Category: Natural Disasters

  • MIL-Evening Report: The prime minister earns $607,000 a year. Why does his top public servant earn more than $1 million?

    Source: The Conversation (Au and NZ) – By Chris Wallace, Professor, School of Politics Economics & Society, Faculty of Business Government & Law, University of Canberra

    Tasmanian Senator Jacqui Lambie represents the lowest-income Australians, with median weekly earnings of $1,208 a week. In the Australian Capital Territory, where the nation’s highest median weekly earners live, including the brains trust of the Australian Public Service, it’s $1,688 a week – 40% higher.

    As a federal politician, Lambie shuttles between these two starkly different earnings worlds and is not happy about the disparity.

    Of course, Lambie herself is on a reasonable wicket. Parliamentarians’ base salaries are $233,660 a year, according to an Instagram post she made this month drawing attention to the issue.

    At a time of considerable financial stress for Australians hit by the combination of inflation, high interest rates and housing shortages, Lambie struck a nerve with her post, which listed a range of public roles drawing big six figure-plus annual salaries.

    In doing so, Lambie underlined the far higher salaries paid to senior public servants compared to the ministers to whom they’re responsible.

    Department of Prime Minister and Cabinet Secretary Glyn Davis earns $1,011,410 a year, 66% more than the man he serves, Prime Minister Anthony Albanese, who earns $607,516.

    Treasury Secretary Steven Kennedy’s salary is more than double that of Treasurer Jim Chalmers, who is paid $438,112. Another three departmental secretaries each earn $960,840.

    Lambie’s Instagram post drew hundreds of comments including:

    How does a public servant earn more than the prime minister? That’s wrong!!

    Politicians get flak about their salaries from belligerent constituents, but also keenly feel the injustice of earning far less than senior public servants.

    Higher pay for higher risk

    The salaries of both politicians and public servants have long and specific histories. Without an income, only the rich could afford to be politicians, so publicly paid allowances and salaries have historically been an important equity and inclusion measure. They remain so today.

    The original framers of the public service component of our Westminster system of government believed that to prevent conflicts of interest that drive corruption, the bureaucracy ought to be staffed by “permanent officers” with job security. In exchange for what, barring wrongdoing, was going to be a lifetime career, public service pay was historically adequate but not extravagant.

    This nexus was broken when, in exchange for higher pay, the Keating government introduced five-year contracts for departmental secretaries in March 1994. Three departmental secretaries refused contracts and continued as “permanent officers”. The rest took the money and the increased employment risk that went with it.

    Two years later, the Keating government lost office and incoming Prime Minister John Howard summarily fired nearly a third of departmental secretaries, fatally eroding the “frank and fearless” tradition of public service advice underpinned by security of employment.

    Compromised advice

    Contract employment for secretaries, who effectively can now be fired at will, not only created pressure for public servants to tell ministers what they wanted to hear, but also untethered their salaries from historical norms. Higher pay reflected that insecurity. The flow-on effect meant other salaries in the senior executive service also floated upwards.

    Contracts for secretaries have also been central to the revolving door that’s developed between the top of the public service and large consulting firms, creating conflicts of interest unknown in the traditional Westminster public service.

    The big four consulting firms are attractive alternative employers for highly paid and insecure departmental secretaries.

    Little wonder, then, that a quasi-privatisation of public service advice through consultancy contracts to those firms occurred, at vast expense to taxpayers – something Finance Minister Katy Gallagher has made strong efforts to reverse.

    Lambie’s push for answers

    Lambie has introduced the Remuneration Tribunal Amendment (There for the Public Service, Not Profit) Bill 2025 to cap senior APS pay at $430,000. It’s a bid to address remuneration which has raced far beyond ministerial salaries, and well beyond reasonable public expectations.

    The Lambie bill has been referred to a Senate committee, which presents an opportunity to evolve debate on the deeper reasons for what has gone awry in the public service and to devise a response that gets to the root of the problem.

    The precarity of contract employment for departmental secretaries, which is used to justify high salaries, is both unnecessary and harmful to the quality of public policy and administration in Australia.

    The intrinsic interest and challenge of working for the nation and the betterment of its citizens has always paid well in terms of a “psychic wage” on top of senior public servants’ actual salaries. If the complaint is that an executive could make much more in the private sector, they’re probably not the right person to work in the public service anyway.

    One reply to Lambie’s Insta post summed up the situation:

    It’s the pollies that made this mess.

    Politicians are the ones who are going to have to clean it up.

    It is neither likely nor plausible that highly paid public service leaders will cut their own salaries in return for an end to the five year contract system for secretaries.

    But that is what a return to good public service governance – and to frank and fearless advice in the national interest – now requires.

    Chris Wallace has received funding from the Australian Research Council.

    ref. The prime minister earns $607,000 a year. Why does his top public servant earn more than $1 million? – https://theconversation.com/the-prime-minister-earns-607-000-a-year-why-does-his-top-public-servant-earn-more-than-1-million-250045

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: Humans generate 62 million tonnes of e-waste each year. Here’s what happens when it’s recycled

    Source: The Conversation (Au and NZ) – By Sukhbir Sandhu, Associate Professor in Sustainability, University of South Australia

    Huguette Roe/Shutterstock

    In 2022, humans generated roughly 62 million tonnes of electronic waste – or e-waste. That’s enough to fill more than 1.5 million garbage trucks. And by 2030, that figure is expected to rise to 82 million tonnes.

    Australia is a huge contributor to this problem. Every year each Australian, on average, generates 20kg of e-waste, compared with the global average of 7kg per person.

    Less than one quarter of the world’s e-waste – which includes desktop computers, laptops, mobile phones, televisions, kitchen appliances, batteries and solar panels – is recycled. That means most of it ends up in landfill, which can result in major accidents. For example, earlier this month, a rubbish truck in Melbourne caught fire after a laptop battery that had been thrown in the garbage bin exploded.

    So what can be done to increase the amount of e-waste that’s recycled? And what actually happens during the e-waste recycling process?

    From breakdown to planned obsolescence

    The growing problem of e-waste is fuelled by both perceived and planned obsolescence.

    Perceived obsolescence happens when we discard functioning products in favour of newer models. For example, we buy the latest iPhone even though our current phone works fine.

    Planned obsolescence is when manufacturers “build in” a use-by date. One way they do this is by not offering software updates, which then renders an existing product incompatible with other, newer devices or presents cybersecurity risks.

    Of course, sometimes existing electronic products simply stop working, which forces us to buy a replacement.

    A multi-step process

    In Australia, the process of recycling e-waste starts with consumers delivering their e-waste to a designated collection centre.

    Some manufacturers offer trade-in programs where people can drop off their old phones and laptops at retail shops and get a small discount on a new product. Some councils also run services for periodic collection and offer drop-off centres for e-waste.

    The collection is followed by sorting and inspection of the discarded items.

    At this stage, the discarded electronic items are sorted based on the type of devices. Some devices can be refurbished and reused if they are still functional.

    Those that cannot be refurbished are dismantled.

    This involves separating the various components, such as circuit boards, batteries and wiring. Hazardous materials such as mercury and lead are removed, before recyclable and valuable materials are recovered. These include plastic and glass, as well as precious metals like gold and silver from the circuit boards.

    After purifying and refining, the recycled materials can be used in new electronics or put to other uses.

    According to the national waste report there are 535 facilities in Australia that accept e-waste. But only 20 facilities reprocess these for further recycling.

    This means much of Australia’s e-waste is exported to China, India and other Asian countries to be recycled.

    Less than one quarter of the world’s e-waste is recycled.
    SibFilm/Shutterstock

    Significant challenges

    There are significant challenges when it comes to recycling e-waste.

    Some are associated with consumer behaviour. For example, unlike kerbside recycling services for paper, glass and cardboard, recycling e-waste generally involves consumers making a special trip to a designated drop-off location. Accessing these locations involves extra effort and can be an inconvenience which deters people from recycling their e-waste.

    Also, compared to container deposit schemes, where people get paid to recycle their glass bottles and cans, there are generally no monetary incentives available for recycling e-waste.

    Concerns about data security also prevent some people from recycling their e-waste. People are often reluctant to recycle their computer, phones and other electronic items as they are worried their data could be stolen during the recycling process, even after they have deleted the files.

    The other set of challenges with recycling e-waste comes from the economic incentives for recycling. Recycling e-waste is complex and costly. The costs involved in recycling can often be higher than the price of raw materials. Hazardous wastes must also be disposed safely, which adds extra costs to the process.

    All of this makes it less attractive for businesses to recycle e-waste.

    The way forward

    Australia’s new circular economy framework is expected to provide a way forward for businesses to address some of these challenges.

    The framework seeks to double the rate at which Australia recovers, recycles and reuses materials by 2035, partly by providing direction and designing policies for businesses that encourage recycling.

    It’s also important for local governments to make it easier for people to recycle their e-waste.

    While it may not be cost effective for councils to have kerbside recycling for e- waste, they could place e-waste collection centres in local areas.

    Councils can also explore offering consumers incentives for e-waste recycling. These incentives can be monetary. But even non-monetary incentives, such as letting people know how their recycled e-waste contributes to addressing the bigger problem, can be a motivation.

    And finally, as consumers, it would help to remember that the best way to contribute to decreasing e-waste is to repair and reuse our existing products.

    Sukhbir Sandhu has received funding from Australian Research Council, European Union, and Green Industries SA.

    ref. Humans generate 62 million tonnes of e-waste each year. Here’s what happens when it’s recycled – https://theconversation.com/humans-generate-62-million-tonnes-of-e-waste-each-year-heres-what-happens-when-its-recycled-249842

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI USA: Fourteen Members and Associates of Violent Transnational Motorcycle Gang Indicted on RICO and Murder Charges

    Source: US State of North Dakota

    An indictment was unsealed today in the Southern District of Texas charging 14 members and associates of the Bandidos Outlaw Motorcycle Gang for their alleged roles in a criminal enterprise engaged in murder, robbery, arson, narcotics distribution, and witness intimidation in and around Houston.

    The indictment accuses the defendants of various crimes, including engaging in a conspiracy to commit racketeering (RICO) activity and committing violent crimes in furtherance of the gang such as murder, attempted murder, and assault. The indictment alleges that the Bandidos are a self-identified “outlaw” motorcycle organization with a membership of approximately 1,500 to 2,000 in the United States and an additional 1,000 to 1,500 members internationally, including in Mexico.

    “Today’s indictment is an important step in eliminating the Bandidos Outlaw Motorcycle Gang,” said Supervisory Official Antoinette T. Bacon of the Justice Department’s Criminal Division. “The Bandidos declare war on rivals — and they wage that war on our streets. Criminal behavior like this has no place in America, and the Department of Justice is fully committed to bringing peace back to our communities.”

    “Ensuring the safety of the public is Southern District of Texas’ paramount concern,” said U.S. Attorney Nicholas J. Ganjei for the Southern District of Texas. “The indictment here not only alleges shocking crimes of violence, but also alleges that these offenses were committed openly and wantonly, where any innocent member of the public could have been hurt or killed.”

    According to court documents and statements in court, beginning in 2019, a violent turf war erupted between the Bandidos and B*EAST, a rival outlaw motorcycle gang in the Houston area. As part of this turf war, Bandidos national leadership allegedly put out a “smash on site” order to commit physical assaults, including murder, against B*EAST members. The turf war has resulted in gunfire exchanged on public roadways and in public establishments with innocent civilians present, according to the charges.

    John M. Pfeffer, also known as Big John, 32, Darvi Hinojosa, also known as 10 Round, 35, and Bradley Rickenbacker, also known as Dolla Bill, 37, all of Katy, Texas; Michael H. Dunphy, also known as Money Mike, 57, of Cleveland, Texas; Christopher Sanchez, also known as Monster, 40, of Tomball, Texas; and Brandon K. Hantz, also known as Loco and Gun Drop, 33, of Crosby, Texas, are charged with conspiracy to commit racketeering activity. Pfeffer, Dunphy, Hinojosa, Rickenbacker, and Sanchez are further charged with multiple counts of assault in aid of racketeering. Pfeffer, Hinojosa, Rickenbacker, and Sanchez are also charged with using a firearm during and in relation to a crime of violence, while Sanchez faces charges of being a felon in possession of a firearm. Hantz is also charged with arson.

    If convicted, Pfeffer, Hinojosa, Rickenbacker, and Sanchez each face a maximum penalty of life in prison, while Dunphy and Hantz each face a maximum penalty of 20 years in prison on each of their counts.

    The indictment also charges David Vargas, also known as Brake Check and First Time, 33, of Houston, with murder in aid of racketeering; using a firearm during and in relation to a crime of violence resulting in death; attempted murder in aid of racketeering; and using a firearm during and in relation to the attempted murders. All those charges relate to the killing of a rival and the shooting of two others. If convicted, Vargas faces a mandatory penalty of life in prison or the death penalty.

    Further, Marky Baker, also known as Pinche Guero and Guero, 40; Ronnie McCabe, also known as Meathead, 56; and Jeremy Cox, also known as JD, 37, all of Houston; Roy Gomez, also known as Repo, 50, of Richmond, Texas; and Marcel Lett, 56, of Pearland, Texas, are charged along with Pfeffer and Rickenbacker with assault in aid of racketeering and using a firearm during and in relation to a crime of violence. These charges are in relation to an alleged assault and robbery that resulted in the death of a rival. If convicted, they each face a maximum penalty of life in prison.

    Hinojosa is also charged along with John Sblendorio, also known as Tech9, 54, of Houston, with conspiracy to commit murder in aid of racketeering, attempted murder in aid of racketeering, assault in aid of racketeering, and using a firearm during and in relation to a crime of violence in connection with the shooting of a rival gang member. Hinojosa is also charged with conspiracy to distribute cocaine and three counts of possession with intent to distribute cocaine. If convicted, Sblendorio and Hinojosa each face a maximum penalty of life in prison.

    In addition, Sean G. Christison, also known as Skinman, 30, of Katy, is charged with possession with intent to distribute cocaine and possession of a firearm in furtherance of a drug trafficking crime. He faces a maximum penalty of life in prison.

    For all defendants, a federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI, Texas Board of Criminal Justice — Office of Inspector General, Texas Department of Public Safety, and Montgomery County Sheriff’s Office conducted the investigation, with assistance from the Harris County Sheriff’s Office; Houston and Pasadena Police Departments; Texas Alcoholic Beverage Commission; LaMarque and Katy Police Departments; U.S. Marshals Service; Bureau of Alcohol, Tobacco, Firearms and Explosives; and Cypress-Fairbanks Independent School District Police Department.

    Trial Attorneys Grace H. Bowen and Christopher Taylor of the Criminal Division’s Violent Crime and Racketeering Section and Assistant U.S. Attorneys Byron H. Black and Kelly Zenón-Matos for the Southern District of Texas are prosecuting the case.

    This investigation was part of an Organized Crime Drug Enforcement Task Forces (OCDETF) operation. OCDETF identifies, disrupts and dismantles the highest-level drug traffickers, money launderers, gangs and transnational criminal organizations that threaten the United States by using a prosecutor-led, intelligence-driven, multi-agency approach that leverages the strengths of federal, state and local law enforcement agencies against criminal networks. Additional information about the OCDETF Program can be found on the Justice Department’s OCDETF webpage.

