security (TLS) (client-certificate authentication) must be enabled separately in “SSL Settings” or by adding , the binding leaves the client-certificate enforcement off by default, allowing any TLS client to complete the handshake anonymously. Moreover, sslFlags does not control protocol or cipher selection, so outdated protocols or weak cipher suites (e.g., SSL 3.0, TLS 1.0/1.1) may still be accepted unless Secure Channel (Schannel)[2] has been explicitly hardened.

    Potential Impact: The misconfigured sslFlags could enable threat actors to attempt an adversary-in-the-middle attack [T1557] to intercept credentials and data transmitted between clients and the IIS server. Malicious actors could also exploit vulnerabilities in older Secure Sockets Layer (SSL)/TLS protocols, as well as weak cipher suites, increasing the risk for protocol downgrade attacks in which an attacker forces the server and client to negotiate the use of weaker encryption standards [T1562.010]. This compromises the confidentiality and integrity of data transmitted over this channel. Furthermore, the absence of client certificate enforcement meant the server did not validate the identity of the connecting clients beyond the basic SSL/TLS handshake. This deficiency exposed the server to risks where unauthorized or malicious clients could impersonate legitimate users, potentially gaining access to sensitive resources without proper verification.

    Misconfigured Structured Query Language Connections on a Production Server

    Details: CISA reviewed machine.config file on a production server and identified that it was configured with a centralized database connection string, LocalSqlServer, for both profile and role providers. This configuration implies that, unless overridden in each application’s web.config files, every ASP.NET site on the server connects to the same Structured Query Language (SQL) Express or aspnetdb database and shares the same credentials context.

    Additionally, CISA identified that the machine.config file set the minRequiredPasswordLength to be less than 15 characters, which is CISA’s recommended password length.

    Potential Impact: Using a centralized database approach increases risk, as a single breach or misconfiguration in this central SQL database server can compromise all applications dependent on the server. This creates a single point of failure and could be exploited by attackers aiming to gain broad access to the system.

    Additionally, setting the minimum password length to any password under 15 characters is more vulnerable to various forms of brute-force attacks, such as password guessing [T1110.001], cracking [T1110.002], spraying [T1110.003], and credential stuffing [T1110.004]. If a threat actor successfully cracked these weak passwords, they could gain unauthorized access to user or application accounts and leverage vulnerabilities within applications to further escalate privileges, potentially leading to unauthorized access to the backend SQL Server databases. This could result in data breaches, data manipulation, or a loss of database integrity.

    Mitigations

    CISA and USCG recommend that critical infrastructure organizations implement the mitigations below to improve their organization’s cybersecurity posture. Recommendations to reduce cyber risk are listed for each of CISA’s findings during this engagement and are ordered starting from the highest to lowest importance for organizations to implement. CISA and USCG also include general practices to strengthen cybersecurity for OT environments that are not tied to specific findings.

    These mitigations align with the Cross-Sector Cybersecurity Performance Goals jointly developed by CISA and the National Institute for Standards and Technology (NIST). The Cybersecurity Performance Goals (CPGs) provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful TTPs. Visit CISA’s CPGs webpage for more information.

    Many of these mitigations also align with recommendations made by CGCYBER in their 2024 CTIME report. The report provides relevant information and lessons learned about cybersecurity risks gathered through operations similar to this threat hunt engagement, and best practices to mitigate these risks. Please see the 2024 CTIME report for additional recommendations for critical infrastructure organizations to implement to harden their environments against malicious activity.

    Implement Unique Credentials and Access Control Measures for Administrator Accounts

    • Provision unique and complex credentials for local administrator accounts [CPG 2.C] on all systems. Do not use shared or identical administrative credentials across systems. Ensure service accounts/machine accounts have passwords unique from all member user accounts.
      • For example, organizations can deploy Microsoft LAPS (see Microsoft Learn’s Windows LAPS Overview for more information) to ensure each machine has a unique, complex local administrator password; passwords are rotated automatically within Microsoft Active Directory, reducing the window of vulnerability; and that password retrieval is limited to authorized personnel only.
    • Require phishing-resistant multifactor authentication (MFA) [CPG 2.H] in addition to unique passwords for all administrative access, including local- and domain-level administrator accounts, RDP sessions, and VPN connections.
    • Use privileged access workstations (PAWs) dedicated solely for administrative tasks and isolate them from the internet and general network to reduce exposure to threats and lateral movement.
      • Harden PAWs by applying CIS Benchmarks: limit software to essential administrative functions, disable unnecessary services and ports, and ensure regular updates and patches.
      • Enforce strict access controls to restrict PAW access to authorized administrators only.
    • Conduct continuous auditing of privileged accounts by regularly collecting and analyzing logs of administrative activities, such as login attempts, command executions, and configuration changes [CPG 2.T].
      • Configure automated alerts for anomalous behaviors, including logins outside standard hours, access from unauthorized locations, and repeated failed logins.
      • Periodically review all administrator accounts to confirm the necessity and appropriateness of access levels; align these auditing practices with NIST SP 800-53 Rev. 5 Controls AU-2 (Auditable Events) and AU-12 (Audit Record Generation).
    • Apply the principle of least privilege by limiting administrative privileges to the minimum required for users to perform their roles [CPG 2.E].
      • Create individual administrative accounts with unique credentials and role-specific permissions and disable or rename built-in local administrator accounts to reduce common attack vectors.
      • Avoid using shared administrator accounts to improve accountability and auditability, and ensure administrators use standard accounts for non-administrative tasks to minimize credential exposure.
      • Implement Role-Based Access Control (RBAC) to assign permissions based on job functions, as aligned with NIST SP 800-53 Rev. 5 Control AC-5 (Separation of Duties).
    • Identify and remove unauthorized or unnecessary local administrator accounts, maintain oversight by documenting and tracking all authorized accounts, and enforce strict account management policies by restricting account creation privileges and implementing approval workflows for new administrator accounts.

    Securely Store and Manage Credentials

    • Purge credentials from the System Center Configuration Manager (SCCM). Review SCCM packages, task sequences, and scripts to ensure that no plaintext credentials are embedded, and update or remove any configurations that deploy scripts with plaintext credentials.
    • Do not store plaintext credentials in scripts. Instead, store credentials in a secure manner, such as with a credential/password manager or vault, or other privileged account management solution [CPG 2.L].
    • Use encrypted communication. If scripts must retrieve credentials at runtime, use encrypted channels and protocols (e.g., TLS 1.3) to communicate with secure credential stores. Ensure that credentials are not written to disk or exposed in logs.
    • Use unique local administrator passwords, such as by deploying Microsoft LAPS. Set appropriate permissions on Active Directory attributes used by LAPS (ms-MCS-AdmPwd and ms-MCS-AdmPwdExpirationTime) per Microsoft’s security recommendations.

    Establish Network Segmentation Between IT and OT Environments

    • Assess the existing network architecture to ensure effective segmentation between the IT and OT networks [CPG 2.F]—this process should evaluate both logical and physical segmentation, ensuring clear boundaries between IT and OT assets.
      • Use NIST SP 800-82 Rev. 3 (Guide to OT Security) and International Electrotechnical Commission (IEC) 62443 standards as guides for network segmentation best practices.
      • Network segmentation is essential for containing breaches within isolated segments and preventing them from spreading across networks. Depending on your environment, consider implementing the following segmentation:
        • Implement VLAN segmentation with inter-VLAN access controls.
        • Create separate VLANs for IT and OT systems, specifically isolating OT components such as SCADA systems from IT network VLANs.
        • Configure inter-VLAN access controls, including Layer 3 ACLs, to restrict traffic between IT and SCADA VLANs.
        • Deploy firewalls with application-layer filtering capabilities to monitor and control data flow between the VLANs, ensuring that only authorized protocols and devices can communicate across segments.
    • Implement a demilitarized zone (DMZ) between IT and OT environments to provide an additional security layer.
      • Position firewalls at both the IT-DMZ and OT-DMZ boundaries to filter traffic and enforce strict communication policies.
      • Configure the DMZ to act as an intermediary, with only essential communications permitted between IT and OT networks.
      • Ensure the DMZ hosts shared services (e.g., bastion hosts, jump servers, or data historians) that require limited interaction with both environments, with access controls and monitoring in place.
    • Consider a full network re-architecture if current segmentation methods cannot effectively separate IT and OT networks.
      • Collaborate with cybersecurity and network experts to design an architecture that meets ICS-specific security requirements—this redesign may involve transitioning to a micro-segmented or zero trust architecture, which includes strict identity verification for all users and devices attempting to access OT assets.[3]
    • Implement unidirectional gateways (data diodes) where appropriate to prevent bidirectional communication.
    • Keep network diagrams, configuration files, and asset inventories up to date.
    • Regularly test segmentation controls to validate their effectiveness in restricting unauthorized access by conducting penetration testing and security assessments.
      • Include simulated breach scenarios to confirm that segmentation contains threats within isolated zones.
      • Ensure compliance with NIST SP 800-53 Rev. 5 Control AC-4 (Information Flow Enforcement) to align segmentation measures with best practices for controlled information flow.

    Prevent Unauthorized Access via Port 21

    • Disable File Transfer Protocol (FTP) services on SCADA devices and servers if they are not required. Replace FTP with secure alternatives, such as SSH FTP (SFTP) or FTP over TLS/SSL (FTPS).
    • Block inbound and outbound FTP traffic on port 21 using firewalls and ACLs.
      • Implement restrictive ACL policies at network boundaries to control FTP access across all network layers.
      • As outlined in CIS Control 9.2 (Limit Unnecessary Ports, Protocols, and Services), close any unused ports to strengthen network defenses.
    • Implement IDS/Intrusion Prevention System (IPS) technologies to monitor traffic between the IT network and SCADA VLAN, use signature and anomaly detection, and integrate IDS/IPS with a SIEM system for centralized monitoring.
    • Enhance authentication and encryption mechanisms. Require MFA for SCADA access, use secure remote access technologies when necessary, securely encrypt communications (using protocols such as TLS 1.2 or higher, preferably TLS 1.3), and establish VPN tunnels to communicate between IT networks and SCADA systems.
    • Perform network traffic filtering and deep packet inspection.
      • Use SCADA-aware firewalls capable of understanding SCADA protocols and inspecting and filtering traffic at the application layer.
      • Only allowlist authorized protocols and command structures to SCADA operations. Use one-way communication devices to prevent data from flowing back into the SCADA network.