    This case is being prosecuted as part of the joint federal, state and local Project Safe Neighborhoods (PSN) Program, the centerpiece of the Justice Department’s violent crime reduction efforts. PSN is an evidence-based program proven to be effective at reducing violent crime. Through PSN, a broad spectrum of stakeholders work together to identify the most pressing violent crime problems in the community and develop comprehensive solutions to address them. As part of this strategy, PSN focuses enforcement efforts on the most violent offenders and partners with locally based prevention and reentry programs for lasting reductions in crime. For more information about PSN, please visit www.justice.gov/psn.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI USA: #StopRansomware: Ghost (Cring) Ransomware

    News In Brief – Source: US Computer Emergency Readiness Team

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Ghost (Cring)—(“Ghost”)—ransomware IOCs and TTPs identified through FBI investigation as recently as January 2025.

    Beginning early 2021, Ghost actors began attacking victims whose internet facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China. Ghost actors, located in China, conduct these widespread attacks for financial gain. Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses.

    Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over time. Names associated with this group include Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. Samples of ransomware files Ghost used during attacks are: Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe.

    Ghost actors use publicly available code to exploit Common Vulnerabilities and Exposures (CVEs) and gain access to internet facing servers. Ghost actors exploit well known vulnerabilities and target networks where available patches have not been applied.

    The FBI, CISA, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Ghost ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 16.1. See the MITRE ATT&CK Tactics and Techniques section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques.

    Initial Access

    The FBI has observed Ghost actors obtaining initial access to networks by exploiting public facing applications that are associated with multiple CVEs [T1190]. Their methodology includes leveraging vulnerabilities in Fortinet FortiOS appliances (CVE-2018-13379), servers running Adobe ColdFusion (CVE-2010-2861 and CVE-2009-3960), Microsoft SharePoint (CVE-2019-0604), and Microsoft Exchange (CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207— commonly referred to as the ProxyShell attack chain).

    Execution

    Ghost actors have been observed uploading a web shell [T1505.003] to a compromised server and leveraging Windows Command Prompt [T1059.003] and/or PowerShell [T1059.001] to download and execute Cobalt Strike Beacon malware [T1105] that is then implanted on victim systems. Despite Ghost actors’ malicious implementation, Cobalt Strike is a commercially available adversary simulation tool often used for the purposes of testing an organization’s security controls.

    Persistence

    Persistence is not a major focus for Ghost actors, as they typically only spend a few days on victim networks. In multiple instances, they have been observed proceeding from initial compromise to the deployment of ransomware within the same day. However, Ghost actors sporadically create new local [T1136.001] and domain accounts [T1136.002] and change passwords for existing accounts [T1098]. In 2024, Ghost actors were observed deploying web shells [T1505.003] on victim web servers.

    Privilege Escalation

    Ghost actors often rely on built in Cobalt Strike functions to steal process tokens running under the SYSTEM user context to impersonate the SYSTEM user, often for the purpose of running Beacon a second time with elevated privileges [T1134.001].

    Ghost actors have been observed using multiple open-source tools in an attempt at privilege escalation through exploitation [T1068] such as “SharpZeroLogon,” “SharpGPPPass,” “BadPotato,” and “GodPotato.” These privilege escalation tools would not generally be used by individuals with legitimate access and credentials. 

    See Table 1 for a descriptive listing of tools.

    Credential Access

    Ghost actors use the built in Cobalt Strike function “hashdump” or Mimikatz [T1003] to collect passwords and/or password hashes to aid them with unauthorized logins and privilege escalation or to pivot to other victim devices.

    Defense Evasion

    Ghost actors used their access through Cobalt Strike to display a list of running processes [T1057] to determine which antivirus software [T1518.001] is running so that it can be disabled [T1562.001]. Ghost frequently runs a command to disable Windows Defender on network connected devices. Options used in this command are: Set-MpPreference -DisableRealtimeMonitoring 1 -DisableIntrusionPreventionSystem 1 -DisableBehaviorMonitoring 1 -DisableScriptScanning 1 -DisableIOAVProtection 1 -EnableControlledFolderAccess Disabled -MAPSReporting Disabled -SubmitSamplesConsent NeverSend.

    Discovery

    Ghost actors have been observed using other built-in Cobalt Strike commands for domain account discovery [T1087.002], open-source tools such as “SharpShares” for network share discovery [T1135], and “Ladon 911” and “SharpNBTScan” for remote systems discovery [T1018]. Network administrators would be unlikely to use these tools for network share or remote systems discovery.

    Lateral Movement

    Ghost actors used elevated access and Windows Management Instrumentation Command-Line (WMIC) [T1047] to run PowerShell commands on additional systems on the victim network— often for the purpose of initiating additional Cobalt Strike Beacon infections. The associated encoded string is a base 64 PowerShell command that always begins with: powershell -nop -w hidden -encodedcommand JABzAD0ATgBlAHcALQBPAGIAagBlAGMAdAAgAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgALABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACIA… [T1132.001][T1564.003].

    This string decodes to “$s=New-Object IO.MemoryStream(,[Convert]::FromBase64String(“” and is involved with the execution of Cobalt Strike in memory on the target machine.

    In cases where lateral movement attempts are unsuccessful, Ghost actors have been observed abandoning an attack on a victim.

    Exfiltration

    Ghost ransom notes often claim exfiltrated data will be sold if a ransom is not paid. However, Ghost actors do not frequently exfiltrate a significant amount of information or files, such as intellectual property or personally identifiable information (PII), that would cause significant harm to victims if leaked. The FBI has observed limited downloading of data to Cobalt Strike Team Servers [T1041]. Victims and other trusted third parties have reported limited uses of Mega.nz [T1567.002] and installed web shells for similar limited data exfiltration. Note: The typical data exfiltration is less than hundreds of gigabytes of data.

    Command and Control

    Ghost actors rely heavily on Cobalt Strike Beacon malware and Cobalt Strike Team Servers for command and control (C2) operations, which function using hypertext transfer protocol (HTTP) and hypertext transfer protocol secure (HTTPS) [T1071.001]. Ghost rarely registers domains associated with their C2 servers. Instead, connections made to a uniform resource identifier (URI) of a C2 server, for the purpose of downloading and executing Beacon malware, directly reference the C2 server’s IP address. For example, http://xxx.xxx.xxx.xxx:80/Google.com where xxx.xxx.xxx.xxx represents the C2 server’s IP address.

    For email communication with victims, Ghost actors use legitimate email services that include traffic encryption features. [T1573] Some examples of emails services that Ghost actors have been observed using are Tutanota, Skiff, ProtonMail, Onionmail, and Mailfence.

    Note: Table 2 contains a list of Ghost ransom email addresses.

    Impact and Encryption

    Ghost actors use Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe, which are all ransomware executables that share similar functionality. Ghost variants can be used to encrypt specific directories or the entire system’s storage [T1486]. The nature of executables’ operability is based on command line arguments used when executing the ransomware file. Various file extensions and system folders are excluded during the encryption process to avoid encrypting files that would render targeted devices inoperable.

    These ransomware payloads clear Windows Event Logs [T1070.001], disable the Volume Shadow Copy Service, and delete shadow copies to inhibit system recovery attempts [T1490]. Data encrypted with Ghost ransomware variants cannot be recovered without the decryption key. Ghost actors hold the encrypted data for ransom and typically demand anywhere from tens to hundreds of thousands of dollars in cryptocurrency in exchange for decryption software [T1486].

    The impact of Ghost ransomware activity varies widely on a victim-to-victim basis. Ghost actors tend to move to other targets when confronted with hardened systems, such as those where proper network segmentation prevents lateral moment to other devices.

    Indicators of Compromise (IOC)

    Table 1 lists several tools and applications Ghost actors have used for their operations. The use of these tools and applications on a network should be investigated further.

    Note: Authors of these tools generally state that they should not be used in illegal activity.

    Table 1: Tools Leveraged by Ghost Actors
    Name Description Source
    Cobalt Strike Cobalt Strike is penetration testing software. Ghost actors  use an unauthorized version of Cobalt Strike. N/A
    IOX Open-source proxy, used to establish a reverse proxy to a Ghost C2 server from an internal victim device. github[.]com/EddieIvan01/iox
    SharpShares.exe SharpShares.exe is used to enumerate accessible network shares in a domain. Ghost actors use this primarily for host discovery. github[.]com/mitchmoser/SharpShares
    SharpZeroLogon.exe SharpZeroLogon.exe attempts to exploit CVE-2020-1472 and is run against a target Domain Controller. github[.]com/leitosama/SharpZeroLogon
    SharpGPPPass.exe SharpGPPPass.exe attempts to exploit CVE-2014-1812 and targets XML files created through Group Policy Preferences that may contain passwords. N/A
    SpnDump.exe SpnDump.exe is used to list service principal name identifiers, which Ghost actors use for service and hostname enumeration. N/A
    NBT.exe A compiled version of SharpNBTScan, a NetBIOS scanner. Ghost actors use this tool for hostname and IP address enumeration. github[.]com/BronzeTicket/SharpNBTScan
    BadPotato.exe BadPotato.exe is an exploitation tool used for privilege escalation. github[.]com/BeichenDream/BadPotato
    God.exe God.exe is a compiled version of GodPotato and is used for privilege escalation. github[.]com/BeichenDream/GodPotato
    HFS (HTTP File Server) A portable web server program that Ghost actors use to host files for remote access and exfiltration. rejitto[.]com/hfs
    Ladon 911 A multifunctional scanning and exploitation tool, often used by Ghost actors with the MS17010 option to scan for SMB vulnerabilities associated with CVE-2017-0143 and CVE-2017-0144. github[.]com/k8gege/Ladon
    Web Shell A backdoor installed on a web server that allows for the execution of commands and facilitates persistent access. Slight variation of github[.]com/BeichenDream/Chunk-Proxy/blob/main/proxy.aspx
    Table 2: MD5 File Hashes Associated with Ghost Ransomware Activity
    File name MD5 File Hash
    Cring.exe c5d712f82d5d37bb284acd4468ab3533
    Ghost.exe

    34b3009590ec2d361f07cac320671410

    d9c019182d88290e5489cdf3b607f982

    ElysiumO.exe

    29e44e8994197bdb0c2be6fc5dfc15c2

    c9e35b5c1dc8856da25965b385a26ec4

    d1c5e7b8e937625891707f8b4b594314

    Locker.exe ef6a213f59f3fbee2894bd6734bbaed2
    iex.txt, pro.txt (IOX) ac58a214ce7deb3a578c10b97f93d9c3
    x86.log (IOX)

    c3b8f6d102393b4542e9f951c9435255

    0a5c4ad3ec240fbfd00bdc1d36bd54eb

    sp.txt (IOX) ff52fdf84448277b1bc121f592f753c5
    main.txt (IOX) a2fd181f57548c215ac6891d000ec6b9
    isx.txt (IOX) 625bd7275e1892eac50a22f8b4a6355d
    sock.txt (IOX) db38ef2e3d4d8cb785df48f458b35090

    Ransom Email Addresses

    Table 3 is a subset of ransom email addresses that have been included in Ghost ransom notes.

    Table 3: Ransom Email Addresses
    Email Addresses
    asauribe@tutanota.com ghostbackup@skiff.com rainbowforever@tutanota.com
    cringghost@skiff.com ghosts1337@skiff.com retryit1998@mailfence.com
    crptbackup@skiff.com ghosts1337@tuta.io retryit1998@tutamail.com
    d3crypt@onionmail.org ghostsbackup@skiff.com rsacrpthelp@skiff.com
    d3svc@tuta.io hsharada@skiff.com rsahelp@protonmail.com
    eternalnightmare@tutanota.com just4money@tutanota.com sdghost@onionmail.org
    evilcorp@skiff.com kellyreiff@tutanota.com shadowghost@skiff.com
    fileunlock@onionmail.org kev1npt@tuta.io shadowghosts@tutanota.com
    fortihooks@protonmail.com lockhelp1998@skiff.com summerkiller@mailfence.com
    genesis1337@tutanota.com r.heisler@skiff.com summerkiller@tutanota.com
    ghost1998@tutamail.com rainbowforever@skiff.com webroothooks@tutanota.com

    Ransom Notes

    Starting approximately in August 2024, Ghost actors began using TOX IDs in ransom notes as an alternative method for communicating with victims. For example: EFE31926F41889DBF6588F27A2EC3A2D7DEF7D2E9E0A1DEFD39B976A49C11F0E19E03998DBDA and E83CD54EAAB0F31040D855E1ED993E2AC92652FF8E8742D3901580339D135C6EBCD71002885B.

    MITRE ATT&CK Tactics and Techniques

    See Table 4 to Table 13 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, version 16.1, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 4: Initial Access
    Technique Title  ID Use
    Exploit Public-Facing Application T1190 Ghost actors exploit multiple vulnerabilities in public-facing systems to gain initial access to servers.
    Table 5: Execution
    Technique Title  ID Use
    Windows Management Instrumentation T1047 Ghost actors abuse WMI to run PowerShell scripts on other devices, resulting in their infection with Cobalt Strike Beacon malware.
    PowerShell T1059.001 Ghost actors use PowerShell for various functions including to deploy Cobalt Strike.
    Windows Command Shell T1059.003 Ghost actors use the Windows Command Shell to download malicious content on to victim servers.
    Table 6: Persistence
    Technique Title  ID Use
    Account Manipulation T1098 Ghost actors change passwords for already established accounts.
    Local Account T1136.001 Ghost actors create new accounts or makes modifications to local accounts.
    Domain Account T1136.002 Ghost actors create new accounts or makes modifications to domain accounts.
    Web Shell T1505.003 Ghost actors upload web shells to victim servers to gain access and for persistence.
    Table 7: Privilege Escalation
    Technique Title  ID Use
    Exploitation for Privilege Escalation T1068 Ghost actors use a suite of open source tools in an attempt to gain elevated privileges through exploitation of vulnerabilities.
    Token Impersonation/Theft T1134.001 Ghost actors use Cobalt Strike to steal process tokens of processes running at a higher privilege.
    Table 8: Defense Evasion
    Technique Title  ID Use
    Application Layer Protocol: Web Protocols T1071.001 Ghost actors use HTTP and HTTPS protocols while conducting C2 operations. 
    Impair Defenses: Disable or Modify Tools T1562.001 Ghost actors disable antivirus products.
    Hidden Window T1564.003 Ghost actors use PowerShell to conceal malicious content within legitimate appearing command windows.
    Table 9: Credential Access
    Technique Title  ID Use
    OS Credential Dumping T1003 Ghost actors use Mimikatz and the Cobalt Strike “hashdump” command to collect passwords and password hashes.
    Table 10: Discovery
    Technique Title  ID Use
    Remote System Discovery T1018 Ghost actors use tools like Ladon 911 and ShapNBTScan for remote systems discovery.
    Process Discovery T1057 Ghost actors run a ps command to list running processes on an infected device.
    Domain Account Discovery T1087.002 Ghost actors run commands such as net group “Domain Admins” /domain to discover a list of domain administrator accounts.
    Network Share Discovery T1135 Ghost actors use various tools for network share discovery for the purpose of host enumeration.
    Software Discovery T1518 Ghost actors use their access to determine which antivirus software is running.
    Security Software Discovery T1518.001 Ghost actors run Cobalt Strike to enumerate running antivirus software.
    Table 11: Exfiltration
    Technique Title  ID Use
    Exfiltration Over C2 Channel T1041 Ghost actors use both web shells and Cobalt Strike to exfiltrate limited data.
    Exfiltration to Cloud Storage T1567.002 Ghost actors sometimes use legitimate cloud storage providers such as Mega.nz for malicious exfiltration operations.
    Table 12: Command and Control
    Technique Title  ID Use
    Web Protocols T1071.001 Ghost actors use Cobalt Strike Beacon malware and Cobalt Strike Team Servers which communicate over HTTP and HTTPS.
    Ingress Tool Transfer T1105 Ghost actors use Cobalt Strike Beacon malware to deliver ransomware payloads to victim servers.
    Standard Encoding T1132.001 Ghost actors use PowerShell commands to encode network traffic which reduces their likelihood of being detected during lateral movement.
    Encrypted Channel T1573 Ghost actors use encrypted email platforms to facilitate communications. 
    Table 13: Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486 Ghost actors use ransomware variants Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe to encrypt victim files for ransom.
    Inhibit System Recovery T1490 Ghost actors delete volume shadow copies.