    Establish Secure Bastion Hosts for OT Network Access

    • Ensure bastion hosts are dedicated secure access points exclusively used to access the OT network and deployed as exclusive management gateways for all devices within a network.
      • Make bastion hosts the single access points for conducting all administrative tasks, system management, and configuration changes; this centralizes access control and ensures any interaction with the OT system passes through a rigorously monitored and secure environment, minimizing the potential for unauthorized access.
    • Do not allow staff to use bastion hosts as regular workstations.
      • Provide staff with separate workstations for accessing email, internet browsing, etc., on the IT network.
      • Establish and enforce policies that prohibit non-administrative activities on bastion hosts, ensuring they remain dedicated to OT network access.
    • Regularly audit and monitor bastion hosts to maintain security integrity, prevent unauthorized use, and quickly address any vulnerabilities or policy non-compliance.
    • Configure comprehensive logging of all activities on bastion hosts, including authentication attempts, command executions, configuration changes, and file transfers. Aggregate logs into a SIEM.
    • Isolate bastion hosts from the IT network; bastion hosts should reside in a separate security zone with restricted communication pathways (see CISA’s infographic on Layering Network Security Through Segmentation).
      • Deploy bastion hosts in a DMZ, imposing physical and logical isolation from other networks.
      • Configure firewalls between the IT network, bastion hosts, and the OT network, enforcing strict access control policies to allow only necessary traffic.
    • Ensure secure configuration and hardening of bastion hosts: Comply with NIST SP 800-123 and CIS Benchmarks and CNSSI 4009-2015, remove nonessential applications and services to reduce the attack surface, configure system settings to be secure, conduct effective patch management, enforce the principle of least functionality, and disable unused ports and protocols.
    • Implement access control policies: remove any access permissions to the OT network from IT workstations and ensure only bastion hosts have access to the OT network.
      • Implement NAC solutions to enforce policy-driven access control decisions based on device compliance and user authentication to provide dynamic access control and real-time visibility into the devices on the network.
    • Equip each bastion host with robust authentication mechanisms, including phishing resistant MFA [CPG 2.H], to verify the identity of users accessing the network.
      • Align with AAL3 as defined in NIST SP 800-63B. AAL3 requires hardware-based authenticators and proof of possession of cryptographic keys through secure authentication protocols.
    • Implement stringent access controls that restrict access to authorized personnel only using RBAC principles, ensuring that personnel can only access information and perform tasks pertinent to their roles and duties. This reduces the risk of internal threats or lateral movement and prevents unauthorized access.
    • Securely configure remote access tools, including by using secure protocols and disabling remote access tools on IT workstations to the OT network, enforcing that all remote access occurs through bastion hosts.
      • Disable insecure protocols like Telnet and unencrypted VNC to prevent interception and unauthorized access.
      • Log all remote access sessions and monitor for unauthorized or anomalous activities.

    Implement Comprehensive Logging, Log Retention, and Analysis

    • Implement comprehensive and verbose (i.e., detailed) logging across all systems, including workstations, servers, network devices, and security appliances [CPG 2.T].
      • Enable logging of critical events such as authentication attempts, command-line executions with command arguments (Event ID 4688), and network connections.
    • Aggregate logs in an out-of-band, centralized location [CPG 2.U] where adversaries cannot tamper with them, such as a dedicated SIEM, in order to facilitate behavior analytics, anomaly detection, and proactive threat hunting [CPG 2.T, 2.U]. For more information on behavior- and anomaly-based detection techniques, see joint guidance Identifying and Mitigating Living off the Land.
    • Ensure comprehensive logging on bastion hosts for all activities. Capture detailed records of login attempts [CPG 2.G], commands executed (with command arguments enabled), configurations changed, and files transferred.
    • Continuously monitor logs for early detection of anomalous activities. Configure the SIEM to generate automatic alerts for suspicious activity and implement behavior analysis techniques to detect anomalies.
    • Securely store log backups and use tamper resistant storage [CPG 2.U] to prevent a threat actor from altering or purging logs to conceal malicious activity.

    For additional guidance on logging, see joint guidance Best Practices for Event Logging and Threat Detection.

    Securely Configure HTTPS Bindings and LocalSqlServer Connection String

    • Enforce both client certificate verification and secure renegotiation in IIS by configuring the sslFlags setting to “3” in the ApplicationHost.config file. Setting sslFlags=“3” requires clients to present valid X.509 certificates for authentication and implements the TLS Renegotiation Indication Extension (RFC 5746). To implement this, perform the following steps:
      • Locate the element for the HTTPS site within ApplicationHost.config.
      • Set the sslFlags attribute to “3”: .
      • Restart IIS to apply the changes: iisreset.
    • Restrict the server to use only secure and up-to-date SSL/TLS protocols and cipher suites.
      • Disable deprecated protocols like SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 to prevent protocol downgrade attacks that compromise the confidentiality and integrity of data.
    • Override the global settings in machine.config by modifying each application’s web.config file to define its own connection strings and providers. This isolates applications at the database level and allows for tailored security configurations for each application.
    • Create dedicated SQL Server database accounts for each application with permissions limited to necessary operations (e.g., SELECT, INSERT, UPDATE), and avoid granting excessive privileges.
      • Do not assign roles like db_owner or sysadmin to application accounts. This reduces the risk of privilege escalation and enhances accountability through segregated access logs.
    • Use machine.config only for configurations that must be applied globally across all applications on the server.
      • Audit the machine.config file to ensure no application-specific settings are present.

    Enforce Strong Password Policies

    • Implement a system-enforced policy that requires a minimum password length of 15 or more characters for all password-protected IT assets and all OT assets, when technically feasible [CPG 2.B].
      • Consider leveraging passphrases and password managers to make it easier for users to maintain sufficiently long passwords.
    • In instances where minimum password lengths are not technically feasible, apply and record compensating controls, such as rate-limiting login attempts, account lockout thresholds, and strong network segmentation. Prioritize these systems for upgrade or replacement.
    • Implement MFA [CPG 2.H] in addition to strong passwords (i.e., passwords 15 characters or longer).

    Additional Mitigation Recommendations to Strengthen Cybersecurity

    CISA and USCG recommend critical infrastructure organizations implement the following additional mitigations (not tied to specific findings from the engagement) to improve the cybersecurity of their IT and OT environments:

    • Secure RDP from the IT to OT environments by deploying dedicated VPNs for all remote interactions with the OT network. Using RDP without strong authentication practices can lead to credential theft. Additionally, RDP does not inherently segregate or closely monitor user sessions, which can allow a compromised session to affect other parts of the network.
      • Deploy VPNs with strong encryption protocols such as SSL/TLS or Internet Protocol Security (IPsec) [CPG 2.K] to safeguard data integrity and confidentiality; use MFA [CPG 2.H] at all VPN access points to ensure only authorized personnel can gain access.
      • Configure VPN gateways to perform rigorous security checks and manage traffic destined for the OT network, ensuring comprehensive validation of all communications through pre-defined security policies.
        • VPN gateways should function as the primary enforcement points for access controls, scrutinizing every data packet to detect and block unauthorized access attempts.
      • Align the VPN traffic monitoring with the DMZ’s capabilities to regulate and inspect the data flow between IT and OT environments.
      • As part of the broader network architecture review, ensure the VPN infrastructure is correctly segmented from other network resources [CPG 2.F] to prevent any spillover effects from the IT environment to the OT network, containing potential breaches within isolated network zones.
      • Within the VPN configuration, enforce strict routing rules that require all remote access requests to pass through the DMZ and be authenticated by bastion hosts. This minimizes the risk of unauthorized access and ensures that all remote interactions with the OT network are monitored and controlled.
    • If wireless technology is employed within the OT environment, implement Wi-fi Protected Access 3 (WPA3)-Enterprise encryption with strong authentication protocols like Extensible Authentication Protocol (EAP)-TLS to ensure data confidentiality and integrity.
      • Deploy and continuously monitor Wireless Intrusion Prevention Systems (WIPS) to detect, prevent, and respond to unauthorized access attempts and anomalous activities within the wireless network infrastructure.
      • Disable unnecessary features like Service Set Identifier (SSID) broadcasting and peer-to-peer networking, enable Media Access Control (MAC) filtering as an additional layer, and keep wireless firmware updated.

    Validate Security Controls

    In addition to applying mitigations, CISA and USCG recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA and USCG recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 9).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program—including people, processes, and technologies—based on the data generated by this process.

    CISA and USCG recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Contact Information

    Critical infrastructure organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

    Additional Resources

    For more information on improving cyber hygiene for critical infrastructure IT and OT environments, please see the following additional resources authored by CISA, CGCYBER, and international partners:

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. CISA and USCG do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and USCG.

    Version History

    July 31, 2025: Initial version.

    Appendix: MITRE ATT&CK Tactics and Techniques

    See Table 1 to Table 9 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 1: Initial Access
    Technique Title ID Use
    Valid Accounts T1078 Malicious actors could use access to valid accounts for access to IT and OT networks.
    Valid Accounts: Local Accounts T1078.003 Threat actors could use credentials obtained for local administrator accounts to gain administrator access to workstations or services that use the account.
    Account Manipulation T1098 Malicious actors could modify existing accounts or create new accounts to maintain access or escalate privileges. 
    Table 2: Execution
    Technique Title ID Use
    Command and Scripting Interpreter  T1059 Malicious actors could use script interpreters like PowerShell to execute commands and scripts. 
    Table 3: Persistence
    Technique Title ID Use
    Boot or Autostart Execution T1547 Malicious actors could configure autostart execution paths to ensure persistence.
    Hijack Execution Flow T1574 Malicious actors could hijack the execution flow of applications and inject malicious code.
    Table 4: Privilege Escalation
    Technique Title ID Use
    Domain or Tenant Policy Modification T1484 Malicious actors could modify domain policies to escalate privileges or evade defenses.
    Table 5: Defense Evasion
    Technique Title ID Use
    Modify Registry T1112 Malicious actors could install malicious browser extensions on compromised systems.
    Impair Defenses: Downgrade Attack T1562.010 Malicious actors could exploit vulnerabilities in older systems to force a downgrade to a less secure mode of operation.
    Table 6: Credential Access
    Technique Title ID Use
    Unsecured Credentials: Credentials in Files T1552.001 Malicious actors could search for and exploit credentials stored in unsecured files. 
    OS Credential Dumping T1003 Malicious actors could extract credentials from memory or storage from unsecured workstations.
    Adversary-in-the-Middle T1557 Malicious actors could position themselves between networked devices to intercept credentials and other data. 
    Brute Force: Password Guessing T1110.001 Malicious actors could systematically guess possible passwords.
    Brute Force: Password Cracking T1110.002 Malicious actors could recover plaintext credentials after obtaining password hashes or other similar credential material.
    Brute Force: Password Spraying T1110.003 Malicious actors could attempt to use a common password against different accounts to try to obtain account access. 
    Brute Force: Credential Stuffing T1110.004 Malicious actors could try to use credentials gained from an unrelated account to gain access to a desired account in the victim’s environment. 
    Table 7: Discovery
    Technique Title ID Use
    System Network Connections Discovery T1049 Malicious actors could map network connections to identify paths to OT systems from an unsecured IT workstation with access to the OT network. 
    System Network Configuration Discovery T1016 Malicious actors could use an unsecured workstation to discover network configurations.
    Table 8: Lateral Movement
    Technique Title ID Use
    Remote Services: Remote Desktop Protocol T1021.001 Malicious actors could use valid credentials to establish an RDP connection to access a workstation. 
    Remote Services: SSH T1021.004 Malicious actors could use valid accounts to establish an SSH connection to a workstation.
    Table 9: Command and Control
    Technique Title ID Use
    Application Layer Protocol T1071 Malicious actors could use application layer protocols to communicate with systems they compromised while blending in with existing network traffic. 