    Mitigations

    The FBI, CISA, and MS-ISAC recommend organizations reference their #StopRansomware Guide and implement the mitigations below to improve cybersecurity posture on the basis of the Ghost ransomware activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    • Maintain regular system backups that are known-good and stored offline or are segmented from source systems [CPG 2.R]. Ghost ransomware victims whose backups were unaffected by the ransomware attack were often able to restore operations without needing to contact Ghost actors or pay a ransom.
    • Patch known vulnerabilities by applying timely security updates to operating systems, software, and firmware within a risk-informed timeframe [CPG 1.E].
    • Segment networks to restrict lateral movement from initial infected devices and other devices in the same organization [CPG 2.F].
    • Require Phishing-Resistant MFA for access to all privileged accounts and email services accounts.
    • Train users to recognize phishing attempts.
    • Monitor for unauthorized use of PowerShell. Ghost actors leverage PowerShell for malicious purposes, although it is often a helpful tool that is used by administrators and defenders to manage system resources. For more information, visit NSA and CISA’s joint guidance on PowerShell best practices.
      • Implement the principle of least privilege when granting permissions so that employees who require access to PowerShell are aligned with organizational business requirements.
    • Implement allowlisting for applications, scripts, and network traffic to prevent unauthorized execution and access [CPG 3.A].
    • Identify, alert on, and investigate abnormal network activity. Ransomware activity generates unusual network traffic across all phases of the attack chain. This includes running scans to discover other network connected devices, running commands to list, add, or alter administrator accounts, using PowerShell to download and execute remote programs, and running scripts not usually seen on a network. Organizations that can successfully identify and investigate this activity are better able to interrupt malicious activity before ransomware is executed [CPG 3.A].
      • Ghost actors run a significant number of commands, scripts, and programs that IT administrators would have no legitimate reason for running. Victims who have identified and responded to this unusual behavior have successfully prevented Ghost ransomware attacks.
    • Limit exposure of services by disabling unused ports such as, RDP 3398, FTP 21, and SMB 445, and restricting access to essential services through securely configured VPNs or firewalls.
    • Enhance email security by implementing advanced filtering, blocking malicious attachments, and enabling DMARC, DKIM, and SPF to prevent spoofing [CPG 2.M].

    Validate Security Controls

    In addition to applying mitigations, the FBI, CISA, and MS-ISAC recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 3 to Table 13).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    Reporting

    Your organization has no obligation to respond or provide information back to the FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to the FBI, reporting must be consistent with applicable state and federal laws.

    The FBI is interested in any information that can be shared, to include logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, and/or decryptor files.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, date of infection, date detected, initial attack vector, and host and network-based indicators.

    The FBI, CISA, and MS-ISAC do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (report@cisa.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. The FBI, CISA, and MS-ISAC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI, CISA, and the MS-ISAC.

    Version History

    February 19, 2025: Initial version.

    MIL OSI USA News

  • MIL-OSI USA: Governor Newsom proposes $125 million in mortgage relief to benefit victims of recent natural disasters

    Source: US State of California 2

    Feb 19, 2025

    Survivors of the Park Fire, Franklin Fire, and the recent Palisades and Eaton fires would be eligible for direct mortgage relief

    What you need to know: Governor Newsom is proposing an over $125 million package that includes disaster mortgage relief for homeowners whose homes have been damaged or destroyed by natural disasters since 2023 and are at risk of foreclosure, as well as mortgage counseling services.

    LOS ANGELES — Governor Newsom today announced a new proposal to create an over $125 million mortgage relief program to assist homeowners whose homes were destroyed or severely damaged by recent natural disasters, placing them at risk of foreclosure. The proposal also includes funding to extend an existing counseling services program which would help affected homeowners navigate their recovery. The package would utilize existing mortgage settlement funding, and would not impact the proposed 2025-2026 budget. 

    “As survivors heal from the trauma of recent disasters, the threat of foreclosure should be the last thing on their minds. This disaster mortgage relief program would help lift this burden and give families more time to focus on recovery.”

    Governor Gavin Newsom

    The package will be administered by the California Housing Finance Agency (CalFHA) and includes over $100 million in direct mortgage assistance, with an additional $25 million to extend an existing program that provides mortgage counseling and serves survivors by offering guidance on FEMA disaster assistance and other related needs. The program will provide mortgage relief for homeowners at risk of foreclosure and whose property was destroyed or substantially damaged as a result of declared emergencies since January 1, 2023. The proposal will be considered at CalHFA’s next meeting on February 20. Survivors of natural disasters since 2023, including those affected by the Park Fire, Franklin Fire, and the recent Palisades and Eaton Fires, would be eligible for mortgage assistance. Once approved, the direct assistance program and eligibility criteria will be developed and announced in more detail.

    The Governor last month announced that five major lenders (Bank of America, Citi, JPMorgan Chase, U.S. Bank, and Wells Fargo) and recently announced that there are now 420 state-chartered banks, credit unions, and mortgage lenders who have committed to offering impacted homeowners a 90-day forbearance of their mortgage payments, without reporting these payments to credit reporting agencies, and the opportunity for additional relief.

    Funding for the mortgage relief program comes from settlement funds California secured from big banks resolving allegations of misconduct during the mortgage crisis.

    This adds to the Governor’s work to provide tax and mortgage relief to those impacted by the Los Angeles area firestorms. California postponed the individual tax filing deadline to October 15 for Los Angeles County taxpayers. Additionally, the state extended the January 31, 2025, sales and use tax filing deadline for Los Angeles County taxpayers until April 30 — providing critical tax relief for businesses. Governor Newsom suspended penalties and interest on late property tax payments for a year, effectively extending the state property tax deadline. The Governor also worked with state– and federally-chartered banks that have committed to providing mortgage relief for survivors in certain zip codes.

    Historic recovery and rebuilding efforts — faster than ever before 

    As the Los Angeles community recovers from the firestorm disaster, Governor Newsom is removing barriers and helping survivors quickly by: 

    • Cutting red tape to help rebuild Los Angeles faster and stronger. Governor Newsom issued an executive order to streamline the rebuilding of homes and businesses destroyed — suspending permitting and review requirements under the California Environmental Quality Act (CEQA) and the California Coastal Act. The Governor also issued an executive order further cutting red tape by reiterating that permitting requirements under the California Coastal Act are suspended for rebuilding efforts and directing the Coastal Commission not to issue guidance or take any action that interferes with or conflicts with the Governor’s executive orders. The Governor also issued an executive order removing bureaucratic barriers, extending deadlines, and providing critical regulatory relief to help fire survivors rebuild, access essential services, and recover more quickly.
    • Fast-tracking temporary housing and protecting tenants. To help provide necessary shelter for those immediately impacted by the firestorms, the Governor issued an executive order to make it easier to streamline construction of accessory dwelling units, allow for more temporary trailers and other housing, and suspend fees for mobile home parks. Governor Newsom also issued an executive order that prohibits landlords in Los Angeles County from evicting tenants for sharing their rental with survivors displaced by the Los Angeles-area firestorms.
    • Mobilizing debris removal and cleanup. With an eye toward recovery, the Governor directed fast action on debris removal work and mitigating the potential for mudslides and flooding in areas burned. He also signed an executive order to allow expert federal hazmat crews to start cleaning up properties as a key step in getting people back to their properties safely. The Governor also issued an executive order to help mitigate risk of mudslides and flooding and protect communities by hastening efforts to remove debris, bolster flood defenses, and stabilize hillsides in affected areas. 

    • Safeguarding survivors from price gouging. Governor Newsom expanded restrictions to protect survivors from illegal price hikes on rent, hotel and motel costs, and building materials or construction. Report violations to the Office of the Attorney General here.

    • Directing immediate state relief. The Governor signed legislation providing over $2.5 billion to immediately support ongoing emergency response efforts and to jumpstart recovery efforts for Los Angeles. California quickly launched CA.gov/LAfires as a single hub of information and resources to support those impacted and bolsters in-person Disaster Recovery Centers. The Governor also launched LA Rises, a unified recovery initiative that brings together private sector leaders to support rebuilding efforts. Governor Newsom announced that individuals and families directly impacted by the recent fires living in certain zip codes may be eligible to receive Disaster CalFresh food benefits.

    • Getting kids back in the classroom. Governor Newsom signed an executive order to quickly assist displaced students in the Los Angeles area and bolster schools affected by the firestorms.

    • Protecting survivors from real estate speculators. The Governor issued an executive order to protect firestorm survivors from predatory land speculators making aggressive and unsolicited cash offers to purchase their property.

    • Helping businesses and workers get back on their feet. The Governor issued an executive order to support small businesses and workers, by providing relief to help businesses recover quickly by deferring annual licensing fees and waiving other requirements that may impose barriers to recovery.

    •  

    Press Releases, Recent News

    Recent news

    News State continues raising awareness of dangerous drug  What you need to know: California is using a multifaceted approach to tackle illicit fentanyl, including seizing nearly $300 million of illicit fentanyl since 2023 and increasing public education in schools…

    News SACRAMENTO – Governor Gavin Newsom today announced the following appointments:Melissa Stone, of Elk Grove, has been appointed Chief Deputy Director at the Department of Child Support Services. Stone has been Deputy Director of the Disability Insurance Branch at…

    News What you need to know: California’s work to pre-deploy resources ahead of this week’s major storms paid off with successful rescue efforts and no major damage reported. SACRAMENTO — Governor Gavin Newsom today praised the proactive emergency response efforts that…

    Feb 19, 2025

    What you need to know: The passage of Proposition 1 by California voters adds rocket fuel to Governor Gavin Newsom’s transformational overhaul of the state’s behavioral health system. These reforms refocus existing funds to prioritize Californians with the most serious mental health and substance use issues, who are too often experiencing homelessness. They also fund more than 11,150 new behavioral health beds and supportive housing units and 26,700 outpatient treatment slots.

    Los Angeles, California – California took a major step forward in correcting the damage from 50 years of neglect to the state’s mental health system with the passage of Proposition 1. This historic measure — a signature priority of Governor Gavin Newsom — adds rocket fuel to California’s overhaul of the state’s behavioral health systems. It provides a full range of mental health and substance abuse care, with new accountability metrics to ensure local governments deliver for their communities.

    This is the biggest reform of the California mental health system in decades and will finally equip partners to deliver the results all Californians need and deserve. Treatment centers will prioritize mental health and substance use support in the community like never before. Now, it’s time to roll up our sleeves and begin implementing this critical reform – working closely with city and county leaders to ensure we see results.

    Governor Gavin Newsom

    newsom-news-template
    IMG_3682-min
    contact-governor-landing
    workers-FxAJ5fkakAAtVI3
    priorities-and-progress-image
    economy-F-isBKpbsAAxdab
    gun-violence-San Diego Guns Package 2.18.22_2

    What they’re saying: 

    • Sacramento Mayor Darrell Steinberg, original author of the Mental Health Services Act: “Twenty years ago, I never could have dreamed that we would have the strong leadership we have today, committing billions and making courageous policy changes that question the conventional wisdom on mental health. Now, with the passage of Proposition 1. California is delivering on decades old promises to help people living with brain-based illnesses, to live better lives, to live independently and to live with dignity in our communities. This is a historic moment and the hard work is ahead of us.“
    • Senator Susan Eggman (D-Stockton), author of Senate Bill 326: “Today marks a day of hope for thousands of Californians who are struggling with mental illness – many of whom are living unhoused. I am tremendously grateful to my fellow Californian’s for passing this important measure.  And I am very appreciative of this Governor’s leadership to transform our behavioral health care system!”
    • Assemblymember Jacqui Irwin (D-Thousand Oaks), author of Assembly Bill 531: “This started as an audacious proposal to address the root cause of homelessness and today, Californians can be proud to know that they did the right thing by passing Proposition 1. Now, it’s time for all of us to get to work, and make sure these reforms are implemented and that we see results.”

    Bigger picture: Transforming the Mental Health Services Act into the Behavioral Health Services Act and building more community mental health treatment sites and supportive housing is the last main pillar of Governor Newsom’s Mental Health Movement – pulling together significant recent reforms like 988 crisis line, CalHOPE, CARE Court, conservatorship reform, CalAIM behavioral health expansion (including mobile crisis care and telehealth), Medi-Cal expansion to all low-income Californians, Children and Youth Behavioral Health Initiative (including expanding services in schools and on-line), Older Adult Behavioral Health Initiative, Veterans Mental Health Initiative, Behavioral Health Community Infrastructure Program, Behavioral Health Bridge Housing, Health Care Workforce for All and more.

    More details on next step here

    Press Releases, Recent News

    Recent news

    News State continues raising awareness of dangerous drug  What you need to know: California is using a multifaceted approach to tackle illicit fentanyl, including seizing nearly $300 million of illicit fentanyl since 2023 and increasing public education in schools…

    News SACRAMENTO – Governor Gavin Newsom today announced the following appointments:Melissa Stone, of Elk Grove, has been appointed Chief Deputy Director at the Department of Child Support Services. Stone has been Deputy Director of the Disability Insurance Branch at…

    News What you need to know: California’s work to pre-deploy resources ahead of this week’s major storms paid off with successful rescue efforts and no major damage reported. SACRAMENTO — Governor Gavin Newsom today praised the proactive emergency response efforts that…

    Feb 19, 2025

    What you need to know: The passage of Proposition 1 by California voters adds rocket fuel to Governor Gavin Newsom’s transformational overhaul of the state’s behavioral health system. These reforms refocus existing funds to prioritize Californians with the most serious mental health and substance use issues, who are too often experiencing homelessness. They also fund more than 11,150 new behavioral health beds and supportive housing units and 26,700 outpatient treatment slots.

    Los Angeles, California – California took a major step forward in correcting the damage from 50 years of neglect to the state’s mental health system with the passage of Proposition 1. This historic measure — a signature priority of Governor Gavin Newsom — adds rocket fuel to California’s overhaul of the state’s behavioral health systems. It provides a full range of mental health and substance abuse care, with new accountability metrics to ensure local governments deliver for their communities.

    This is the biggest reform of the California mental health system in decades and will finally equip partners to deliver the results all Californians need and deserve. Treatment centers will prioritize mental health and substance use support in the community like never before. Now, it’s time to roll up our sleeves and begin implementing this critical reform – working closely with city and county leaders to ensure we see results.

    Governor Gavin Newsom

    newsom-news-template
    IMG_3682-min
    contact-governor-landing
    workers-FxAJ5fkakAAtVI3
    priorities-and-progress-image
    economy-F-isBKpbsAAxdab
    gun-violence-San Diego Guns Package 2.18.22_2

    What they’re saying: 

    • Sacramento Mayor Darrell Steinberg, original author of the Mental Health Services Act: “Twenty years ago, I never could have dreamed that we would have the strong leadership we have today, committing billions and making courageous policy changes that question the conventional wisdom on mental health. Now, with the passage of Proposition 1. California is delivering on decades old promises to help people living with brain-based illnesses, to live better lives, to live independently and to live with dignity in our communities. This is a historic moment and the hard work is ahead of us.“
    • Senator Susan Eggman (D-Stockton), author of Senate Bill 326: “Today marks a day of hope for thousands of Californians who are struggling with mental illness – many of whom are living unhoused. I am tremendously grateful to my fellow Californian’s for passing this important measure.  And I am very appreciative of this Governor’s leadership to transform our behavioral health care system!”
    • Assemblymember Jacqui Irwin (D-Thousand Oaks), author of Assembly Bill 531: “This started as an audacious proposal to address the root cause of homelessness and today, Californians can be proud to know that they did the right thing by passing Proposition 1. Now, it’s time for all of us to get to work, and make sure these reforms are implemented and that we see results.”

    Bigger picture: Transforming the Mental Health Services Act into the Behavioral Health Services Act and building more community mental health treatment sites and supportive housing is the last main pillar of Governor Newsom’s Mental Health Movement – pulling together significant recent reforms like 988 crisis line, CalHOPE, CARE Court, conservatorship reform, CalAIM behavioral health expansion (including mobile crisis care and telehealth), Medi-Cal expansion to all low-income Californians, Children and Youth Behavioral Health Initiative (including expanding services in schools and on-line), Older Adult Behavioral Health Initiative, Veterans Mental Health Initiative, Behavioral Health Community Infrastructure Program, Behavioral Health Bridge Housing, Health Care Workforce for All and more.

    More details on next step here

    Press Releases, Recent News

    Recent news

    News State continues raising awareness of dangerous drug  What you need to know: California is using a multifaceted approach to tackle illicit fentanyl, including seizing nearly $300 million of illicit fentanyl since 2023 and increasing public education in schools…

    News SACRAMENTO – Governor Gavin Newsom today announced the following appointments:Melissa Stone, of Elk Grove, has been appointed Chief Deputy Director at the Department of Child Support Services. Stone has been Deputy Director of the Disability Insurance Branch at…

    News What you need to know: California’s work to pre-deploy resources ahead of this week’s major storms paid off with successful rescue efforts and no major damage reported. SACRAMENTO — Governor Gavin Newsom today praised the proactive emergency response efforts that…

    MIL OSI USA News

  • MIL-OSI USA: $300 million of illicit fentanyl seized in California since 2023

    Source: US State of California 2

    Feb 19, 2025

    State continues raising awareness of dangerous drug 

    What you need to know: California is using a multifaceted approach to tackle illicit fentanyl, including seizing nearly $300 million of illicit fentanyl since 2023 and increasing public education in schools statewide. The work this year adds to efforts last month to remove nearly $3.6 million of deadly fentanyl from our communities.

    Sacramento, California Kicking off 2025 with enhanced focus to combat the scourge of illegal fentanyl trafficking, the state has now supported the seizure of nearly 22,000 pounds and more than 37 million pills containing fentanyl, with a street value of nearly $300 million. 

    Through the state’s Counter Drug Task Force operations statewide, California National Guard (Cal Guard) Task Force members have been strategically deployed statewide, including at ports of entry, to combat transnational criminal organizations and trafficking illegal narcotics like fentanyl, in support of federal, state and local law enforcement partners. 

    I’m proud of the work we are doing across the state to educate Californians on the dangers of fentanyl, remove this addictive drug off our streets and provide treatment – like naloxone – to save lives.

    Governor Gavin Newsom

    Service members helped confiscate 557 pounds and 319,732 pills of this dangerous drug in January alone, accounting for a street valuation of $3.6 million. 

    In addition, Cal Guard service members continue to transform drug prevention in elementary, middle, and high schools statewide through the Task Force’s Drug Demand Reduction Outreach program. Between October and December 2024, servicemembers visited 45 high-risk schools, engaging 33,437 students. By conducting in-person outreach and understanding students’ beliefs about their own health using a Health Belief Model, Cal Guard is implementing an impactful initiative in the fight against opioid abuse.

    Within the last year, Governor Newsom announced continued augmentation in staffing and enforcement of Cal Guard’s illicit fentanyl operations. 

    Addressing the opioid crisis

    The state has launched various initiatives in recent years to combat illicit opioids through the Governor’s Master Plan for Tackling the Fentanyl and Opioid Crisis, which provides a comprehensive framework to support overdose prevention efforts, hold the opioid pharmaceutical industry accountable, crack down on drug trafficking, and raise awareness about the dangers of opioids like fentanyl.

    The Campus Opioid Act, signed by Governor Newsom in 2022, requires that every public college campus in California distribute a federally approved opioid overdose reversal medication like naloxone, and include information about opioid overdoses in their orientation process. Building on this effort, the Governor last year signed AB 2429, requiring that fentanyl education be included in high school health classes starting in the 2026-27 school year.

    Serving as a one-stop tool for Californians seeking resources for prevention and treatment, the website opioids.ca.gov provides information on how California is working to hold Big Pharma and drug traffickers accountable in this crisis.

    The public education campaign Facts Fight Fentanyl informs Californians about the dangers of fentanyl and how to prevent overdoses and deaths. This effort will provide critical information about fentanyl and life-saving tools such as naloxone. 

    Latest laboratory testing from the federal Drug Enforcement Agency indicates five out of 10 pills tested in 2024 contain a potentially deadly dose of fentanyl, which is down from seven of 10 pills in 2023.

    Providing lifesaving emergency treatment

    Through the Naloxone Distribution Project (NDP), over-the-counter CalRx®-branded naloxone is now available across the state. The CalRx®-branded over-the-counter (OTC) naloxone HCL nasal spray, 4 mg, is available for free to eligible organizations through the state and for sale for $24 per twin-pack through Amneal. Since 2018, there have been over 334,000 reversals reported from NDP naloxone since 2018. 

    How we got here

    In 2024, Governor Newsom doubled down on the deployment of the Cal Guard’s Counterdrug Task Force by more than doubling the number of service members supporting fentanyl interdiction, and seizing other drugs, at California ports of entry to nearly 400. Fentanyl is primarily smuggled into the country by U.S. citizens through ports of entry. 

    Cal Guard’s coordinated drug interdiction efforts in the state are funded in part by California’s $60 million investment over four years to expand Cal Guard’s work to prevent drug trafficking by transnational criminal organizations. This adds to the Governor’s efforts to address fentanyl within California, including by cracking down on fentanyl in communities across the state, including San Francisco.

    Recent news

    News SACRAMENTO – Governor Gavin Newsom today announced the following appointments:Melissa Stone, of Elk Grove, has been appointed Chief Deputy Director at the Department of Child Support Services. Stone has been Deputy Director of the Disability Insurance Branch at…

    News What you need to know: California’s work to pre-deploy resources ahead of this week’s major storms paid off with successful rescue efforts and no major damage reported. SACRAMENTO — Governor Gavin Newsom today praised the proactive emergency response efforts that…

    News SACRAMENTO – Governor Gavin Newsom today announced his appointment of 14 Superior Court Judges: seven in Los Angeles County; one in Modoc County; two in Riverside County; one in San Diego County; one in San Mateo County; one in Tulare County; and one in Ventura…

    MIL OSI USA News

  • MIL-OSI United Nations: New UN Mediator for Libya — Tenth in 14 Years — Must Avoid Past Failures, Delegate Warns Security Council

    Source: United Nations General Assembly and Security Council

    UN Political Chief Says Libyans’ Dream Unfulfilled after February Revolution 14 Years Ago

    Libya’s leaders and security actors are prioritizing political and personal gain over national interests, the United Nations’ top political official told the Security Council today, as the country’s delegate blamed proxy wars for its instability.

    Fourteen years on since the 17 February 2011 Revolution in Libya, “the dream of a civil, democratic and prosperous Libya remains unfulfilled” due to “entrenched divisions, economic mismanagement, continued human rights violations and competing domestic and external interests”, said Rosemary DiCarlo, Under-Secretary-General for Political and Peacebuilding Affairs.  Highlighting efforts by the United Nations Support Mission in Libya (UNSMIL) to revive the political process, she noted the establishment of an Advisory Committee comprising legal and constitutional experts to provide proposals supporting efforts towards holding national elections.

    Pointing to the lack of progress on a unified budget or an agreed spending framework, as well as disagreement over the leadership of the Libyan Audit Bureau, she said it is critical to support the Central Bank’s efforts to stabilize the financial situation.  The dispute over the position of President of the High Council of State remains unresolved.  “Politicization and political divisions are also hindering progress on national reconciliation,” she said, noting that amendments to a draft law on that topic have raised concerns over the independence of a future National Reconciliation Commission.

    Following successful local elections in 56 municipalities in November 2024, the High National Elections Commission is preparing for the next 63 elections.  “Funding from the Government is crucial to enable the High National Elections Commission to implement this next phase of municipal council elections,” she stressed.  On the security front, the activities of non-State and quasi-State armed actors continue to pose a threat to Libya’s fragile stability, she said, noting that the 2020 Ceasefire Agreement has only been partially implemented.

    She also expressed concern about the continuing trend of arbitrary arrests and enforced disappearances across Libya.  Drawing attention to “the alarming and tragic discovery of mass graves” earlier this month in north-east and south-east Libya, she said:  “This is yet another reminder of the urgent need to protect migrants and combat human trafficking.”  Calling for support to the 2025 Libyan chapter of the Sudan Refugee Regional Response Plan, which requires $106 million, she urged Council members to support the newly appointed Special Representative Hanna Tetteh, who will be taking up her functions in Tripoli on 20 February.

    In December 2024, a senior UN official announced a new UN-mediated process aimed at breaking the political deadlock — marked by the presence of rival Governments — and facilitating elections.  (See Press Release SC/15938.)

    Libya Battleground for Proxy Wars

    Libya’s delegate, who spoke at the end of today’s meeting, pointed out that Ms. Tetteh will be the tenth Special Representative of the Secretary-General assigned to his country in 14 years, calling this “a record”.  The Council must reflect on whether this indicates a “problem” with the imposition of solutions, UN mechanisms or the officials themselves.  He added:  “We hope that she will harness the lessons from the past and will not repeat the same misgivings by trying the same things and expecting different results.”  He also raised several concerns about the Advisory Committee established by UNSMIL, including whether it was expected to put forward a single proposal or numerous proposals, and how exactly political stakeholders would contribute to this process.

    “My country has become a ground for the settlement of disputes” in proxy wars, he said, adding that it is influenced by instability in the region, including “political and security-based changes”.  However, he pointed out, the recent holding of municipal elections around the country is a good example of Libya’s ability to ensure electoral processes where there is support and political will.  Any reconciliation must be based “on transitional justice, on accountability, on truth and on redress and compensation”, he stressed, while reiterating a request for the removal of individuals on the Sanctions List for humanitarian reasons or if their “listing was erroneous, or because their file was used to further political friction”.

    Many Council members welcomed the establishment of the Advisory Committee and the appointment of the new Special Representative as positive steps towards relaunching the political process.

    The representative of the United States said Ms. Tetteh’s prior experience in Sudan and South Sudan can inform her approach in Libya.  A political solution is the path to long-term stability, and time is of the essence, she said, noting “destabilizing activities from external actors” and the need for “east-west security integration”. Recalling the visit of a delegation from her country to Libya, she urged all parties to reach agreement on a unified budget to end persistent conflicts over revenue-sharing.

    The Russian Federation’s delegate expressed hope that the new Special Representative will adopt an impartial approach, informed by a sober assessment of the political climate.  Ms. Tetteh will have the difficult task of redressing imbalance and revitalizing UN mediation efforts, he said.  This month marks the fourteenth anniversary since the “egregious Western intervention and the virtual destruction of Libyan Statehood”, he observed, adding:  “The collapse of the country took place and is ongoing to this date.”

    Updating Sanctions Regime

    The United Kingdom’s delegate welcomed the recent adoption of new designation criteria for the UN sanctions regime to hold those exploiting Libyan crude oil and petroleum accountable and help to safeguard its resources.  “Until a unifying political agreement is achieved in Libya, it will be impossible to unlock its great potential,” she added.  (See Press Release SC/15967.)  Along similar lines, France’s delegate said:  “Libyan money needs to benefit the Libyan people”, adding that a unified budget and a unified Government go hand in hand.  Such a Government, capable of organizing presidential and legislative elections as soon as possible, is crucial.

    “Good-faith engagement and demonstrating compromise” will be essential in overcoming all outstanding, contentious issues, Slovenia’s speaker advised, adding that the political process must include Libyans from all walks of life, with women and young people.  Denmark’s delegate added:  “No woman should fear reprisals as a consequence of political engagement — neither online, nor offline.”  Further, organizations promoting women’s rights should be able to operate freely.

    The representative of Panama acknowledged the enormous political challenges in Libya, where “the crisis has fragmented the social fabric and institutions in the country”, as he expressed support for efforts to hold elections representing different factions of Libyan society.  Greece’s delegate pointed out that stability in Libya remains key for the region, and even more so for immediate neighbours like his own country which are impacted by the significant increase of irregular migration flows.

    Communications between East-West Security Institutions

    On security, the representative of Pakistan highlighted the reported agreement between Eastern and Western security institutions to establish a joint centre for communication and information exchange.  Noting that these are preliminary steps, he added:  “This will need a well-defined comprehensive peacebuilding and reconciliation strategy”.  Also welcoming the establishment of the joint centre for border security, the representative of the Republic of Korea noted that efforts to unify military institutions will be essential for strengthening Libya’s security.  Calling on “foreign Powers” to refrain from providing arms to Tripoli “for their narrow geopolitical interests”, he said that those weapons destabilize the broader region and bolster terrorism.

    Several speakers echoed the need to avoid external interference and respect the leadership of the Libyan people.  The representative of Guyana, also speaking for Algeria, Sierra Leone and Somalia, said the Advisory Committee’s proposals are meant to foster further consultations between UNSMIL and the relevant Libyan decision makers and stakeholders.  She called for “careful attention to how this work is undertaken, so that it “avoids creating any additional challenges”.  She also expressed concern about the lack of progress in convening national elections.

    The representative of China, Council President for February, speaking in his national capacity, stressed the need to avoid undue external interference, while Libya is on the path to elections and national reconciliation.  UNSMIL must strengthen its communication with Libyan parties and put forward practical proposals, he said, hoping that the Special Representative will advance the political process.  The Mission should monitor the ceasefire, he said, noting that improving the security situation and fighting the crime trajectory are imperative.

    MIL OSI United Nations News

  • MIL-OSI Security: Fourteen Members and Associates of Violent Transnational Motorcycle Gang Indicted on RICO and Murder Charges

    Source: United States Attorneys General

    An indictment was unsealed today in the Southern District of Texas charging 14 members and associates of the Bandidos Outlaw Motorcycle Gang for their alleged roles in a criminal enterprise engaged in murder, robbery, arson, narcotics distribution, and witness intimidation in and around Houston.