    MIL Security OSI

  • MIL-OSI USA: Sens. Budd, Heinrich Introduce Amendment to Crack Down on Illicit Anti-Obesity Drugs Entering the U.S. from China

    US Senate News:

    Source: United States Senator Ted Budd (R-North Carolina)

    Bipartisan amendment would help ensure FDA can utilize existing statutory authority to protect Americans from counterfeit, unapproved drugs from unregistered facilities in China

    Washington, D.C. — U.S. Senators Ted Budd (R-N.C.) and Martin Heinrich (D-N.M.) recently introduced an amendment to the 2026 Agriculture, Rural Development, Food and Drug Administration, and Related Agencies Appropriations Act to ensure the Food and Drug Administration (FDA) can activate regulatory and enforcement authorities to prevent the importation of illicit weight loss drugs and Active Pharmaceutical Ingredients (API) from the Republic of China and other foreign countries.

    These illicit products, which include unregulated versions of ingredients used in name-brand GLP-1 medicines, are often produced in facilities in China that are not always registered with the FDA and pose serious risks to American consumers, with sometimes fatal consequences.

    “The Chinese Communist Party has proven time and again that it is willing to exploit our supply chain and endanger American lives to advance its own interests,” said Senator Budd. “That includes flooding our country with counterfeit, unapproved weight-loss drugs made in unregulated facilities. It is critically important that the United States maintains the gold standard for safe, effective medicines and we must act decisively to protect American patients. I am glad to partner with Senator Heinrich on this important issue, and I look forward to working with Commissioner Makary and Secretary Kennedy to help ensure the FDA can shut the door on these dangerous products at our borders and hold bad actors accountable.”

    “We have a responsibility to protect Americans from dangerous, counterfeit drugs entering our country,” said Senator Heinrich. “Too many of these unapproved weight-loss drugs are being produced in unregistered facilities in China with no oversight and no regard for safety. That’s why I’m introducing bipartisan legislation with Senator Budd to ensure the FDA can crack down on these illicit imports and keep American consumers safe.”

    BACKGROUND

    A recent Federal Bureau of Investigation (FBI) public service announcement warned that counterfeit weight loss products have been found to contain both “drugs with high levels of impurities” and “unsafe or unapproved drugs” with misbranded or adulterated packaging. To protect America’s supply chain from these potential threats, actions from the FDA may include refusing the entry of illicit drugs and API, issuing warning letters to foreign suppliers, and initiating civil enforcement actions.

    This amendment follows a bipartisan letter Representative Richard Hudson (R-N.C.-09) led in sending to FDA Commissioner Marty Makary, which urged immediate action against the rising threat of illegal, counterfeit anti-obesity medications entering the United States.

    MIL OSI USA News

  • Trump wants deal to end Russia’s war in Ukraine by August 8, US tells UN

    Source: Government of India

    Source: Government of India (4)

    U.S. President Donald Trump has made clear that he wants a deal to end Russia’s war in Ukraine by August 8, the United States told the United Nations Security Council on Thursday.

    “Both Russia and Ukraine must negotiate a ceasefire and durable peace. It is time to make a deal. President Trump has made clear this must be done by August 8. The United States is prepared to implement additional measures to secure peace,” senior U.S. diplomat John Kelley told the 15-member council.

    Trump said on Tuesday that the United States would start imposing tariffs and other measures on Russia “10 days from today” if Moscow showed no progress toward ending its war in Ukraine.

    Kyiv and Moscow have held three rounds of talks in Istanbul this year that yielded exchanges of prisoners and bodies, but no breakthrough to defuse the more than three-year conflict.

    “We intend to continue the negotiations in Istanbul,” Russia’s deputy U.N. Ambassador Dmitry Polyanskiy told the council, but he added: “Despite the meetings in Istanbul, in the West, the war party did not go away … We continue hearing voices of those who think that diplomacy is just a way of criticizing Russia and exerting pressure on it.”

    Ukraine’s deputy U.N. Ambassador Khrystyna Hayovyshyn said Russia must be confronted with “unity, resolve and action.”

    “We seek a comprehensive, just and lasting peace grounded in the principles of the U.N. Charter and nothing less. We repeat – a full, immediate and unconditional ceasefire is essential. It is the first step to halting Russia’s war of aggression against Ukraine,” she told the council.

    (Reuters)

  • MIL-OSI Russia: Government meeting.

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    On the agenda: the results of a working trip to the Far Eastern and Siberian Federal Districts, writing off debt on budget loans to regions, and increasing the grace period for mortgage payments upon the birth of a second child.

    Opening remarks by Mikhail Mishustin:

    Good afternoon, dear colleagues!

    Before we move on to the agenda of today’s Government meeting, I would like to talk about the results of the trip to Omsk Oblast, which became the final point of our major working trip to the Far Eastern and Siberian Federal Districts.

    The region is developing. Significant infrastructure is being actively built, including transport infrastructure, which is part of the high-speed automobile route “Russia” – from St. Petersburg to Vladivostok. It is necessary to complete all planned work within the established deadlines.

    We visited several healthcare and educational facilities. We made a number of decisions on the hospital and clinic for war veterans so that participants in the special military operation could undergo treatment and recovery in comfortable conditions. Comprehensive support for our heroes is one of the key priorities of the Government.

    Agenda of the meeting

    Materials for the Government meeting on July 31, 2025

    We got acquainted with the course of the admission campaign at Omsk University. We will help with equipping its main building with educational equipment. We will allocate additional funds for major repairs of dormitories.

    The region presented its initiative to create an inter-university campus. The modern educational space will become a point of attraction for talented young people. This will be decided within the framework of the competition of the Ministry of Science and Higher Education.

    Participants of the meeting

    List of participants of the Government meeting, July 31, 2025

    In September, the first branch of a foreign university in our country, the Kazakh National University, will begin teaching students in Omsk. Almost everything is ready for its opening. We will continue to strengthen cooperation between the two countries in the field of higher education and scientific research.

    In the Amur Region, we inspected how the reconstruction of the airport complex is being carried out, the expansion of the road that leads to the airport – the most important objects for the region and residents. Here I would ask, Vitaly Gennadyevich (addressing V. Savelyev), you, the Ministry of Transport to monitor the timing and progress of the work.

    We also visited the customs and logistics terminal and the checkpoint on the border with China – Kani-Kurgan. I know how Vitaly Gennadyevich was actively involved in this. This will be a model checkpoint, to which we distribute, among other things, technological solutions built on domestic software products.

    Completion of its construction will increase the volume of transportation on the new bridge crossing over the Amur River. This is only part, I will say again, of the large work on developing cross-border logistics. Almost 180 billion rubles have been allocated for the modernization of points in the next three years, taking into account the prospective trade turnover and priority areas for the country.

    The most important thing now is that plans for launching such facilities in the region and throughout the country as a whole are implemented clearly and on time.

    In the Trans-Baikal Territory, in Chita, a separate meeting was held on issues of grain export development.

    Our own production covers our domestic needs. Let me remind you that Russia is a world leader in wheat and barley supplies abroad. The potential is even higher. It is important to fully realize it. We will continue to support our farmers, expand port capacities, and create the necessary infrastructure for both storage and transportation of products.

    Oksana Nikolaevna (addressing O. Lut), I would like to ask you to create additional opportunities for domestic agricultural producers to enter foreign markets.

    I know there are a number of questions. I also want to tell the members of the Government that we need to help our exporters in this regard.

    This is also necessary to increase the competitiveness of our economy and to fulfill the task approved by the President to increase exports of the Russian agricultural sector.

    We also inspected the perinatal center in Chita. The national project “Family” provides for its re-equipment already this year. Equipment is being received so that both mothers and babies receive modern treatment.

    This work continues throughout the country. In just six years, advanced equipment will be delivered to 142 perinatal centers, including nine federal ones.

    In Transbaikalia, major repairs are also being carried out at medical institutions, and a number of new ones are being created.

    Mikhail Albertovich (addressing M. Murashko), as we agreed, we need to monitor the construction deadlines to ensure their timely opening. This is very important for people. We need to interact more actively with colleagues from the region in this area.

    Issues of improving healthcare infrastructure were also given attention during a working visit to the Altai Republic. There, under the national project “Long and Active Life”, a hospital admissions department was built using federal funds. High-tech medical care will become even more accessible to local residents. It is in demand there.

    With the head of this Russian subject, Andrey Anatolyevich Turchak, we discussed in detail the progress of the implementation of the individual program of socio-economic development, which, by decision of the President, was formed until 2030.

    We also looked separately at how projects that are important for people are being implemented, including those to strengthen transport connectivity. Roads, bridges, and crossings are being repaired. The airport is being modernized. This is also important given the significant growth in tourist flow to this region. Travelers come there from all over Russia and from abroad. In early July, a separate domestic terminal opened in Gorno-Altaisk, and last week, a new international one, in line with all standards. Its first visitors were guests of the International Environmental Conference, in which we took part.

    Together with our colleagues – heads of government of a number of countries, during the plenary session we exchanged a vision of joint work to protect the environment in the interests of the present and future generations. We will strengthen cooperation in this important area.

    In our country, environmental well-being has been approved by the President as one of the national goals. We will continue to do everything necessary to achieve it. First of all, if we list the priorities, this is the conservation of forests, water bodies, rare species of animals and plants, the development of protected areas. We will also continue to form a closed-loop economy.