    The indictment accuses the defendants of various crimes, including engaging in a conspiracy to commit racketeering (RICO) activity and committing violent crimes in furtherance of the gang such as murder, attempted murder, and assault. The indictment alleges that the Bandidos are a self-identified “outlaw” motorcycle organization with a membership of approximately 1,500 to 2,000 in the United States and an additional 1,000 to 1,500 members internationally, including in Mexico.

    “Today’s indictment is an important step in eliminating the Bandidos Outlaw Motorcycle Gang,” said Supervisory Official Antoinette T. Bacon of the Justice Department’s Criminal Division. “The Bandidos declare war on rivals — and they wage that war on our streets. Criminal behavior like this has no place in America, and the Department of Justice is fully committed to bringing peace back to our communities.”

    “Ensuring the safety of the public is Southern District of Texas’ paramount concern,” said U.S. Attorney Nicholas J. Ganjei for the Southern District of Texas. “The indictment here not only alleges shocking crimes of violence, but also alleges that these offenses were committed openly and wantonly, where any innocent member of the public could have been hurt or killed.”

    According to court documents and statements in court, beginning in 2019, a violent turf war erupted between the Bandidos and B*EAST, a rival outlaw motorcycle gang in the Houston area. As part of this turf war, Bandidos national leadership allegedly put out a “smash on site” order to commit physical assaults, including murder, against B*EAST members. The turf war has resulted in gunfire exchanged on public roadways and in public establishments with innocent civilians present, according to the charges.

    John M. Pfeffer, also known as Big John, 32, Darvi Hinojosa, also known as 10 Round, 35, and Bradley Rickenbacker, also known as Dolla Bill, 37, all of Katy, Texas; Michael H. Dunphy, also known as Money Mike, 57, of Cleveland, Texas; Christopher Sanchez, also known as Monster, 40, of Tomball, Texas; and Brandon K. Hantz, also known as Loco and Gun Drop, 33, of Crosby, Texas, are charged with conspiracy to commit racketeering activity. Pfeffer, Dunphy, Hinojosa, Rickenbacker, and Sanchez are further charged with multiple counts of assault in aid of racketeering. Pfeffer, Hinojosa, Rickenbacker, and Sanchez are also charged with using a firearm during and in relation to a crime of violence, while Sanchez faces charges of being a felon in possession of a firearm. Hantz is also charged with arson.

    If convicted, Pfeffer, Hinojosa, Rickenbacker, and Sanchez each face a maximum penalty of life in prison, while Dunphy and Hantz each face a maximum penalty of 20 years in prison on each of their counts.

    The indictment also charges David Vargas, also known as Brake Check and First Time, 33, of Houston, with murder in aid of racketeering; using a firearm during and in relation to a crime of violence resulting in death; attempted murder in aid of racketeering; and using a firearm during and in relation to the attempted murders. All those charges relate to the killing of a rival and the shooting of two others. If convicted, Vargas faces a mandatory penalty of life in prison or the death penalty.

    Further, Marky Baker, also known as Pinche Guero and Guero, 40; Ronnie McCabe, also known as Meathead, 56; and Jeremy Cox, also known as JD, 37, all of Houston; Roy Gomez, also known as Repo, 50, of Richmond, Texas; and Marcel Lett, 56, of Pearland, Texas, are charged along with Pfeffer and Rickenbacker with assault in aid of racketeering and using a firearm during and in relation to a crime of violence. These charges are in relation to an alleged assault and robbery that resulted in the death of a rival. If convicted, they each face a maximum penalty of life in prison.

    Hinojosa is also charged along with John Sblendorio, also known as Tech9, 54, of Houston, with conspiracy to commit murder in aid of racketeering, attempted murder in aid of racketeering, assault in aid of racketeering, and using a firearm during and in relation to a crime of violence in connection with the shooting of a rival gang member. Hinojosa is also charged with conspiracy to distribute cocaine and three counts of possession with intent to distribute cocaine. If convicted, Sblendorio and Hinojosa each face a maximum penalty of life in prison.

    In addition, Sean G. Christison, also known as Skinman, 30, of Katy, is charged with possession with intent to distribute cocaine and possession of a firearm in furtherance of a drug trafficking crime. He faces a maximum penalty of life in prison.

    For all defendants, a federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI, Texas Board of Criminal Justice — Office of Inspector General, Texas Department of Public Safety, and Montgomery County Sheriff’s Office conducted the investigation, with assistance from the Harris County Sheriff’s Office; Houston and Pasadena Police Departments; Texas Alcoholic Beverage Commission; LaMarque and Katy Police Departments; U.S. Marshals Service; Bureau of Alcohol, Tobacco, Firearms and Explosives; and Cypress-Fairbanks Independent School District Police Department.

    Trial Attorneys Grace H. Bowen and Christopher Taylor of the Criminal Division’s Violent Crime and Racketeering Section and Assistant U.S. Attorneys Byron H. Black and Kelly Zenón-Matos for the Southern District of Texas are prosecuting the case.

    This investigation was part of an Organized Crime Drug Enforcement Task Forces (OCDETF) operation. OCDETF identifies, disrupts and dismantles the highest-level drug traffickers, money launderers, gangs and transnational criminal organizations that threaten the United States by using a prosecutor-led, intelligence-driven, multi-agency approach that leverages the strengths of federal, state and local law enforcement agencies against criminal networks. Additional information about the OCDETF Program can be found on the Justice Department’s OCDETF webpage.

    This case is being prosecuted as part of the joint federal, state and local Project Safe Neighborhoods (PSN) Program, the centerpiece of the Justice Department’s violent crime reduction efforts. PSN is an evidence-based program proven to be effective at reducing violent crime. Through PSN, a broad spectrum of stakeholders work together to identify the most pressing violent crime problems in the community and develop comprehensive solutions to address them. As part of this strategy, PSN focuses enforcement efforts on the most violent offenders and partners with locally based prevention and reentry programs for lasting reductions in crime. For more information about PSN, please visit www.justice.gov/psn.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Mexican National Who Supervised a Drug Trafficking Organization Operating in Orville, Washington, Sentenced to 15 Years in Federal Prison

    Source: Office of United States Attorneys

    The investigation resulted in the seizure of more than 100 pounds of illegal drugs

    Spokane, Washington – Acting United States Attorney Richard R. Barker announced that on February 19, 2025, United States District Judge Thomas O. Rice sentenced Erubey Arciga Medrano, age 35, of Michoacan, Mexico, to 180 months in federal prison on drug trafficking charges. Judge Rice also imposed 5 years of supervised release. When he imposed the sentence, Judge Rice noted the large amount of drugs and firearms involved in this case.

    According to court documents and information presented at the sentencing hearing, in January 2023, the Bureau of Indian Affairs (BIA) identified Medrano as the leader of a drug trafficking organization flooding portions of the Eastern District of Washington, including the Oroville area and the Colville Indian Reservation, with methamphetamine and fentanyl.

    Between January 2023 and March 2023, BIA, the Drug Enforcement Administration (DEA), Washington State law enforcement and Colville Tribal law enforcement conducted a series of controlled drug buys from Medrano and others selling drugs on his behalf.

    On April 19, 2023, BIA, DEA, the North Central Washington Narcotics Task Force, and other Federal, State, Local, and Tribal law enforcement, executed a series of federal search warrants at a number of homes in rural Okanogan County, near Oroville, Washington. In total, investigators seized approximately 161,000 fentanyl-laced pills (to include Mexi-blues and rainbow-colored pills), approximately 80 pounds of methamphetamine, approximately 6 pounds of heroin, and more than 2 pounds of cocaine. The BIA, DEA, and their partners also seized approximately 12 firearms.

    “The volume of drugs and firearms seized during this operation is staggering. I am so grateful for the incredible law enforcement team, which came together to conduct this operation and remove these drugs from Eastern Washington communities,” stated Acting United States Attorney Richard Barker. “Because of the joint efforts of federal state, local, and Tribal law enforcement – which were led in this case by the BIA’s Division of Drug Enforcement – Eastern Washington is safer today.  Many of these drugs were destined for Native American communities, including in Eastern Washington and Montana. I am confident that lives were saved as a result of the incredible work that was done in this case.”   

    “The impact of this individual and his drug trafficking organization on numerous tribal members, their communities, and surrounding areas – between the Colville Indian Reservation in Washington to the Crow Indian Reservation in Montana – cannot be quantified. The Bureau of Indian Affairs (BIA) expresses its gratitude for the robust partnerships with various law enforcement agencies that contributed to the successful conclusion of this investigation,” Deputy Associate Director of the BIA Division of Drug Enforcement, Tom Atkinson, stated. “This achievement exemplifies the BIA’s unwavering commitment to dismantling organizations that exploit Indian Country and to safeguarding all residents of our native lands.”

    “Drug traffickers like Mr. Medrano profit from the pain they cause selling poison to our neighbors,” said David F. Reames, Special Agent in Charge, DEA Seattle Division. “We at the Drug Enforcement Administration, and our partners, work tirelessly to protect our community and this case highlights the lengths we will go to ensure people trafficking fentanyl and methamphetamine are held accountable for the suffering they cause.”

    This case was investigated by the Bureau of Indian Affairs Division of Drug Enforcement, the Drug Enforcement Administration, and the North Central Washington Narcotics Task Force.  The investigation team was assisted by the U.S. Marshals Service, U.S. Customs and Border Protection, the Okanogan County Sheriff, Colville Tribal Police Department, and the Kalispel Tribal Police Department. The case was prosecuted by Acting United States Attorney Richard R. Barker and Assistant United States Attorney Nowles H. Heinrich.

    2:23-cr-00047-TOR

    MIL Security OSI

  • MIL-OSI USA: Rosen, Cortez Masto Express Concern, Demand Transparency Regarding Termination of Forest Service and Department of the Interior Employees

    US Senate News:

    Source: United States Senator Jacky Rosen (D-NV)
    WASHINGTON, DC – Today, U.S. Senators Jacky Rosen (D-NV) and Catherine Cortez Masto (D-NV) sent two letters to the Trump Administration regarding his recent decision to terminate several thousand employees at the United States Forest Service (USFS) and the Department of the Interior (DOI). The senators expressed deep concerns about the risks that these mass firings could have on the millions of acres of public lands in Nevada and demanded transparency about the projects the terminated employees had been responsible for. 
    “President Trump’s reckless firing of thousands of employees at the Department of the Interior and the United States Forest Service raises serious concerns about the impacts this could have on Nevada’s public lands,” said Senator Rosen. “I’m joining Senator Cortez Masto in pushing back and requesting more information from the Trump Administration to understand how this will impact ongoing projects across our state.”
    “The Trump administration has made the chaotic decision to fire thousands of hard-working federal employees who keep Nevadans safe from wildfires and protect their access to clean water,” said Senator Cortez Masto. “The federal government is responsible for managing over 80% of the land in Nevada, and our families deserve answers about how this decision will impact their communities.”
    Nevada has the highest percentage of land managed by DOI – more than any other state. Specifically, the Bureau of Land Management (BLM) manages over 60 percent (approximately 48 million acres) of Nevada’s land. Nevada is also home to prominent lands managed by the Bureau of Reclamation (BOR), National Park Service (NPS), and U.S. Fish and Wildlife Service (USFWS). Additionally, the USFS manages approximately 5.9 million acres of land in Nevada, including some of our most cherished landscapes such as the Lake Tahoe Basin, the Ruby Mountains within the Humboldt-Toiyabe National Forest, and the Spring Mountains National Recreation Area outside of Las Vegas. Many Nevadans rely on the services provided by Forest Service staff. 
    The Senators asked that the following information about the terminated employees be made public:
    The number of employees terminated. 
    A description of the position and responsibilities of each terminated employee.
    A list and description of the projects to which each terminated employee was assigned.
    A description of what information the terminated employees were provided.
    The letter to the USFS can be found here and the letter to the DOI can be found here. 
    Senators Rosen and Cortez Masto are champions for Nevada’s great outdoor spaces and public lands. They recently joined Nevada’s Congressional delegation in urging the Trump Administration to preserve national monument designations in Nevada. The Senators passed critical legislation to permanently fund the Land and Water Conservation Fund (LWCF), which protects public lands in Nevada and across the U.S. They also passed bipartisan, bicameral legislation to reauthorize the Lake Tahoe Restoration Act, and they delivered critical funding to protect Lake Tahoe in the Bipartisan Infrastructure Law. Last year, Senators Rosen and Cortez Masto announced over $375 million for recreation and conservation projects across Nevada.

    MIL OSI USA News

  • MIL-OSI Europe: Written question – Persons with disabilities in the occupied Palestinian territories – E-000618/2025

    Source: European Parliament

    Question for written answer  E-000618/2025
    to the Commission
    Rule 144
    Lynn Boylan (The Left), Kathleen Funchion (The Left)

    Disability inclusion in the occupied Palestinian territories remains a critical issue. Even after the 2025 ceasefire, life-saving humanitarian aid for persons with disabilities continues to be blocked by Israel. Many forcibly displaced people are unable to return home because of the inaccessibility of the route and checkpoints. Their homes have often been destroyed, and tented accommodation lacks basic essentials for safety and security, including accessible water, sanitation and hygiene services. Persons with disabilities face a continued shortage of assistive technology and will be disproportionately impacted by the growing mental health crisis. Children and women and girls with disabilities are at particular risk.

    How is the Commission:

    • 1.ensuring that humanitarian aid reaches Palestinians with disabilities in the occupied territories, and that disability-specific requirements (such as assistive technology) are being met?
    • 2.assisting Palestinians with disabilities to return to their homes, and supporting the inclusive, accessible reconstruction of housing, transport and other public infrastructure?
    • 3.engaging with and supporting Palestinian civil society and disability advocacy groups to ensure that their voices and requirements are reflected in EU-funded work?

    Submitted: 11.2.2025

    Last updated: 19 February 2025

    MIL OSI Europe News

  • MIL-OSI Europe: Answer to a written question – Need for immediate EU action and financial support in response to damage caused by recent floods in Cyprus – E-002774/2024(ASW)

    Source: European Parliament

    The Commission expresses its deep regret for the damage caused to Cyprus by the floods on 2 November 2024. Under the ‘Thalia 2021-2027’ Programme, Cohesion Policy supports Cyprus with EUR 79 million (EU contribution) for long-term investments aimed at risk prevention and resilience-building, particularly in coastal areas.

    These investments include targeted anti-flood measures, designed to mitigate the impacts of natural disasters. In addition, Cyprus’ recovery and resilience plan includes several anti-flood and water collection measures, as well as measures to enhance Cyprus’ civil protection system .

    Similarly, through the Cypriot Rural Development Programme 2014-2022 and the Common Agricultural Policy Strategic Plan 2023-2027, significant support is available for restoring agricultural potential.

    Furthermore, on 19 December 2024, the Regional Emergency Support to Reconstruction (RESTORE) proposal was approved.

    RESTORE introduces targeted flexibilities under the 2021-2027 Cohesion Policy framework, for reconstruction and repair measures to alleviate the negative socioeconomic consequences of natural disasters.

    Additional measures under the European Agricultural Fund for Rural Development (EAFRD) are also available to provide liquidity support for farmers, forest holders, and small and medium-sized enterprises under the Rural Development Programmes impacted by such events.

    The Commission stands ready to collaborate with the Cypriot authorities to explore how EU resources can be deployed effectively. In line with the shared management principle, the national authorities are responsible for selecting, implementing and monitoring the EU co-funded projects, in line with the programming documents.

    MIL OSI Europe News

  • MIL-OSI Security: Federal Indictment Charges Suburban Chicago Man With Trafficking Firearms and Drugs

    Source: Office of United States Attorneys

    CHICAGO — A federal grand jury has indicted a suburban Chicago man for allegedly trafficking firearms and drugs.

    An indictment returned Thursday in U.S. District Court in Chicago charges EFRAIN JACOBO, 42, of Prospect Heights, Ill., with federal firearm and drug offenses.  He pleaded not guilty to the charges during his arraignment this morning in federal court.  Jacobo is currently detained in federal custody.

    According to the indictment and a criminal complaint previously filed in the case, Jacobo dealt six handguns, a rifle, ammunition, and narcotics in a series of transactions last fall in Joliet, Ill.  The drugs in the deals included methamphetamines and cocaine. Unbeknownst to Jacobo, the individual to whom he sold the guns and drugs was an undercover law enforcement officer, the charges allege.

    During the investigation, law enforcement seized approximately 150 kilograms of methamphetamines from a truck that had traveled from Texas to Bolingbrook, Ill.  Law enforcement also seized fentanyl and cocaine from a storage facility used by Jacobo in Wheeling, Ill., and additional cocaine from Jacobo’s vehicle, the charges allege.

    The indictment was announced by Morris Pasqual, Acting United States Attorney for the Northern District of Illinois, Christopher Amon, Special Agent-in-Charge of the Chicago Field Division of the U.S. Bureau of Alcohol, Tobacco, Firearms & Explosives, Sheila G. Lyons, Special Agent-in-Charge of the Chicago Field Division of the U.S. Drug Enforcement Administration, and Mike Rompa, Chief of the Bolingbrook, Ill. Police Department.  The government is represented by Assistant U.S. Attorney Margaret A. Steindorf.

    The public is reminded that an indictment is not evidence of guilt.  The defendant is presumed innocent and entitled to a fair trial at which the government has the burden of proving guilt beyond a reasonable doubt. 

    MIL Security OSI

  • MIL-OSI Security: U.S. Attorney Announces Guilty Plea in Unregistered Firearm Case

    Source: Office of United States Attorneys

    ALBUQUERQUE – An Alamogordo man pleaded guilty pleaded guilty to possessing a modified shotgun that was used in the fatal shooting of Alamogordo Police Officer Anthony Ferguson on July 15, 2023.

    According to court documents, on July 15, 2023, Dominic De La O, 28, possessed a modified 12-gauge shotgun with a barrel length of less than 16 inches and an overall length of less than 26 inches, making it subject to registration under federal law. De La O admitted that the modified shotgun was operable and not registered to him in the National Firearms Registration and Transfer Record. He also acknowledged that the firearm lacked the new serial number required by law for modified weapons.

    On that date, De La O used the shotgun to shoot and kill Alamogordo Police Officer Anthony Ferguson during a traffic stop.

    Jonah Apodaca was subsequently charged with being a felon in possession of a firearm after the ATF determined that he had provided the modified shotgun to De La O. Apodaca pled guilty to the charges on June 18, 2024, and was sentenced to 72 months in federal prison.

    De La O will remain in custody pending sentencing, which has not been scheduled. At sentencing, De La O faces up to 10 years in prison followed by three years of supervised release. In November 2024, a jury in New Mexico’s Twelfth Judicial District convicted De La O of murdering Officer Ferguson and a judge sentenced him to life in prison without the possibility of parole.

    Acting U.S. Attorney Holland S. Kastrin, and Brendan Iber, Special Agent in Charge of the Phoenix Field Division of the Bureau of Alcohol, Tobacco, Firearms and Explosives, made the announcement today.

    The Bureau of Alcohol, Tobacco, Firearms and Explosives investigated this case with assistance from the Alamogordo Police Department, New Mexico State Police, and the Otero County Sheriff’s Office. Assistant U.S. Attorneys Maria Y. Armijo and Ry Ellison are prosecuting the case.

    MIL Security OSI

  • MIL-OSI USA:  Welch Provides Remarks at the Vermont Dairy Producers Conference 

    US Senate News:

    Source: United States Senator Peter Welch (D-Vermont)
    BURLINGTON, VT — U.S. Senator Peter Welch (D-Vt.) delivered remarks at the Vermont Dairy Producers Conference on Monday. He discussed the path forward to protect Vermont’s dairy industry from harmful policies put forth by the Trump Administration, including the Administration’s actions on immigration and the Trump Tariffs, which will raise prices for farms, businesses and families.
    “I’m fighting to strengthen Vermont’s dairy farms, but many of President Trump’s actions during his first month in office are hurting farms and rural communities. His policies—threatened and enacted through Executive Order—are already putting pressure on dairy farmers and the USDA. None of us want this to happen, and we have to resist,” said Senator Welch. “A strong dairy industry is a strong Vermont, and I’ll do everything I can to fight for Vermont’s dairy farmers in Washington.” 
    As Ranking Member of the Senate Agriculture Subcommittee on Rural Development, Energy, and Credit, Senator Welch has led bipartisan efforts to support Vermont’s dairy farmers and strengthen the state’s dairy industry. 
    View photos from the event below: 
    In 2023, Vermont imported $76 million worth of livestock feed from Canada. New blanket tariffs proposed by the Trump Administration on Canada and Mexico would increase costs for dairy farmers by raising the cost of livestock feed and eventually reduce the size of their milk check. Additionally, President Trump’s actions on immigration risk limiting Vermont’s agricultural workforce, with farming communities across the state reporting increased presence from Immigrations and Customs Enforcement, especially in Addison County. 
    The Trump Administration’s illegal freeze on programs across the federal government have caused serious harm to farmers and producers across Vermont. The unconstitutional funding freeze broke the government’s promise to reimburse farmers for projects funded by the Inflation Reduction Act, leaving farmers to foot the bill–sometimes hundreds of thousands of dollars. 
    Last Congress, Senator Welch introduced several bills to support Vermont’s dairy, organic, and specialty crop farmers; strengthen rural development and infrastructure; increase energy efficiency and renewable energy adoption; improve access to nutrition; strengthen our local food systems and expand markets; and make our communities more resilient to flooding—all of which were included in the Rural Prosperity and Food Security Act. Senator Welch plans to reintroduce many of these bills and policy provisions in the 119th Congress, including his bipartisan, bicameral Whole Milk for Healthy Kids Act, which would bring nutritious whole milk back into schools. 

    MIL OSI USA News

  • MIL-OSI Video: Secretary Rollins Meets with U.S. Forest Service Wildland Firefighters

    Source: United States of America – Federal Government Departments (video statements)

    U.S. Secretary of Agriculture Brooke Rollins met with U.S. Forest Service wildland firefighters who were deployed to southern California to help suppress the devastating wildfires.

    https://www.youtube.com/watch?v=38UWfMl9kFo

    MIL OSI Video

  • MIL-OSI United Kingdom: Brighter Beginnings Event fun day at Eden Court

    Source: Scotland – Highland Council

    The Highland Council will be hosting a fun day at Eden Court Theatre, Inverness on Monday 3 March 2025.

    Cllr David Fraser, Chair of Highland Council’s Health Social Care and Wellbeing Committee said: “Brighter Beginnings is the first event held by Inverness Family Centre bringing together families and professionals to see what’s available for Highland’s youngest children. I hope that many families will take advantage of this great new opportunity.”

    Families with children under 5 years old are welcome to come along between 10.30am and 2.30pm and take part in free activities including messy play, scavenger hunt, outdoor play and puppet shows. There will also be a fire engine, police car and play bus on site. The first 100 parents/carers to come along will receive a free goodie bag!

    Image of Brighter Beginnings Event poster

    Gillian Forbes, PEEP Co-ordinator at the Inverness Family Centre said: “We are delighted to be hosting this event and are excited to welcome families along to meet services and enjoy the activities.  We recognise the importance of the Infant Pledge and working alongside families to give our youngest children the best possible start in life.”

    The event will run alongside the ‘Brighter Beginnings: Why early years matter’ Conference where there will be keynote speakers including Dan Wuori, Founder and President of Early Childhood Policy Solutions in the United States, and international author.

    Dan said: “I am looking forward to visiting the Highlands and meeting everyone. Learning starts before a baby is born and it’s vital that we recognise the importance of education in early years. This event is a great opportunity to talk about the role of parents/carers and professionals in giving our youngest children the best possible start in life.”

    Over 100 parents/carers and professionals will attend the Conference including children under 5.

    19 Feb 2025

    MIL OSI United Kingdom

  • MIL-OSI Asia-Pac: Hong Kong Customs and Marine Police detected six large-scale maritime smuggling cases involving cigarettes and drugs during joint anti-smuggling operations (with photo)

    Source: Hong Kong Government special administrative region

    Hong Kong Customs and Marine Police detected six large-scale maritime smuggling cases involving cigarettes and drugs during joint anti-smuggling operations (with photo)
    Hong Kong Customs and Marine Police detected six large-scale maritime smuggling cases involving cigarettes and drugs during joint anti-smuggling operations (with photo)
    ******************************************************************************************

         Hong Kong Customs and the Marine Police conducted joint operations from February 12 to 19 targeting large-scale maritime smuggling activities and six cases involving suspected illicit cigarettes and suspected dangerous drugs were detected. During the joint operations, a total of about 16.93 million sticks of suspected illicit cigarettes and 459 kilograms of suspected cannabis buds were seized.     Customs and police officers conducted anti-smuggling operations in Sai Kung and Lantau Island from February 13 to 16 and detected four suspected illicit cigarettes smuggling cases. A total of 4.1 million sticks of suspected illicit cigarettes, with an estimated market value of about $19 million and a duty potential of about $13.5 million, found in four goods vehicles and the waters nearby. The four goods vehicles involved in the cases were also detained.                 At small hours on February 18, Customs found a suspicious unattended fishing vessel in Shau Kei Wan Typhoon Shelter. Upon inspection, Customs officers seized 12.83 million suspected illicit cigarettes, with an estimated market value of about $57 million and a duty potential of about $42 million, inside the compartments of the vessel.      Later on the same day, Customs intercepted a suspicious fishing vessel in the waters off Lamma Island, during which persons onboard the fishing vessel threw numerous nylon bags into the sea. Customs officers then took immediate action to board the vessel and retrieved the subject nylon bags from the water. Upon inspection, a total of about 459kg suspected cannabis buds, with an estimated market value of about $118 million, were found inside the nylon bags. Three local men, aged between 44 and 60, suspected to be connected with the case were arrested in the operation.     Investigations on the above mentioned six cases are ongoing.     Being a government department primarily responsible for tackling smuggling activities, Customs has long been combating various smuggling activities at the forefront. Customs will keep up its enforcement action and continue to fiercely combat sea smuggling activities through proactive risk management and intelligence-based enforcement strategies. Customs will continue co-operating and exchanging intelligence with the Police, Mainland and international law enforcement agencies, with targeted anti-smuggling operations carried out at suitable times to disrupt these activities.     Smuggling is a serious offence. Under the Import and Export Ordinance, any person found guilty of importing or exporting unmanifested cargo is liable to a maximum fine of $2 million and imprisonment for seven years.      Under the Dangerous Drug Ordinance, trafficking in a dangerous drug is a serious offence. The maximum penalty upon conviction is a fine of $5 million and life imprisonment.     Under the Dutiable Commodities Ordinance, anyone involved in dealing with, possession of, selling or buying illicit cigarettes commits an offence. The maximum penalty upon conviction is a fine of $1 million and imprisonment for two years.     Members of the public may report any suspected drug trafficking or illicit cigarette activities to Customs’ 24-hour report hotline 182 8080 or its dedicated crime reporting email account (crimereport@customs.gov.hk) or online form (eform.cefs.gov.hk/form/ced002/).

     
    Ends/Wednesday, February 19, 2025Issued at HKT 22:27

    NNNN

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: The conference was not just limited to discussing challenges, but also focused on collective efforts to find solutions: Union Minister Shri C R Patil

    Source: Government of India

    The conference was not just limited to discussing challenges, but also focused on collective efforts to find solutions: Union Minister Shri C R Patil

    The second All-India State Water Ministers’ Conference concludes with key recommendations on water security

    Second day of the conference focuses on Water Delivery Services, Demand Management & Water Use Efficiency and Integrated River & Coastal Management

    The mission ‘Har Khet Ko Pani’ through strategic interventions highlighted in the conference

    Second all India conference proposes the Bureau of Water Use Efficiency to promote water use efficiency across all sectors

    The day one discussions revolves around the development and maintenance of water storage infrastructure

    The conference reaffirms its commitment to sustaining the Jal Jeevan Mission (JJM), with a particular emphasis on community-led operation

    Posted On: 19 FEB 2025 6:42PM by PIB Delhi

    The second All-India State Water Ministers’ Conference successfully concluded  in Udaipur, Rajastan, bringing together key stakeholders to deliberate on critical water management issues. The final day of the conference focused on three thematic sessions: Water Delivery Services: Irrigation and Other Uses, Demand Management and Water Use Efficiency, and Integrated River and Coastal Management. These discussions led to significant recommendations aimed at enhancing India’s water governance and ensuring sustainable water resource management. The two day conference on February 18-19, 2025 was inaugurated by Union Minister of Jal Shakti  Shri C R Patil in  the presence of  Chief Minister of Rajasthan Shri Bhajan Lal Sharma.

     

    In the closing ceremony of the two day conference, Union Minister of Jal Shakti Shri C R Patil emphasized that the conference was not just limited to discussing challenges, but also focused on collective efforts to find solutions. The Minister also highlighted the importance of such forums in sharing knowledge and finding practical solutions to issues.

    The final day of the conference emphasized the importance of achieving the mission ‘Har Khet Ko Pani’ through strategic interventions. To this end, adopting Evapotranspiration (ET) based irrigation performance assessment and improving on-farm application efficiency through micro-irrigation were recommended. Accelerating Command Area Development for last mile connectivity and promoting conjunctive use of surface water, groundwater, and treated water through guidelines and Standard Operating Procedures (SOPs) were also suggested.

    Furthermore, the conference recommended enhancing the reach of the Pressurized Irrigation Network (PIN) and Underground Pipe Line (UGPL). A bureau of water use efficiency to promote Water Use Efficiency (WUE) across all sectors was also proposed in the conference. Holistic Demand Management for reducing water stress, adopting water-efficient cropping patterns, and applying state-of-the-art technology, including AI/ML, for sustainable water management practices in agriculture was also emphasized.

    In addition, the conference recommended promoting volumetric measurement of water uses in all sectors. River Rejuvenation through wastewater treatment, recycle and reuse, e-flow, flood plain zoning, riverfront development, and community participation were also suggested. Expanding the coastal monitoring network, promoting ecological restoration and biodiversity conservation in river and coastal regions, rejuvenating springs and other natural sources for augmenting river flows, and promoting circular economy and water tourism as self-sustaining economic models were also recommended. These recommendations aim to strengthen India’s water management and conservation efforts ensuring a sustainable and secure water future for the country.