    The Ministry of Natural Resources needs to expand cooperation with foreign partners in all these areas. Establish an exchange of best practices, create conditions for ecotourism – all the colleagues who spoke spoke about this – so that more people could see pristine nature.

    And I would also like to say that the topic of ecology and environmental protection is very important for our colleagues from the CIS countries.

    This topic is also relevant for the Altai Territory. We discussed this in detail with Governor Viktor Petrovich Tomenko. In the region, with the support of the federal budget, transport accessibility is being improved, and the infrastructure needed for travelers is being formed. Without a doubt, this work should be continued.

    Colleagues, I ask all area curators to constantly monitor how the implementation of projects is proceeding locally.

    I would like to separately mention one important issue that I discussed with the governors of the Amur Region and the Zabaikalsky Krai – emergency situations caused by forest fires.

    The situation has now stabilized. But the fight against the fire required the involvement of additional forces – specialists, heavy equipment, aviation. In connection with which, of course, the costs of the necessary measures have increased. An order has been prepared to provide almost 1.4 billion rubles to these regions, as well as to Krasnoyarsk Krai and the Republic of Buryatia. These funds will be used to compensate for the costs of extinguishing the fires.

    It is difficult to predict fire situations and their intensity accurately, but I ask the leadership of regions where such cases are not uncommon to pay special attention to prevention. There should be no threats to people’s health and safety. And at the same time, of course, it is necessary to monitor the efficiency of spending budget funds.

    On to another topic.

    Document

    The government has written off debt on budget loans to eight regions that have implemented infrastructure projects

    The government continues to stimulate economic development in Russian regions. To do this, we are reducing the financial burden, primarily for those who actively attract investment and build infrastructure. For them, on the instructions of the President, we have provided the opportunity to write off two-thirds of the debt on budget loans. The corresponding rules were adopted in February.

    Today, we will write off such loans for eight more regions in the amount of over 47.27 billion rubles. These are the republics of Kalmykia and Karelia, as well as the Voronezh, Kirov, Kemerovo, Moscow, Smolensk and Tver regions. They previously allocated funds for the implementation of national projects, improvement of housing and utilities, resettlement of citizens from dilapidated housing, support for industry and other purposes.

    Such a decision on debts should have a positive impact on the budget system of these territories, on the dynamics of their development, which will contribute to the fulfillment of many tasks, including social issues.

    And also – about supporting families with children. This is one of the key priorities of the Government’s work, which the head of state has repeatedly drawn attention to. A number of measures have been taken on his instructions. Today we will supplement them with another one.

    A bill has been prepared that is intended to reduce the burden on parents paying off a mortgage. Currently, when a child is born, the borrower is entitled to a six-month credit holiday if his or her income has decreased by more than 20%, and the costs of servicing the loan exceed 40% of average monthly income.

    Now, for those who have given birth to or adopted a second or subsequent child, the grace period will be increased to one and a half years. At the same time, interest on the principal debt will be charged only from the 7th to the 18th month. And they can be paid not immediately, but after the obligations under the current agreement are paid off. In equal parts and with the same frequency as before.

    This will support families during the most difficult period, when one of the parents is caring for a child and is unable to go to work. And of course, we expect that together with other current measures, this will affect the demographic situation in the country as a whole.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: Marat Khusnullin: About 700 km of roads to sports facilities will be updated in 2025 thanks to the national project “Infrastructure for Life”

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    Thanks to the national project “Infrastructure for Life”, work continues on upgrading roads leading to stadiums, clubs, youth schools and other sports facilities. In total, this year it is planned to upgrade about 700 km of such sections of regional and local roads, Deputy Prime Minister Marat Khusnullin reported.

    “Updating roads to sports facilities is an important part of creating a comfortable environment. This helps ensure convenient and unimpeded access to sports facilities for thousands of residents. First of all, this is important for popularizing a healthy lifestyle. Thanks to the national project “Infrastructure for Life”, in 2025 we plan to bring 225 sections of the regional and local road network leading to stadiums, clubs, children’s and youth schools and other sports facilities to a regulatory state – this is 695 km of regional and local roads,” said Marat Khusnullin.

    Sporting events often attract large crowds. Good road conditions ensure safe traffic and pedestrian traffic, and reduce the risk of accidents and injuries.

    “In 2024 alone, 270 road sections were updated under the already completed national project “Safe High-Quality Roads”. Their total length was more than 800 km. Sports facilities are visited by people of all ages, including children. Therefore, we pay special attention to safety elements: we equip the necessary signs, traffic lights, sidewalks and pedestrian crossings,” said Minister of Transport Andrei Nikitin.

    In Bryansk, Menzhinsky Street is undergoing a major overhaul along its entire length – 2.3 km. This is the route to the Spartak stadium, which was renovated in 2020. The stadium is home to a sports school of the same name, where more than 200 young football players study. The road surface is being renovated, sidewalks and storm drains are being installed at the site. To ensure traffic safety, a pedestrian fence, outdoor electric lighting lines, speed bumps, bus stops, public transport access pockets and a new bus shelter will be installed, as well as new road signs, paint and thermoplastic markings with reflective elements.

    In the Bolsheglushitsky District of the Samara Region, a 1.4 km section of the access road to the village of Bolshaya Glushitsa is being overhauled. The road leads to the Yubileiny sports complex, which houses a structural division of the children’s and youth sports school based at Secondary Comprehensive School No. 2. There are 10 sports sections here. The school is attended by more than 150 children aged 5 to 18.

    Another significant “sports” route that is being repaired under the national project is a 9.2 km section of the Moscow Highway in Samara. This is part of the route to the Olympic Reserve Sports School No. 7 for Cycling named after Honored Coach of the USSR V.P. Petrov. More than 370 athletes undergo basic training here.

    The road to the sports facility is also being renovated in the Bogatovsky District. A section of the Bogatoye – Samara – Orenburg highway, almost 10 km long, is being repaired here. The highway leads to the district center – the village of Bogatoye. A children’s and youth sports school is located here on the basis of a secondary comprehensive school. 550 children are involved in sections in several areas: football, volleyball and judo. In addition to local children, the school is attended by children from nearby villages, including Andreyevka and Vilovatoye.

    In total, 10 road facilities leading to 25 sports facilities, with a total length of 80.87 km, will be renovated in the Samara Region under the national project “Infrastructure for Life” this year.

    In Krasnoyarsk, a 3.3 km section of Partizana Zheleznyaka Street is being repaired this year under the national project “Infrastructure for Life”. The street leads to the Sokol Ice Palace. Children’s and youth teams of the sports school train here in hockey. In addition, sports matches and figure skating competitions are held, which are attended by thousands of spectators from all over the region.

    Also this year, a 3.6 km section of Sverdlovskaya Street from Aleksandra Matrosova Street to house No. 73 was renovated. Now residents and guests of Krasnoyarsk can comfortably get to the Bobrovy Log ski resort, which includes trails of varying difficulty, a snowboard park, a cross-country ski route and other locations. This is a popular place for active winter recreation. More than 550 thousand residents and guests of the city visit it annually.

    In total, 12 sections of roads to sports facilities with a total length of more than 20 km will be updated in Krasnoyarsk Krai under the national project “Infrastructure for Life” this year.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI United Nations: Angola protests: UN urges restraint, investigations into deaths

    Source: United Nations MIL OSI

    The Office of the UN High Commissioner for Human Rights (OHCHR) on Thursday urged Angolan authorities to conduct prompt, thorough and independent investigations into the deaths, as well as the reported use of excessive force during the demonstrations.

    Unverified footage suggests that security forces used live ammunition and tear gas to disperse protesters, which points to an unnecessary and disproportionate use of force,” OHCHR spokesperson Thameen Al-Kheetan said.

    He added that while some demonstrators resorted to violence and looting, any force used by authorities must comply with international human rights standards.

    Any individuals who may have been arbitrarily detained must be immediately released.

    Rapid escalation in situation

    The protests began on Monday as a strike by minibus taxi drivers over a one-third rise in diesel prices, part of a government effort to reduce fuel subsidies. According to media reports, the demonstrations quickly spread, becoming one of Angola’s most disruptive protest waves in recent years.

    Government officials reported that at least one police officer was among those killed. Nearly 200 people are said to have been injured, and shops and vehicles reportedly vandalized – mostly in the capital, Luanda.

    Sporadic gunfire was also reported in parts of the city earlier in the week, and emergency services were overwhelmed. Many businesses remained shuttered Thursday and hospitals reportedly struggled to cope with the number of casualties.

    Ensure rights protection

    OHCHR emphasised that while authorities have a responsibility to maintain public order, they must do so in a way that protects human rights.

    All protesters taking to the streets to express their opinions should do so peacefully,” said Mr. Al-Kheetan. “All human rights violations must be investigated and those responsible held accountable.

    The UN rights office also reiterated the importance of safeguarding fundamental freedoms, including the rights to life, expression and peaceful assembly, in any law enforcement response.

    MIL OSI United Nations News

  • MIL-OSI United Nations: Speakers Stress Economic and Social Council’s Key Role in Responding to Today’s Global Challenges, as 54-Member Organ Begins 2026 Session, Elects Bureau

    Source: United Nations MIL OSI

    The Economic and Social Council commenced its 2026 session today, and as Canada handed its presidency to Nepal, speakers pointed to the important role that the organ must play in responding to the myriad challenges of the moment.

    Opening the meeting, Robert Rae (Canada), the Council’s President for its 2025 session, noted that “we hear a lot in the UN discourse about how things are broken, how things have fallen apart, how things are unhinged”.  While not disagreeing with those assessments, he emphasized:  “Our job is not to give speeches saying how terrible things are — our job is to roll up our sleeves and fix things.”  He added that no UN agency or body “has more of a responsibility to do that than the Economic and Social Council”.

    Urging that body to take its responsibilities seriously, he recalled some of the problems that the Council addressed over the past year — the role of artificial intelligence, the situation in Haiti and development in the UN context.  “I think this Council helped,” he stated.  He also pointed out that current questions regarding the UN’s relevance are not new — some even raised them when the Organization was founded — and spotlighted, as a counterpoint, the important discourse concerning the State of Palestine during the recent high-level conference on the two-State solution.

    President Appointed, Vice-Presidents Elected for 2026 Session 

    He concluded that the new Bureau will face new challenges ahead — “that’s how the world works” — and the Council then elected, by acclamation, Lok Bahadur Thapa (Nepal) as President of the Council at its 2026 session.

    Taking his seat at the podium, Mr. Thapa directed the Council to proceed to the election of the other Bureau members for that session.  The body then elected — also by acclamation — Amar Bendjamaa (Algeria), Paruyr Hovhannisyan (Armenia), Wellington Darío Bencosme Castaños (Dominican Republic) and Héctor Gómez Hernández (Spain) to serve as Vice-Presidents.

    Mr. Thapa then delivered his inaugural statement, emphasizing:  “For Nepal, this is a historic moment.”  Recalling that his country was admitted to the UN 70 years ago, he said that assuming Presidency of the Council for the first time is a “testament to our enduring commitment to multilateralism and our aspiration to contribute meaningfully to build trust, strengthen multilateral cooperation and achieve a more just, inclusive, equitable and resilient world”.

    Yet, “the world today is navigating a ‘polycrisis’” of conflict, climate disruption, economic uncertainty and deepening inequality, he said, also pointing to renewed great Power competition, escalating cyberthreats, an off-track 2030 Agenda for Sustainable Development, surging humanitarian needs and a $4 trillion annual financing gap for developing countries.  “In this context, the role of ECOSOC has never been more relevant and important,” he stated.

    Under ‘Delivering Better’ Motto, President Outlines Priorities for Session

    Noting that his Presidency will be guided by the motto of “Delivering Better”, he underscored that doing so “is not an option — it is an imperative”.  Detailing what that motto means for Nepal, he underlined the need to strengthen multilateralism and rebuild trust, accelerate the 2030 Agenda, ensure effective coordination and coherence within the UN system, strengthen partnerships and ensure implementation and follow-up.  “ECOSOC must evolve from convening dialogue to driving measurable impact,” he urged.

    He also outlined several priorities for his presidency, including transforming agriculture and food systems to strengthen food security and rural resilience; championing digital inclusion and youth entrepreneurship; and advancing climate action and resilience.  On the latter, he said that special focus will be placed on mitigating glacial lake outburst floods and protecting vulnerable communities.  Among other initiatives, he said that his presidency will also give “due priority to promoting the interests of countries in special situations”, as “their unique vulnerabilities demand tailored solutions”.

    “ECOSOC is our place,” he stressed, encouraging all present to “bring forward your vision, your ideas and your transformative solutions”.  He added: “We must send a clear and united message — multilateralism delivers, and it delivers for everyone.”

    Following that statement, the newly elected Vice-Presidents — the representatives of Algeria, Armenia, Dominican Republic and Spain — as well as delegates from China, Australia, Djibouti, Republic of Korea, South Africa and the European Union, took the floor to thank the outgoing Bureau and express support for the incoming one.  Many specifically thanked Mr. Rae for his work over the past year.

    Speakers also acknowledged the challenges ahead and underlined the Council’s important role in addressing them at this critical juncture for development.  An observer for the Major Groups and Other Stakeholders Coordination Mechanism, for her part, underlined the need for civil society to be heard during that endeavour.

    Under-Secretary-General for Economic and Social Affairs Says Urgent Action, Stronger Cooperation Key to Advance Sustainable Development Goals

    “Through its convening power — across segments, forums and special meetings — the Council has shown its continued relevance,” said Li Junhua, Under-Secretary-General for Economic and Social Affairs.  Today’s interconnected world demands stronger cooperation to achieve sustainable solutions, he pointed out, calling for “urgent” action to advance the Sustainable Development Goals (SDGs) as only 35 per cent of targets are currently on track.

    “ECOSOC’s role is central,” he stressed, “to forge consensus, provide policy guidance and mobilize coordination action and follow-up.”  Its eightieth anniversary invites reflection, and upcoming reviews are key opportunities to ensure the realization of its full potential.  He concluded:  “I urge all Member States to continue actively engaging with the Council to advance the implementation of its mandates and the realization of the SDGs.”

    Council Adopts Provisional Agenda, Working Arrangements for Session

    Following that, the Council adopted, without a vote, its provisional agenda (document E/2026/1) and working arrangements (to be issued as document E/2026/L.1) for 2026.

    MIL OSI United Nations News

  • MIL-OSI Security: Convicted Felon Pleads Guilty to Gun and Drug Charges

    Source: US FBI

    BUFFALO, N.Y.-U.S. Attorney Michael DiGiacomo announced today that Jeremy Hodge, 39, of Buffalo, NY, pleaded guilty before U.S. District Judge Lawrence J. Vilardo to possession with intent to distribute 40 grams or more of fentanyl and being a felon in possession of a firearm, which carry a mandatory minimum penalty of five years in prison, a maximum of 40 years, and a $5,000,000 fine.

    Assistant U.S. Attorney Jeffrey E. Intravatola, who is handling the case, stated that on April 4, 2025, the FBI executed a search warrant at Hodge’s Ernst Avenue residence, on his vehicle, and person. Law enforcement seized a semi-automatic handgun, ammunition, and drug paraphernalia. Hodge was arrested at the scene. He was previously convicted of felony charges in April 2008 and March 2009, and is legally prohibited from possessing a firearm.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    The plea is the result of an investigation by the Federal Bureau of Investigation Safe Streets Task Force, under the direction of Acting Special Agent-in-Charge Mark Grimm.

    Sentencing is scheduled for December 8, 2025, before Judge Vilardo.

    # # # #

     

    MIL Security OSI

  • MIL-OSI USA: Rep. Dan Goldman Convenes Section 8 & 9 Townhall to Discuss Trump Administration’s Threats to Affordable Housing

    Source: US Congressman Dan Goldman (NY-10)

    Goldman Joined by Representatives from NYCHA, NYC Housing Preservation and Development, and New York State Homes and Community Renewal  

     

    View a Recording of the Event Here 

    New York, NY – Congressman Dan Goldman (NY-10) hosted a Section 8 & 9 townhall at Grand St. Settlement to discuss how the Trump administration’s policies are affecting Section 8 and 9 housing in New York and help inform tenants on how city and state housing agencies may be impacted. The Congressman was joined by representatives from the New York City Housing Authority (NYCHA), New York City Housing Preservation and Development, and New York State Homes and Community Renewal. 

    “Programs like Section 8 and 9 are a vital lifeline for over one million New York residents who are already struggling to make ends meet, and as the Trump administration slashes funding and fires critical staff, I was proud to bring local officials together and give tenants a platform to ask questions and get answers,” Congressman Dan Goldman said. “With New York City set to remain in this administration’s cross-hairs, I will continue working at all levels of government to protect Section 8 and 9 tenants and ensure every single one has the safe, dignified, and affordable housing that they deserve.”  

    Since taking office, the Trump Administration has proposed sweeping changes to federal housing programs like Section 8 and Section 9 that would devastate low-income households. While they have not yet succeeded in enacting the most extreme policies, they’ve already caused serious harm, most notably by gutting HUD’s workforce by 30%. The administration’s budget proposals have called for drastic cuts to rental assistance, a two-year cap on support for able-bodied adults, and expanded work requirements that would jeopardize housing for thousands of working families, caregivers, and students. These changes, if implemented, would lead to mass evictions, overwhelming paperwork burdens, and a significant increase in homelessness—particularly in high-cost areas like New York City. Fortunately, Congress has so far rejected many of these proposals, but the threat remains real and ongoing. 

    In March, Goldman led 13 of his New York Delegation colleagues in sending a letter to Housing and Urban Development Secretary Scott Turner demanding that he reverse the Trump Administration’s decision to drastically reduce staffing at regional HUD field offices. The Administration’s “fork in the road” scheme and their potentially illegal firing of probationary workers had already left HUD field offices short-staffed and vulnerable. 

    ### 

    MIL OSI USA News

  • MIL-OSI USA: Rep. Dan Goldman’s Bipartisan Legislation Supporting Families of Fallen Law Enforcement Officers Passes Senate

    Source: US Congressman Dan Goldman (NY-10)

    Senate Adoption Tees Up Final Passage by the House in the Fall 

    ‘Chief Herbert D. Proffitt Act’ Ensures Those Who Give the Ultimate Sacrifice Are Not Unjustly Denied Benefits 

    Read the Bill Here 

    Washington, D.C. – Congressman Dan Goldman (NY-10) today celebrated the Senate’s passage of his bipartisan ‘Chief Herbert D. Proffitt Act,’ which would ensure the families of law enforcement officers who are killed as a result of their work on behalf of their communities are not unjustly denied benefits due to arbitrary retirement status restrictions. Under current law, families of officers who have retired but are later targeted and killed because of their past service are denied death benefits under the Public Safety Officers’ (PSOB) program. The unanimous Senate vote sets the legislation on a glide path to final passage by the House when members come back in session in September. Congressman Goldman introduced the legislation with Congressman Barr (KY-06) in February.  

    “We have an obligation to care for those who pay the ultimate price while serving in the line of duty, even after they have retired,” Congressman Dan Goldman said. “At a time when partisan gridlock is grinding Congress to a halt, I’m encouraged that both parties came together to pass this commonsense legislation honoring our fallen heroes. I urge Republican leadership to bring this bill to the House Floor in September and ensure that any law enforcement officers killed or injured in the line of duty receive the benefits they deserve—regardless of retirement status.” 

    Chief Herbert D. Proffitt dedicated his life to serving others, first as a U.S. Army veteran of the Korean War and then as a law enforcement officer for 55 years before retiring in 2009 as Chief of the Tompkinsville, Kentucky Police Department. On August 28, 2012, Chief Proffitt was tragically shot and killed in his driveway by an individual he had arrested a decade earlier. Although his murder was a direct retaliation for his service in uniform, his family was denied benefits under the PSOB program simply because he had retired. 

    Congressman Dan Goldman has made safeguarding public safety officers and first responders a key priority of his time in office.   

    In the Winter of 2024, Goldman publicly condemned the House Republican’s rejection of the bipartisan budget bill, which would have fully funded the World Trade Center Health Program (WTCHP).  
    In the Summer of 2024, Goldman, alongside other New York lawmakers, introduced a bipartisan, bicameral bill to address any funding gap or shortfall for World Trade Center Health Program. The ‘9/11 Responder and Survivor Health Funding Correction Act of 2024’ intended to secure permanent and mandatory funding for the WTCHP, to prevent any future funding shortfall.   
    In the Fall of 2023, Goldman joined Congressman Bill Pascrell (NJ-09), Senator Amy Klobuchar (D-MN), and Senator Kevin Cramer (R-ND) in introducing the ‘Honoring Our Fallen Heroes Act’ (Honor Act). This legislation would recognize occupational cancer deaths as line-of-duty deaths, and ensure fire fighters, police, and EMS personnel receive benefits under the Public Safety Officers’ Benefits (PSOB) program. 

    ### 

    MIL OSI USA News

  • MIL-OSI USA: Crockett, Henderson, Humphreys, Lewis, Montgomery and Shelby Counties Eligible for FEMA Public Assistance

    Source: US Federal Emergency Management Agency

    Headline: Crockett, Henderson, Humphreys, Lewis, Montgomery and Shelby Counties Eligible for FEMA Public Assistance

    Crockett, Henderson, Humphreys, Lewis, Montgomery and Shelby Counties Eligible for FEMA Public Assistance

    Local governments and certain nonprofit organizations in Crockett, Henderson, Humphreys, Lewis, Montgomery and Shelby counties are now eligible for FEMA Public Assistance grants for debris removal, emergency protective measures and permanent work to repair public facilities that were damaged by the April 2-24 severe storms, straight-line winds, tornadoes and flooding

     These counties join Carroll, Cheatham, Davidson, Decatur, Dyer, Fayette, Gibson, Grundy, Hardeman, Hardin, Haywood, Henry, Hickman, Houston, Lauderdale, Madison, McNairy, Obion, Perry, Stewart, Wayne and Tipton counties which were all previously approved for FEMA Public Assistance

     FEMA’s Public Assistance program provides reimbursement to local and state government agencies for the costs of emergency response, debris removal and restoration of disaster damaged public facilities and infrastructure

    Houses of worship and other nonprofit organizations may also be eligible for FEMA Public Assistance

    kwei

    nwaogu
    Thu, 07/31/2025 – 12:12

    MIL OSI USA News

  • MIL-OSI USA: President Trump Ends Unfair “De Minimis” Tariff Exemption, A Major Victory in Securing the Homeland

    Source: US Federal Emergency Management Agency

    Headline: President Trump Ends Unfair “De Minimis” Tariff Exemption, A Major Victory in Securing the Homeland

    President Trump’s Executive Order empowers DHS to continue cracking down on smuggling and unfair trade practices
    WASHINGTON – President Trump signed an Executive Order suspending duty-free de minimis tariff exemptions for low-value shipments from all countries
    His order empowers Homeland Security Secretary Kristi Noem to close this loophole which was used to avoid tariffs and smuggle deadly synthetic opioids like fentanyl into the United States

    “For decades, bad actors have taken advantage of America’s de minimis process by smuggling in deadly narcotics, harmful products, and other contraband in hidden products,” said Department of Homeland Security Assistant Secretary Tricia McLaughlin
    “This loophole led to the death of thousands of Americans, fueled the opioid crisis, and harmed US
    consumers
    This decision to end de minimis will save American lives, increase revenue, and protect the American consumer and entrepreneur”
    Under the de minimis treatment, imported goods that are valued at or under $800 were exempt from tariff duties
    Countries exploited this system to flood the American market with cheap goods that undercut American manufacturers and cost American jobs
    This exemption also allowed drug cartels and other criminal organizations to smuggle drugs and other contraband into our country

    Over the past decade the volume of de minimis shipments to the United States exploded, growing from 134 million shipments in 2015 to over 1
    36 billion shipments in 2024
    De minimis shipments accounted for 90% of all cargo seizures in FY 24
    These shipments often broke the law with 98% of narcotics seized from cargo falling under the de minimis exemption, as well as 97% of counterfeit items seized

    Now, thanks to President Trump’s Executive Order, this loophole is closed
    US Customs and Border Protection is empowered to enforce tariffs on these goods and can continue to protect the homeland from the smuggling of deadly synthetic opioids like fentanyl and counterfeit goods
    This will save American lives, protect American jobs, and restore billions in lost revenue

    # # #

    MIL OSI USA News

  • MIL-OSI USA: Nearly all National Guard soldiers in Los Angeles are demobilizing, Governor Newsom demands those remaining be released

    Source: US State of California 2

    Jul 31, 2025

    What you need to know: With nearly all National Guard soldiers demobilizing, Governor Gavin Newsom is calling on the President to allow the 300 remaining National Guard soldiers to go home now. 

    Los Angeles, CaliforniaNearly two months after the unlawful federalization of units of the California National Guard, and deployment of almost 5,000 soldiers in the Los Angeles area, all but 300 National Guard members are able to go home. So far, 4,700 soldiers have begun demobilizing. The President should allow the remaining soldiers to go back to their families, communities, and civilian professions as doctors, law enforcement and teachers.

    President Trump is realizing that his political theater backfired. This militarization was always unnecessary and deeply unpopular. The President must do the right thing to end this illegal militarization now because the economic and societal impacts are dire. The women and men of our military deserve more than to be used as props in the federal government’s propaganda machine.

    Governor Gavin Newsom

    Although it is unclear whether the National Guard has received formalized orders to begin additional demobilizations, an estimated 300 guardsmembers will continue to be stationed at Joint Forces Training Base, Los Alamitos without a clear mission, direction, or a timeline for returning to their communities. California urges Trump and the Department of Defense to end this theatrical deployment and send all remaining guardsmembers home immediately.

    Earlier this month, 2,000 federalized National Guard members and 700 Marines were called off their mission in Los Angeles. However, nearly 2,000 soldiers remained at Los Alamitos. 

    Economic impact of this political theater 

    After the federal government deployed the military unlawfully and began ramping up immigration raids statewide, the number of people reporting to work in the private sector in California decreased by 3.1% — a downturn only recently matched by the period when people stayed home from work during the COVID-19 lockdown.

    Governor Newsom recently met with local restaurant owners in the City of Bell and faith leaders in Downey to discuss the economic impact these indiscriminate immigration actions have had on their small business.

    Trump’s actions have a ripple effect – the state’s economy is likely to contract later this year due to fallout from global tariffs and immigration raids in Los Angeles and other cities that have rattled key sectors, including construction, hospitality, and agriculture, according to a UCLA Anderson forecast. 

    Mass arrests, detentions and deportations in California could slash $275 billion from the state’s economy and eliminate $23 billion in annual tax revenue. The loss of immigrant workers, undocumented and those losing lawful status under the Trump administration, would delay projects (including rebuilding Los Angeles after the wildfires), reduce food supply, and drive up costs. Undocumented immigrants contributed $8.5 billion in state and local taxes in 2022 — a number that would rise to $10.3 billion if these taxpayers could apply to work lawfully.

    Drugs arriving at the border, fewer soldiers to stop them

    Typically, under the Governor’s command, nearly 450 servicemembers are deployed statewide, including at ports of entry, to combat transnational criminal organizations and seize illegal narcotics. CalGuard’s servicemembers dedicated to the state’s Counterdrug Task Force have been reassigned by President Trump to militarize Los Angeles. The consequences are dire – CalGuard’s efforts help ensure the public safety of communities statewide.

    Police off the streets, teachers out of classrooms

    Of the 4,000 National Guard members sent to Los Angeles under Trump’s order, their servicemembers have been pulled from essential civilian duties such as medical and first responders, service workers, building trades contractors, law enforcement personnel, corrections officers, civil service and government workers, technology specialists, educators and teachers, and agriculture workers.

    End the power grab now

    Community leaders, public officials, veterans and others agree – the federal government’s actions in California not only have a chilling effect on the state’s society and economy, but also continue to undermine the valuable contributions from members of the military while in and out of uniform. 

    Republican and Democratic former governors agree—Trump’s federalization violates the critical balance between state and federal government. Recently, a bipartisan group of 25 former governors filed a brief in support of Newsom v. Trump, urging the court to enforce state sovereignty and block the unprecedented federalization of the National Guard. 

    Retired four-star admirals and generals and former secretaries of the Army and Navy filed another amicus brief outlining the grave risks of Trump’s illegal takeover of the CalGuard. Several veterans and veteran rights’ groups came together to decry Trump’s militarization of California.

    Recent news

    News What you need to know: In response to concerns from local elected leaders and community members about the potential for widespread SB 9 development concentrated in areas rebuilding from destructive fires and crowding evacuation routes, the Governor today issued…

    News SACRAMENTO – Governor Gavin Newsom today announced that he has signed the following bills:AB 17 by Assemblymember Juan Alanis (R-Modesto) – Elections: precinct maps.AB 377 by Assemblymember David Tangipa (R-Clovis) – High-Speed Rail Authority: business plan:…

    News What you need to know: California is standing up for all Americans by challenging Trump’s unlawful tariff policy, which is slowing the national economy and raising prices for consumers.  SACRAMENTO – Governor Gavin Newsom today filed an amicus brief in support of…

    MIL OSI USA News

  • MIL-OSI Security: Gunrunner Who Illegally Trafficked More than 200 Firearms to DC Area Sentenced to 84 Months in Prison

    Source: Office of United States Attorneys

                WASHINGTON – Michael Pittman, 30, of the District of Columbia, was sentenced today to 84 months in federal prison in connection with trafficking more than 200 illegal firearms from Georgia and North Carolina to the Washington D.C. area where he sold many of them to convicted felons, announced U.S. Attorney Jeanine Ferris Pirro.

                Pittman pleaded guilty on April 14, 2025, to conspiracy to commit firearms trafficking.

                In addition to the 84-month prison term, U.S. District Court Judge Tanya S. Chutkan ordered Pittman to serve three years of supervised release.

                Joining in the announcement was Special Agent in Charge Anthony Spotswood of the Washington Field Division of the Bureau of Alcohol, Tobacco, Firearms, and Explosives, and Chief Pamela A. Smith of the Metropolitan Police Department.

                According to court documents, from at least April 2023 through May 2024, Pittman rented cars and drove to Georgia and North Carolina where he purchased guns from illegal firearm suppliers. Pittman re-sold the firearms in the D.C. area, advertising them through different means. He took photos of the firearms displayed on his bed with prices.

                Between April 2023 through May 2024, Pittman obtained, advertised, or sold 200 or more firearms.

                On May 30, 2024, Virginia State Police arrested Pittman in Mecklenburg County, Virginia, as he was returning to D.C. from a buying trip. Pittman fled from a traffic stop before he crashed and ran into the nearby woods. Police recovered Pittman’s backpack which contained 16 firearms, an additional firearm he had dropped, and two firearms he had left in his vehicle.

                Law enforcement subsequently obtained a warrant and searched Pittman’s residence. In Pittman’s home, law enforcement recovered hundreds of rounds of ammunition, firearm cleaning and repair tools, firearm magazines, and three additional firearms. Law enforcement also observed the same red-and-black patterned bed spread observed in the images from Pittman’s phone.

                Pittman has one prior felony conviction for second degree assault in Prince George’s County, Maryland, for which he was sentenced to two years in prison suspended as to all but 30 days.

                This case was investigated by the Bureau of Alcohol, Tobacco, Firearms and Explosives Washington Field Division with valuable assistance from the Virginia State Police. It was prosecuted by Assistant U.S. Attorneys Cameron A. Tepfer and Sarah Martin.

    24cr296

    MIL Security OSI

  • MIL-OSI Security: Serial Armed Robber and Rapist Sentenced for “Nightmarish” Crimes

    Source: Office of United States Attorneys

    DETROIT – Today, Deandre Martece Williams was sentenced to 327 months in prison on charges of felon in possession of a firearm and kidnapping, in connection with a series of armed robberies, non-fatal shootings, and rapes he committed in 2023, United States Attorney Jerome F. Gorgon Jr. announced. In sentencing Williams, United States District Judge Mark A. Goldsmith stated that Williams’s “utter disregard for human dignity is breathtaking in the worst sense of the word” and referred to his conduct as “nightmarish.” During a three month stretch in 2023, Williams victimized fifteen people in eight separate incidents, seriously injuring four people, and raping three at gunpoint.

    Gorgon was joined in the announcement by James Deir, Special Agent in Charge of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), Detroit Field Division, Chief Todd Bettison, Detroit Police Department (DPD), and Kym Worthy, Wayne County Prosecutor.

    During the investigation, DPD collected fired cartridge casings from the scene of multiple shootings. With the help of the ATF and the National Integrated Ballistic Information Network (NIBIN), they identified a pattern of targeting sex workers and their customers. The ATF and DPD methodically pieced together other evidence from the crime scenes and identified Williams as a suspect. On October 20, 2023, ATF agents executed a federal search warrant at Williams’s house, arrested him, and found the gun used in the robberies.

    Williams frequently found his victims in parked cars along neighborhood streets. Williams commonly approached on foot, placed his handgun through an open window or door, and robbed his victims. After the robberies, Williams shot at several of the victims as they tried to flee. Several of the victims were injured by gunfire. Williams raped two of his victims during the robberies.

    Through their investigation of the robberies, the ATF and DPD uncovered evidence linking Williams to a rape and adult kidnapping. Williams and that victim had agreed to meet over a dating app. When Williams arrived at the victim’s hotel room, he pulled out a handgun and held the victim at gunpoint for several hours while repeatedly raping the victim.

    Williams’s arrest for the robberies also led to DNA evidence linking him to an unsolved Criminal Sexual Conduct from 2012. Williams pleaded guilty to two counts of Criminal Sexual Conduct in the Third Circuit Court in Detroit for those offenses and was sentenced in March to 10 years 6 months up to 20 years prison in the Wayne County Third Circuit Court.

    “We should all hate robbery and cruelty. And this sinister man did plenty of both. For years, he was prowling around our streets. But through ingenuity and hard work, the ATF and DPD made our city safer,” said U.S. Attorney Gorgon.

    “Deandre Williams is a ruthless predator who used firearms to dominate, violate, and destroy lives,” said ATF Special Agent in Charge James Deir. “He didn’t just break the law — he shattered families, preyed on the vulnerable, instilled fear, and left a trail of mayhem wherever he went. ATF’s unique firearm expertise will continue to be the bedrock of gun violence reduction efforts in Detroit.  This expertise enables ATF and our law enforcement partners to identify AND target the most prolific shooters across the Detroit metropolitan community for federal prosecution.  Mr. Williams is a poster child for what this partnership does: removing violent thugs from the community. Williams will now need to pack a suitcase because he will be behind bars.  Exactly, where he deserves to be.”

    “The investigation of Deandre Williams yielded an unexpected dividend.  WCPO was able to successfully prosecute Williams on a 2012 sexual assault case as a direct result of evidence collected in his federal cases.  We are pleased that all of his victims will see him receive the justice he deserves,” said Wayne County Prosecutor Kym Worthy.

    This case was investigated by the Bureau of Alcohol Tobacco, Firearms and Explosives in conjunction with the Detroit Police Department. The case is being prosecuted by the United States Attorney’s Office for the Eastern District of Michigan.

    MIL Security OSI

  • MIL-OSI United Kingdom: PM call with President El-Sisi of Egypt: 31 July 2025

    Source: United Kingdom – Executive Government & Departments

    Press release

    PM call with President El-Sisi of Egypt: 31 July 2025

    The Prime Minister spoke to President of Egypt Abdel Fattah El-Sisi this evening.

    The Prime Minister spoke to President of Egypt Abdel Fattah El-Sisi this evening to discuss the situation in Gaza.

    The leaders agreed the situation on the ground was a humanitarian catastrophe, and all possible efforts needed to be made to get more aid into Gaza at a greater pace and scale.

    The Prime Minister outlined his peace plan and pathway to recognition and thanked the President for his leadership in the region to secure a lasting and durable two state solution.

    It was vital there was an immediate ceasefire and the release of all hostages, the Prime Minister added.

    The leaders also discussed the relationship between the UK and Egypt, including how both countries could work closer together to support regional security.

    The leaders agreed to stay in close touch.

    Updates to this page

    Published 31 July 2025

    MIL OSI United Kingdom

  • MIL-OSI USA: Risch, Colleagues Introduce Legislation to Ensure Fairness for Firearm Small Businesses

    US Senate News:

    Source: United States Senator for Idaho James E Risch

    WASHINGTON – U.S. Senator Jim Risch (R-Idaho) and 17 Republican colleagues today introduced the Equal Shot Act. The legislation prohibits the Small Business Administration (SBA) from discriminating against firearm-related businesses.

    “Federal agencies have no authority to deny critical support to small businesses based on ideological bias,” said Risch. “The Equal Shot Actdefends the Second Amendment rights of Idaho’s small business firearm industry and ensures these law-abiding Americans have fair access to resources that will help them thrive.”

    Risch is joined by U.S. Senators Mike Crapo (R-Idaho), Marsha Blackburn (R-Tenn.), Ted Budd (R-N.C.), Shelley Moore Capito (R-W.Va.), Bill Cassidy (R-La.), Steve Daines (R-Mont.), Deb Fischer (R-Neb.), Lindsey Graham (R-S.C.), Cindy Hyde-Smith (R-Miss.), Jim Justice (R-W.Va.), John Kennedy (R-La.), James Lankford (R-Okla.), Mike Lee (R-Utah), Cynthia Lummis (R-Wyo.), Tim Scott (R-S.C.), Tim Sheehy (R-Mont.), and Tommy Tuberville (R-Ala.) in introducing the Equal Shot Act.

    The Equal Shot Act was introduced in the House by U.S. Representative Roger Williams (R-Texas), chairman of the House Committee on Small Business.

    “The Equal Shot Act ensures every eligible small business is treated fairly and without political bias,” said Williams. “Under the Biden Administration, firearm-related businesses were targeted and singled out by federal agencies and financial institutions simply because of what they represent. These law-abiding job creators should not be punished for supporting the Second Amendment. I want to thank Senator Risch for his support on this important legislation. Every business on Main Street deserves the same opportunity to succeed.”

    “Under the last administration, the Small Business Administration was caught red-handed adopting discriminatory policies aimed at denying financial assistance to members of the firearm industry that provide the means for Americans to exercise their Second Amendment rights,” said Lawrence G. Keane, National Shooting Sports Foundation (NSSF) Senior Vice President and General Counsel. “The federal government should not be picking winners and losers in a free market based on political ideology. Every lawful business should have an equal shot at success. NSSF is grateful to Senator Risch for his leadership in sponsoring the Equal Shot Act which will ensure the Small Business Administration can never again be weaponized to deny financial assistance to help small businesses in our industry grow and create jobs that are vital to the future of our nation’s economy and the Second Amendment.”

    MIL OSI USA News

  • MIL-OSI United Nations: ‘Delivering better’: New ECOSOC president emphasises climate action, food security

    Source: United Nations 2

    Mr. Thapa said that the motto of his presidency will be “Delivering Better,” which requires strengthening partnerships and multilateralism to achieve more effective implementation of initiatives, including the 2030 Agenda adopted 15 years ago.  

    “Delivering better is not an option — it is an imperative. It is our pathway to restoring trust in multilateralism, bridging divides, empowering the most vulnerable and translating commitments into action,” he said.  

    Four vice-presidents were also elected for the coming year: Amar Bendjama (Algeria), Héctor Gómez Hernández (Spain), Wellington Darío Bencosme Castaños (Dominican Republic) and Paruyr Hovhannisyan (Armenia).

    80 years of ECOSOC 

    The UN Economic and Social Council (ECOSOC) is one of the six principal organs of the United Nations, responsible for promoting international economic and social cooperation and development.

    It has 54 member States, elected by the General Assembly for three-year terms on a rotating basis, with seats distributed by region.

    ECOSOC coordinates the work of UN specialized agencies, commissions and bodies on issues ranging from sustainable development and human rights. It also serves as a central platform for fostering debate, forging consensus, and promoting action on global economic and social issues.

    For Mr. Thapa, this body is central to shaping the world’s development agenda and ensuring that no one is left behind.  

    “ECOSOC is our place. It needs dedication, participation and active engagement of all UN membership and stakeholders,” he said.  

    Five ways to deliver better

    While “delivering better” will be the motto of Mr. Thapa’s presidency, he outlined five specific areas upon which he and the Council will focus in the coming year.

    With over 735 million people worldwide experiencing hunger, his first priority area is transforming agriculture to strengthen rural resilience and end hunger.  

    Digital entrepreneurship and youth engagement are tied to this — and are his second priority area. He noted the “youth bulge” in many developing countries which he said will be a powerful demographic asset if it can be taken advantage of.  

    Like ECOSOC presidents before him, his third priority area deals with climate action and resilience. This time, however, he would like ECOSOC to focus specifically on glacier lakes and floods.  

    His final two priority areas are reforming the international financial architecture so that it is more inclusive and commemorating the 80th anniversary of ECOSOC.  

    Mr. Thapa noted that he and ECOSOC’s membership will be working to achieve these challenges in the midst of multiple, interlinking crises including accelerating climate change, rising geopolitical tensions and decreasing trust in the multilateral system.  

    “These challenges are systemic and interconnected. They demand integrated, inclusive and forward-looking responses,” Mr. Thapa said.  

    Fix, repair, mend

    Before Mr. Thapa’s remarks, Bob Rae, the outgoing president of ECOSOC and Canada’s Ambassador to the UN, reflected on his tenure. He acknowledged that the world is currently in a time of great hardship and genuine anguish.  

    But he said that it must be the job of ECOSOC — and UN Member States more broadly — to not only give voice to this anguish and hardship but to actually find solutions for it as well.  

    “We hear a lot in the UN discourse about how things are broken, how things have fallen apart, how things are unhinged … But our job is to fix, it’s to repair, it’s to mend, it’s to allow things to heal, it’s to make change happen,” Mr. Rae said.  

    Both Mr. Thapa and Mr. Rae affirmed that multilateralism can work and that ECOSOC should play a unique role in rewriting the narrative surrounding international cooperation.  

    “We must reaffirm our collective belief in the power of multilateralism — not as an abstract ideal, but as a pragmatic tool for delivering better outcomes for all,” Mr. Thapa said.  

    MIL OSI United Nations News

  • MIL-OSI USA: More Than 80 Lawmakers Demand Investigation Into State Department Decision to Intentionally Destroy Food for Starving Children, Millions in Contraceptives

    Source: United States House of Representatives – Representative Don Beyer (D-VA)

    U.S. Representative Don Beyer (D-VA), Appropriations Subcommittee Ranking Members Grace Meng (D-NY) and Lois Frankel (D-FL), and Rep. Judy Chu (D-CA), Chair of the Reproductive Freedom Caucus’s Contraception, Family Planning, and Education Task Force, today led 79 Representatives in demanding an investigation into the U.S. Department of State’s decision to spend an additional $300,000 in taxpayer dollars to destroy nearly 500 metric tons of life-saving emergency food aid and $9.7 million worth of contraceptives, rather than distributing the aid as intended or working with another trusted partner willing to take over distribution. In the letter addressed to Acting Inspector General for the U.S. Department of State Arne B. Baker, the lawmakers condemned the State Department’s decision as financial mismanagement that squanders taxpayer dollars and a moral failure, abandoning vulnerable populations who depend on U.S. aid to survive. 

    They wrote to Acting Inspector General for the U.S. Department of State Arne B. Baker:

    We write to request an investigation into waste and mismanagement on the part of the U.S. Department of State, which has reportedly chosen to destroy nearly 500 metric tons of emergency food aid and $9.7 million worth of contraceptives rather than delivering the much-needed aid as intended.

    “According to reporting, the State Department intends to destroy roughly $800,000 worth of high-energy biscuits intended to feed children under five years of age. That comes after alleged severe mismanagement of the food aid, including multiple officials failing to respond to memos regarding future plans for the biscuits for months. After that failure of leadership, the Department now plans to spend $130,000 – on top of the original $800,000 – to incinerate the planned food aid.

    “Following a similar pattern, the State Department also reportedly still intends to destroy $9.7 million of contraceptives, including IUDs and birth control implants, at the cost of $167,000 to the American taxpayer. Concerningly, the reporting found that these contraceptives are perfectly viable for delivery; they are long-lasting, with an expiration date of 2027, and most do not include USAID labels that would require rebranding. Incinerating contraceptives that are viable, with no rush and clear demand, is the equivalent of lighting U.S. taxpayer dollars on fire.

    “This pattern of intentional incineration at the expense of the U.S. taxpayer is financially wasteful, morally bankrupt, and an attack on the American humanitarian tradition. These actions place ideological beliefs and politics above a faithful commitment to U.S. law, contracts, and humanitarian agreements. Given that these officials have given no indication that they will place the law over their personal vendettas against our humanitarian tradition, external oversight is necessary.

    “We therefore request that your office immediately open an investigation into this documented waste of existing State Department supplies and waste of additional taxpayer funds to destroy those supplies, as well as the Department’s refusal to use these commodities for their intended purposes or partner with organizations or countries willing to take on responsibility for these commodities. Please provide an update on the status of such investigation by August 8, 2025.” 

    The letter to Acting Inspector General Baker was sent by U.S. Representatives Don Beyer (VA), Grace Meng (NY), Lois Frankel (FL), Judy Chu (CA), Robert Garcia (CA), Debbie Wasserman Schultz (FL), Betty McCollum (MN), Emanuel Cleaver (MO), Sarah Elfreth (MD), Nikema Williams (GA), Brendan Boyle (PA), Yassamin Ansari (AZ), Jonathan Jackson (IL), Alexandria Ocasio-Cortez (NY), Mike Quigley (IL), Greg Landsman (OH), Stephen Lynch (MA), Dave Min (CA), Maxine Waters (CA), Lateefah Simon (CA), Nanette Barragán (CA), Lloyd Doggett (CA), Debbie Dingell (MI), Sylvia Garcia (TX), Sarah McBride (DE), Seth Moulton (MA), Deborah Ross (NC), Josh Gottheimer (NJ), Mike Thompson (CA), Maggie Goodlander (NH), Sydney Kamlager-Dove (CA), Sean Casten (IL), Ami Bera (CA), Dina Titus (NV), Troy Carter (LA), Mark DeSaulnier (CA), Chellie Pingree (ME), Steve Cohen (TN), Dwight Evans (PA), Nydia Velázquez (NY), Haley Stevens (MI), Marc Veasey (TX), Darren Soto (FL), Danny Davis (IL), Mike Levin (CA), Mark Takano (CA), Suzan DelBene (WA), Julia Brownley (CA), Marcy Kaptur (OH), Adam Smith (WA), Jan Schakowsky (IL), Norma Torres (CA), Laura Friedman (CA), Rashida Tlaib (MI), John Garamendi (CA), Wesley Bell (MO), Sheila Cherfilus-McCormick (FL), Kelly Morrison (MN), Raja Krishnamoorthi (IL), Hank Johnson (GA), Frederica Wilson (FL), Chrissy Houlahan (PA), Yvette Clarke (NY), Val Hoyle (OR), Kweisi Mfume (MD), Lori Trahan (MA), Jennifer McClellan (VA), Ed Case (HI), Brittany Pettersen (CO), Eric Swalwell (CA), Julie Johnson (TX), Paul Tonko (NY), André Carson (IN), Jerry Nadler (NY), Eugene Vindman (VA), Jill Tokuda (HI), Robin Kelly (IL), Bill Keating (MA), Madeleine Dean (PA), Bonnie Watson Coleman (NJ), Jared Huffman (D-CA), Jim McGovern (D-MA) and Congresswoman Eleanor Holmes Norton (DC).

    A signed copy of the letter is available here.

    MIL OSI USA News

  • MIL-OSI USA: “Free Money” Gang Members Indicted for Committing Murder at Local Shopping Center

    Source: US State of Vermont

    Two alleged members of Free Money, a violent Houston-based street gang, were indicted yesterday in the Southern District of Texas for their alleged roles in the murder of one individual and attempted murder of another during a gang-related ambush.

    According to court documents, Free Money members and associates engage in robbery, home invasions, drug distribution, and murder. The defendants, Terry Ardoin, 24, and Travonte Ardoin, 27, both of Houston, allegedly committed the murder in connection with an ongoing gang war with a rival group.

    On June 24, 2022, in broad daylight, surveillance footage captured the Ardoins following a Chevrolet Equinox into a shopping center parking lot in a Black Nissan Altima. As alleged in court documents, the driver of the Equinox entered a nearby store while the passenger remained in the vehicle. When the driver returned, the Ardoins allegedly exited the Altima wearing masks and opened fire on both individuals.

    Witnesses reported hearing numerous gunshots and described the distinct sound of a fully automatic weapon, believed to have been modified with a machine gun conversion device commonly referred to as a “switch.” 

    Multiple rounds struck the vehicle’s passenger compartment. Houston Police Department officers responded within minutes and found one victim deceased.

    Terry and Travonte Ardoin are charged with murder in aid of racketeering, attempted murder in aid of racketeering, use of a firearm in furtherance of a crime of violence and causing death through the use of a firearm. If convicted, they face a maximum penalty of life in prison or a death sentence. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI conducted the investigation with the assistance of the Houston Police Department.

    Trial Attorney Ralph Paradiso of the Criminal Division’s Violent Crime and Racketeering Section (VCRS) and Assistant U.S. Attorney Benjamin Brown for the Southern District of Texas are prosecuting the case.

    This case is part of the Criminal Division’s Violent Crime Initiative to prosecute violent crimes in Houston. The Criminal Division and the U.S. Attorney’s Office for the Southern District of Texas have partnered, along with local, state, and federal law enforcement agencies, to confront violent crimes committed by gang members and associates through the enforcement of federal laws and use of federal resources to prosecute the violent offenders and prevent further violence.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: Bloods Gang Member Apprehended in Durham in Possession of a Firearm while on Post-Release Supervision Sentenced

    Source: Office of United States Attorneys

    GREENSBORO – A Durham, North Carolina man was sentenced today in Greensboro to 8 years in prison after pleading guilty to a firearm charge, announced United States Attorney Clifton T. Barrett of the Middle District of North Carolina (MDNC).   

    WILLIAM LOVELL HARPER, age 26, was sentenced to a total of 96 months imprisonment plus 3 years of post-release supervision by the Honorable William L. Osteen, Jr., United States District Judge for the MDNC.

    According to court records, on September 4, 2024, officers apprehended HARPER on Hillsborough Road in Durham and recovered a loaded handgun from his person. At the time of his apprehension, HARPER had three active warrants for his arrest, including one stemming from a robbery in Durham on March 2024 and another for violating his post-release supervision. HARPER had been previously convicted of Assault with a Deadly Weapon Inflicting Serious Injury and Robbery with a Dangerous Weapon in Beaufort County in 2017, as well as Conspiracy to Commit Assault with a Deadly Weapon with Intent to Kill in Craven County in 2018. Thus, at the time of the instant offense, HARPER was legally prohibited from possessing a firearm.

    In 2023, HARPER admitted that he was a member of the Bloods criminal street gang.

    In April of this year, HARPER was convicted of Robbery of a Dangerous Weapon and Possession of a Firearm by a Felon in Durham County for conduct occurring on March 28, 2024. He received a sentence of 11 to 146 months. 60 months of today’s federal sentence will run consecutively to HARPER’s state sentence.

    HARPER pleaded guilty on April 10, 2025, to one count of felon in possession of a firearm, in violation of 18 U.S.C. §§ 922(g)(1) and 924(a)(8).

    The case was investigated by the Durham Police Department and the Federal Bureau of Investigation. Valuable assistance was provided by the Durham County District Attorney’s Office. The case was prosecuted by Assistant United States Attorney Eric Iverson.

    ###

    MIL Security OSI