    The conference reaffirmed its commitment to sustaining the Jal Jeevan Mission (JJM), with a particular emphasis on community-led operation and maintenance through Village Water & Sanitation Committees (VWSCs). Water quality testing remains a priority, ensuring safe drinking water reaches every household. Discussions also explored measures to achieve urban water security through the AMRUT Scheme and integrate grey water management under Swachh Bharat Mission 2.0. Special attention was given to vulnerable regions, ensuring that potable water reaches the most underserved communities.

    A key focus area of the first day of the conference was the development and maintenance of water storage infrastructure, not only through new projects but also by prioritizing Extension, Renovation, and Modernization (ERM) of existing systems. Discussions underscored the importance of accelerating river interlinking projects through consensus-building, alongside the repair, renovation, and restoration of smaller water bodies to enhance water availability. Delegates also stressed the need for automated reservoir operations for better storage management, as well as comprehensive interventions to promote water conservation at every level.

    The conference also witnessed deliberations revolved around strengthening water governance, enhancing storage infrastructure, improving irrigation systems, and increasing water-use efficiency. Discussions emphasized the need for Integrated Water Resources Management (IWRM) tailored to state-specific requirements, participatory governance at the grassroots level, and water budgeting to optimize demand and availability. The importance of leveraging data, technology, and innovation to improve efficiency and sustainability was also highlighted. Additionally, there was a strong push to scale up the ‘Jal Sanchay Jan Bhagidari’ initiative nationwide to promote community-driven water conservation efforts.

    The conference witnessed the participation of Chief Ministers of Odisha and Tripura, Deputy Chief Ministers of Himachal Pradesh, Chhattisgarh, and Karnataka, along with 34 Ministers and over 300 delegates.

    ***

    Dhanya Sanal K

    Director

    (Release ID: 2104797) Visitor Counter : 32

    MIL OSI Asia Pacific News

  • MIL-OSI USA: Senator Marshall Leads Bipartisan Effort to Improve Important Weather Forecasting Tools

    US Senate News:

    Source: United States Senator for Kansas Roger Marshall
    Washington, D.C. – U.S. Senators Roger Marshall, M.D. (R-Kansas) and Brian Schatz (D-Hawaii) introduced bipartisan legislation to strengthen the collection of weather and soil moisture data and improve the accuracy of extreme weather warnings and agriculture forecasts.
    “The mesonet and soil moisture monitoring probes are crucial tools for Kansans. Weather affects everything on the farm, and a deeper understanding of what’s happening above and below the ground provides farmers more certainty when making crop decisions,” said Senator Marshall. “Better weather data collection for Kansas also helps us predict wildfires and tornadoes before they arrive, which has the potential to save lives in cases of extreme weather. I’m proud to introduce this important, bipartisan legislation.”
    “For Hawai‘i and other states vulnerable to floods, droughts, and severe weather, better data means better forecasts, better prepared communities, and faster emergency response times,” said Senator Schatz. “This same data also helps farmers and ranchers navigate droughts.”
    The Improving Flood and Agricultural Forecasts Act of 2025 codifies and expands the National Mesonet Program at the National Oceanic and Atmospheric Administration (NOAA) and updates other programs that are crucial to Kansans, such as the National Drought Information System and the Soil Moisture Monitoring Network. 
    You may click HERE to read the full bill text. 
    BACKGROUND:
    Mesonets are weather observation data tools that observe and track mesoscale weather events, and they are crucial for collecting hyperlocal meteorological data, such as soil moisture and stream gauges, to better forecast weather, flood, fire, and agricultural impacts. 
    Improving the National Mesonet Program and outlining its objectives through this bill would give NOAA authority to address critical gaps in weather data and forecasting. 

    MIL OSI USA News

  • MIL-OSI USA: ICYMI: Senator Marshall and Secretary of Agriculture Brooke Rollins Hold Fireside Chat at Top Producer Summit and Join RFD-TV to Discuss Agricultural Priorities

    US Senate News:

    Source: United States Senator for Kansas Roger Marshall
    Kansas City – U.S. Senator Roger Marshall, M.D. (R-Kansas) welcomed U.S. Secretary of Agriculture Brooke Rollins to Kansas this week. They made multiple stops around the state at key Kansas agriculture locations and ended their trip by attending Top Producer Summit in Kansas City where they held a fireside chat which was moderated by Senator Marshall.
    During the conversation, Secretary Rollins discussed her background and priorities for improving American agriculture. Both Senator Marshall and Secretary Rollins emphasized that they are not just fighting for policies, but fighting for the American farmer and rancher who put so much on the line to feed our country and the world. Senator Marshall and Secretary Rollins also discussed the importance of cutting government regulations and increasing agricultural production. 
    In addition, Senator Marshall and Secretary Rollins joined RFD-TV to discuss tariffs, their commitment to working with President Trump to help ranchers and farmers, and the status of the next Farm Bill.
    You may click HERE  to watch Senator Marshall’s full interview with RFD-TV.
    Highlights from the interview include:
    Senator Marshall on how rural farmers are struggling and what can be done:
    “As the Secretary mentioned, there’s been a record drop in net farm income. But the opportunities are there. The dairy industry is growing in Kansas. The cattle industry is growing as well. Biofuels are huge opportunities as well. So I think again, in the spirit of optimism, rolling back regulations. The Secretary was very involved before in the previous Trump Administration, rolling back Waters of the U.S. Our farmers and ranchers are being strangled by regulation, so we are looking forward to rolling those back as well.”
    Senator Marshall on the importance and function of tariffs:
    “Farmers and ranchers support President Trump. They know under Trump 1.0 that he gave us USMCA (United States-Mexico-Canada Agreement)… He used those tariffs for the long-term gain of the farmers. [President Trump is] the best deal maker that you’ve ever met, and he’s going to make a deal with India. And I think India will replace China as one of our top markets as well, but not if they’re tariffing us 50% and we’re not tariffing them. So I think there are huge opportunities. We’ve got a deal maker in DC now, and the Secretary is gonna be right there pushing them down that road as well.”
    Senator Marshall on the outlook of the next Farm Bill:
    “We’ll get done this year. I am looking forward to working with Senator Klobuchar who’s the new ranking member for the Democrats… So, I think working with her and Senator Bozeman, we’ll get it across the finish line. We will put the farm back in Farm Bill. We’ll take care of the crop insurance. We’re going to take care of reference prices and maybe expand the guardrails for the conservation program so that the farmers and ranchers can actually use them. So, we’ll put the farm back in Farm Bill. We’ll get it done.”
    Senator Marshall on working with Agriculture Secretary Brooke Rollins:
    “Secretary Rollins lives, breathes, and eats this agriculture world. And I think she did a great job communicating what was on her heart. She was born and raised in agriculture and that agriculture isn’t just an industry, it’s a way of life. And then her relationship with President Trump over the last eight years, and what a huge priority rural America is to President Trump. 90% of rural Americans voted for President Trump. That’s not lost on him, and he wants us to do everything that he can to make rural America great again.”

    MIL OSI USA News

  • MIL-OSI USA: Attorney General James Announces Takedown of Fentanyl and Cocaine Trafficking Ring in the Hudson Valley 

    Source: US State of New York

    NEW YORK – New York Attorney General Letitia James today announced the takedown of a drug trafficking ring in the Hudson Valley that illegally sold cocaine, powder fentanyl, and counterfeit oxycodone pills containing fentanyl across Dutchess, Ulster, and Orange Counties. An investigation led by the Office of the Attorney General’s (OAG) Organized Crime Task Force (OCTF) recovered two and a half kilograms of cocaine worth approximately $45,000, thousands of counterfeit oxycodone pills containing fentanyl worth over $500,000, and three and a half kilograms of powder fentanyl worth over $200,000. Five illegal handguns, including two ghost guns, and four high-capacity magazines were also seized during the operation. A 122-count indictment charging four individuals for their roles in the drug trafficking network was unsealed in Dutchess County Court. The indictment charges Xavier Grant, Antawone West, Michael Jones, and Kenyi Torres with multiple felonies for narcotics and firearms offenses.

    “Drug traffickers who distribute lethal amounts of opioids put communities throughout our state in danger,” said Attorney General James. “Not only did these individuals sell deadly narcotics, they disguised fentanyl in fake prescription pills, putting the lives of their customers at even greater risk. I thank our partners in law enforcement for their collaboration in this effort to take a dangerous criminal organization off our streets as we continue to work to keep New Yorkers safe.”

    The takedown was the result of an eleven-month joint investigation led by OCTF and the New York State Police’s (NYSP) Special Investigations Unit – Hudson Valley (SIU-HV) and Troop K – Violent Gang and Narcotics Enforcement Team (K-VGNET).

    The investigation included hundreds of hours of physical and covert surveillance, analysis of voluminous electronic evidence, including cellphone communications, covert video and audio recordings, and other traditional investigative techniques. During their communications, the defendants frequently utilized coded and cryptic terminology in an attempt to disguise their illicit activities, such as referring to orders of counterfeit oxycodone pills containing fentanyl as “blues,” “blueberries,” or “perks,” a nod to their legitimate, prescription medication counterparts. 

    The investigation revealed that Grant, West, Jones, and Torres obtained cocaine, powder fentanyl, and counterfeit oxycodone pills containing fentanyl for further distribution. Additionally, the investigation revealed that the four defendants worked together to store, supply, and distribute the narcotics in Dutchess, Orange, and Ulster Counties. The narcotics were stored in various stash locations in the residential areas of Poughkeepsie and often sold in parking lots. The investigation also seized five illegal handguns, four of which were loaded, and two of which were ghost guns, in addition to four illegal high-capacity magazines.

    The investigation into this narcotics trafficking network led to the recovery of:

    • Two and a half kilograms of cocaine;
    • Thousands of counterfeit oxycodone pills containing fentanyl weighing over two and a half kilograms;
    • Three and a half kilograms of powder fentanyl;
    • Five illegal handguns, including two ghost guns and four high-capacity magazines;
    • Drug paraphernalia, including scales, ziplock bags, glassine envelopes, and other packaging materials used to package and measure narcotics;
    • Two “kilo” presses; and
    • Approximately $255,000 in cash.

    Some of the alleged narcotics and firearms seized during the investigation, including cocaine, counterfeit oxycodone pills containing fentanyl, powder fentanyl, five handguns, four high-capacity magazines, and “kilo” presses.

    The 122-count indictment, unsealed in Dutchess County Court, includes counts for various felony narcotics offenses, including charges against Jones and West for Criminal Sale of a Controlled Substance in the First Degree and Criminal Possession of a Controlled Substance in the First Degree, respectively. Each carries a maximum sentence of 20 years in prison. Additional charges include various counts of Criminal Sale of a Controlled Substance (class B felonies) and Criminal Possession of a Controlled Substance (class A-II and B felonies), as well as Conspiracy to commit those crimes.

    Jones and West are also charged with firearms offenses including Criminal Possession of a Weapon in the Second Degree, a class C violent felony, Criminal Possession of a Weapon in the Third Degree, a class D felony, and Criminal Possession of a Firearm, a class E felony.

    Grant and Torres are each charged with, among other things, multiple counts of Criminal Sale of a Controlled Substance in the Second Degree, a class A-II felony, which carries a maximum sentence of 10 years in prison. They are also charged with Conspiracy to commit those crimes. The charges against the defendants are merely accusations and the defendants are presumed innocent unless and until proven guilty.

    Some of the alleged counterfeit oxycodone pills containing fentanyl seized during this investigation.

    “I want to thank the Attorney General’s Office, and our law enforcement partners for their vigilant hard work that has resulted in the arrests of these dangerous individuals,” said New York State Police Superintendent Steven G. James. “The sale of these highly addictive drugs perpetuates a cycle of substance abuse which poses a significant threat to safety and quality of life within our neighborhoods. This sends a strong message to dealers that we will not tolerate illegal drugs and weapons being brought into or sold in our communities.”

    Those charged in the indictment include:

    • Xavier Grant a/k/a “X,” 22 years old of Poughkeepsie, New York;
    • Antawone West, 25 years old of Poughkeepsie, New York;
    • Michael Jones a/k/a “Slime,” 33 years old of Poughkeepsie, New York; and
    • Kenyi Torres, 45 years old of Middletown, New York.

    This takedown marks the latest major drug bust in OAG’s Suburban and Upstate Response to the Growing Epidemic (SURGE) Initiative, a law enforcement effort that brings together state and local law enforcement to target New York’s heroin, opioid, and narcotics trafficking networks. Since launching in 2017, SURGE has taken 984 alleged traffickers off the streets.

    The investigation was led by OCTF Detectives David Walsh and Steven Cohan, under the supervision of OCTF Detective Supervisor Bradford Miller, OCTF Downstate Assistant Chief Ismael Hernandez, and OCTF Deputy Chief Andrew Boss. The Attorney General’s Investigations Division is led by Chief Oliver Pu-Folkes. 

    Attorney General James would also like to thank Dutchess County District Attorney Anthony Parisi, the Dutchess County Sheriff’s Office, the City of Poughkeepsie Police Department, and the Dutchess County Drug Task Force for their assistance throughout the investigation.

    The case is being prosecuted by OCTF Assistant Deputy Attorney General Joseph Barca under the supervision of Downstate OCTF Deputy Chief Lauren Abinanti, with the assistance of OCTF Legal Support Analysts Madeline Rosen, Alex DiGiacomo, and former Legal Support Analyst Christine Cintron. Nicole Keary is the Deputy Attorney General in Charge of OCTF. The Division for Criminal Justice is led by Chief Deputy Attorney General José Maldonado. Both the Investigations Division and the Division for Criminal Justice are overseen by First Deputy Attorney General Jennifer Levy.

    MIL OSI USA News

  • MIL-OSI Europe: President Meloni meets with the President of the State of Israel, Isaac Herzog

    Source: Government of Italy (English)

    The President of the Council of Ministers, Giorgia Meloni, received the President of the State of Israel, Isaac Herzog, at Palazzo Chigi today, as part of the recent meetings held with the main leaders of the Middle East and the Gulf region. 

    This was the fourth meeting between the two leaders since President Meloni entered office, providing her with an opportunity to reaffirm the importance of upholding the Gaza ceasefire agreement. Said agreement has allowed for a number of the hostages to be released and for humanitarian aid to be significantly increased to the Strip, where Italy is at the forefront also through its ‘Food for Gaza’ initiative.

    During the meeting, President Meloni reiterated Italy’s commitment to the stabilisation and reconstruction of Gaza, as well as the need for a political horizon towards a just and lasting peace in the region.

    A similar hope was expressed with reference to the ceasefire reached in Lebanon, where Italy plays an irreplaceable role including through its UNIFIL contingent.

    Lastly, the meeting highlighted the common will to enhance the bilateral partnership in all sectors, starting with energy, science and technology.

    MIL OSI Europe News

  • MIL-OSI Security: #StopRansomware: Ghost (Cring) Ransomware

    Source: US Department of Homeland Security

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Ghost (Cring)—(“Ghost”)—ransomware IOCs and TTPs identified through FBI investigation as recently as January 2025.

    Beginning early 2021, Ghost actors began attacking victims whose internet facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China. Ghost actors, located in China, conduct these widespread attacks for financial gain. Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses.

    Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over time. Names associated with this group include Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. Samples of ransomware files Ghost used during attacks are: Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe.

    Ghost actors use publicly available code to exploit Common Vulnerabilities and Exposures (CVEs) and gain access to internet facing servers. Ghost actors exploit well known vulnerabilities and target networks where available patches have not been applied.

    The FBI, CISA, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Ghost ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 16.1. See the MITRE ATT&CK Tactics and Techniques section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques.

    Initial Access

    The FBI has observed Ghost actors obtaining initial access to networks by exploiting public facing applications that are associated with multiple CVEs [T1190]. Their methodology includes leveraging vulnerabilities in Fortinet FortiOS appliances (CVE-2018-13379), servers running Adobe ColdFusion (CVE-2010-2861 and CVE-2009-3960), Microsoft SharePoint (CVE-2019-0604), and Microsoft Exchange (CVE-2021-34473CVE-2021-34523, and CVE-2021-31207— commonly referred to as the ProxyShell attack chain).

    Execution

    Ghost actors have been observed uploading a web shell [T1505.003] to a compromised server and leveraging Windows Command Prompt [T1059.003] and/or PowerShell [T1059.001] to download and execute Cobalt Strike Beacon malware [T1105] that is then implanted on victim systems. Despite Ghost actors’ malicious implementation, Cobalt Strike is a commercially available adversary simulation tool often used for the purposes of testing an organization’s security controls.

    Persistence

    Persistence is not a major focus for Ghost actors, as they typically only spend a few days on victim networks. In multiple instances, they have been observed proceeding from initial compromise to the deployment of ransomware within the same day. However, Ghost actors sporadically create new local [T1136.001] and domain accounts [T1136.002] and change passwords for existing accounts [T1098]. In 2024, Ghost actors were observed deploying web shells [T1505.003] on victim web servers.

    Privilege Escalation

    Ghost actors often rely on built in Cobalt Strike functions to steal process tokens running under the SYSTEM user context to impersonate the SYSTEM user, often for the purpose of running Beacon a second time with elevated privileges [T1134.001].

    Ghost actors have been observed using multiple open-source tools in an attempt at privilege escalation through exploitation [T1068] such as “SharpZeroLogon,” “SharpGPPPass,” “BadPotato,” and “GodPotato.” These privilege escalation tools would not generally be used by individuals with legitimate access and credentials. 

    See Table 1 for a descriptive listing of tools.

    Credential Access

    Ghost actors use the built in Cobalt Strike function “hashdump” or Mimikatz [T1003] to collect passwords and/or password hashes to aid them with unauthorized logins and privilege escalation or to pivot to other victim devices.

    Defense Evasion

    Ghost actors used their access through Cobalt Strike to display a list of running processes [T1057] to determine which antivirus software [T1518.001] is running so that it can be disabled [T1562.001]. Ghost frequently runs a command to disable Windows Defender on network connected devices. Options used in this command are: Set-MpPreference -DisableRealtimeMonitoring 1 -DisableIntrusionPreventionSystem 1 -DisableBehaviorMonitoring 1 -DisableScriptScanning 1 -DisableIOAVProtection 1 -EnableControlledFolderAccess Disabled -MAPSReporting Disabled -SubmitSamplesConsent NeverSend.

    Discovery

    Ghost actors have been observed using other built-in Cobalt Strike commands for domain account discovery [T1087.002], open-source tools such as “SharpShares” for network share discovery [T1135], and “Ladon 911” and “SharpNBTScan” for remote systems discovery [T1018]. Network administrators would be unlikely to use these tools for network share or remote systems discovery.

    Lateral Movement

    Ghost actors used elevated access and Windows Management Instrumentation Command-Line (WMIC) [T1047] to run PowerShell commands on additional systems on the victim network— often for the purpose of initiating additional Cobalt Strike Beacon infections. The associated encoded string is a base 64 PowerShell command that always begins with: powershell -nop -w hidden -encodedcommand JABzAD0ATgBlAHcALQBPAGIAagBlAGMAdAAgAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgALABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACIA… [T1132.001][T1564.003].

    This string decodes to “$s=New-Object IO.MemoryStream(,[Convert]::FromBase64String(“” and is involved with the execution of Cobalt Strike in memory on the target machine.

    In cases where lateral movement attempts are unsuccessful, Ghost actors have been observed abandoning an attack on a victim.

    Exfiltration

    Ghost ransom notes often claim exfiltrated data will be sold if a ransom is not paid. However, Ghost actors do not frequently exfiltrate a significant amount of information or files, such as intellectual property or personally identifiable information (PII), that would cause significant harm to victims if leaked. The FBI has observed limited downloading of data to Cobalt Strike Team Servers [T1041]. Victims and other trusted third parties have reported limited uses of Mega.nz [T1567.002] and installed web shells for similar limited data exfiltration. Note: The typical data exfiltration is less than hundreds of gigabytes of data.

    Command and Control

    Ghost actors rely heavily on Cobalt Strike Beacon malware and Cobalt Strike Team Servers for command and control (C2) operations, which function using hypertext transfer protocol (HTTP) and hypertext transfer protocol secure (HTTPS) [T1071.001]. Ghost rarely registers domains associated with their C2 servers. Instead, connections made to a uniform resource identifier (URI) of a C2 server, for the purpose of downloading and executing Beacon malware, directly reference the C2 server’s IP address. For example, http://xxx.xxx.xxx.xxx:80/Google.com where xxx.xxx.xxx.xxx represents the C2 server’s IP address.

    For email communication with victims, Ghost actors use legitimate email services that include traffic encryption features. [T1573] Some examples of emails services that Ghost actors have been observed using are Tutanota, Skiff, ProtonMail, Onionmail, and Mailfence.

    Note: Table 2 contains a list of Ghost ransom email addresses.

    Impact and Encryption

    Ghost actors use Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe, which are all ransomware executables that share similar functionality. Ghost variants can be used to encrypt specific directories or the entire system’s storage [T1486]. The nature of executables’ operability is based on command line arguments used when executing the ransomware file. Various file extensions and system folders are excluded during the encryption process to avoid encrypting files that would render targeted devices inoperable.

    These ransomware payloads clear Windows Event Logs [T1070.001], disable the Volume Shadow Copy Service, and delete shadow copies to inhibit system recovery attempts [T1490]. Data encrypted with Ghost ransomware variants cannot be recovered without the decryption key. Ghost actors hold the encrypted data for ransom and typically demand anywhere from tens to hundreds of thousands of dollars in cryptocurrency in exchange for decryption software [T1486].

    The impact of Ghost ransomware activity varies widely on a victim-to-victim basis. Ghost actors tend to move to other targets when confronted with hardened systems, such as those where proper network segmentation prevents lateral moment to other devices.

    Indicators of Compromise (IOC)

    Table 1 lists several tools and applications Ghost actors have used for their operations. The use of these tools and applications on a network should be investigated further.

    Note: Authors of these tools generally state that they should not be used in illegal activity.

    Table 1: Tools Leveraged by Ghost Actors
    Name Description Source
    Cobalt Strike Cobalt Strike is penetration testing software. Ghost actors  use an unauthorized version of Cobalt Strike. N/A
    IOX Open-source proxy, used to establish a reverse proxy to a Ghost C2 server from an internal victim device. github[.]com/EddieIvan01/iox
    SharpShares.exe SharpShares.exe is used to enumerate accessible network shares in a domain. Ghost actors use this primarily for host discovery. github[.]com/mitchmoser/SharpShares
    SharpZeroLogon.exe SharpZeroLogon.exe attempts to exploit CVE-2020-1472 and is run against a target Domain Controller. github[.]com/leitosama/SharpZeroLogon
    SharpGPPPass.exe SharpGPPPass.exe attempts to exploit CVE-2014-1812 and targets XML files created through Group Policy Preferences that may contain passwords. N/A
    SpnDump.exe SpnDump.exe is used to list service principal name identifiers, which Ghost actors use for service and hostname enumeration. N/A
    NBT.exe A compiled version of SharpNBTScan, a NetBIOS scanner. Ghost actors use this tool for hostname and IP address enumeration. github[.]com/BronzeTicket/SharpNBTScan
    BadPotato.exe BadPotato.exe is an exploitation tool used for privilege escalation. github[.]com/BeichenDream/BadPotato
    God.exe God.exe is a compiled version of GodPotato and is used for privilege escalation. github[.]com/BeichenDream/GodPotato
    HFS (HTTP File Server) A portable web server program that Ghost actors use to host files for remote access and exfiltration. rejitto[.]com/hfs
    Ladon 911 A multifunctional scanning and exploitation tool, often used by Ghost actors with the MS17010 option to scan for SMB vulnerabilities associated with CVE-2017-0143 and CVE-2017-0144. github[.]com/k8gege/Ladon
    Web Shell A backdoor installed on a web server that allows for the execution of commands and facilitates persistent access. Slight variation of github[.]com/BeichenDream/Chunk-Proxy/blob/main/proxy.aspx
    Table 2: MD5 File Hashes Associated with Ghost Ransomware Activity
    File name MD5 File Hash
    Cring.exe c5d712f82d5d37bb284acd4468ab3533
    Ghost.exe

    34b3009590ec2d361f07cac320671410

    d9c019182d88290e5489cdf3b607f982

    ElysiumO.exe

    29e44e8994197bdb0c2be6fc5dfc15c2

    c9e35b5c1dc8856da25965b385a26ec4

    d1c5e7b8e937625891707f8b4b594314

    Locker.exe ef6a213f59f3fbee2894bd6734bbaed2
    iex.txt, pro.txt (IOX) ac58a214ce7deb3a578c10b97f93d9c3
    x86.log (IOX)

    c3b8f6d102393b4542e9f951c9435255

    0a5c4ad3ec240fbfd00bdc1d36bd54eb

    sp.txt (IOX) ff52fdf84448277b1bc121f592f753c5
    main.txt (IOX) a2fd181f57548c215ac6891d000ec6b9
    isx.txt (IOX) 625bd7275e1892eac50a22f8b4a6355d
    sock.txt (IOX) db38ef2e3d4d8cb785df48f458b35090

    Ransom Email Addresses

    Table 3 is a subset of ransom email addresses that have been included in Ghost ransom notes.

    Table 3: Ransom Email Addresses
    Email Addresses
    asauribe@tutanota.com ghostbackup@skiff.com rainbowforever@tutanota.com
    cringghost@skiff.com ghosts1337@skiff.com retryit1998@mailfence.com
    crptbackup@skiff.com ghosts1337@tuta.io retryit1998@tutamail.com
    d3crypt@onionmail.org ghostsbackup@skiff.com rsacrpthelp@skiff.com
    d3svc@tuta.io hsharada@skiff.com rsahelp@protonmail.com
    eternalnightmare@tutanota.com just4money@tutanota.com sdghost@onionmail.org
    evilcorp@skiff.com kellyreiff@tutanota.com shadowghost@skiff.com
    fileunlock@onionmail.org kev1npt@tuta.io shadowghosts@tutanota.com
    fortihooks@protonmail.com lockhelp1998@skiff.com summerkiller@mailfence.com
    genesis1337@tutanota.com r.heisler@skiff.com summerkiller@tutanota.com
    ghost1998@tutamail.com rainbowforever@skiff.com webroothooks@tutanota.com

    Ransom Notes

    Starting approximately in August 2024, Ghost actors began using TOX IDs in ransom notes as an alternative method for communicating with victims. For example: EFE31926F41889DBF6588F27A2EC3A2D7DEF7D2E9E0A1DEFD39B976A49C11F0E19E03998DBDA and E83CD54EAAB0F31040D855E1ED993E2AC92652FF8E8742D3901580339D135C6EBCD71002885B.

    MITRE ATT&CK Tactics and Techniques

    See Table 4 to Table 13 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, version 16.1, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 4: Initial Access
    Technique Title  ID Use
    Exploit Public-Facing Application T1190 Ghost actors exploit multiple vulnerabilities in public-facing systems to gain initial access to servers.
    Table 5: Execution
    Technique Title  ID Use
    Windows Management Instrumentation T1047 Ghost actors abuse WMI to run PowerShell scripts on other devices, resulting in their infection with Cobalt Strike Beacon malware.
    PowerShell T1059.001 Ghost actors use PowerShell for various functions including to deploy Cobalt Strike.
    Windows Command Shell T1059.003 Ghost actors use the Windows Command Shell to download malicious content on to victim servers.
    Table 6: Persistence
    Technique Title  ID Use
    Account Manipulation T1098 Ghost actors change passwords for already established accounts.
    Local Account T1136.001 Ghost actors create new accounts or makes modifications to local accounts.
    Domain Account T1136.002 Ghost actors create new accounts or makes modifications to domain accounts.
    Web Shell T1505.003 Ghost actors upload web shells to victim servers to gain access and for persistence.
    Table 7: Privilege Escalation
    Technique Title  ID Use
    Exploitation for Privilege Escalation T1068 Ghost actors use a suite of open source tools in an attempt to gain elevated privileges through exploitation of vulnerabilities.
    Token Impersonation/Theft T1134.001 Ghost actors use Cobalt Strike to steal process tokens of processes running at a higher privilege.
    Table 8: Defense Evasion
    Technique Title  ID Use
    Application Layer Protocol: Web Protocols T1071.001 Ghost actors use HTTP and HTTPS protocols while conducting C2 operations. 
    Impair Defenses: Disable or Modify Tools T1562.001 Ghost actors disable antivirus products.
    Hidden Window T1564.003 Ghost actors use PowerShell to conceal malicious content within legitimate appearing command windows.
    Table 9: Credential Access
    Technique Title  ID Use
    OS Credential Dumping T1003 Ghost actors use Mimikatz and the Cobalt Strike “hashdump” command to collect passwords and password hashes.
    Table 10: Discovery
    Technique Title  ID Use
    Remote System Discovery T1018 Ghost actors use tools like Ladon 911 and ShapNBTScan for remote systems discovery.
    Process Discovery T1057 Ghost actors run a ps command to list running processes on an infected device.
    Domain Account Discovery T1087.002 Ghost actors run commands such as net group “Domain Admins” /domain to discover a list of domain administrator accounts.
    Network Share Discovery T1135 Ghost actors use various tools for network share discovery for the purpose of host enumeration.
    Software Discovery T1518 Ghost actors use their access to determine which antivirus software is running.
    Security Software Discovery T1518.001 Ghost actors run Cobalt Strike to enumerate running antivirus software.
    Table 11: Exfiltration
    Technique Title  ID Use
    Exfiltration Over C2 Channel T1041 Ghost actors use both web shells and Cobalt Strike to exfiltrate limited data.
    Exfiltration to Cloud Storage T1567.002 Ghost actors sometimes use legitimate cloud storage providers such as Mega.nz for malicious exfiltration operations.
    Table 12: Command and Control
    Technique Title  ID Use
    Web Protocols T1071.001 Ghost actors use Cobalt Strike Beacon malware and Cobalt Strike Team Servers which communicate over HTTP and HTTPS.
    Ingress Tool Transfer T1105 Ghost actors use Cobalt Strike Beacon malware to deliver ransomware payloads to victim servers.
    Standard Encoding T1132.001 Ghost actors use PowerShell commands to encode network traffic which reduces their likelihood of being detected during lateral movement.
    Encrypted Channel T1573 Ghost actors use encrypted email platforms to facilitate communications. 
    Table 13: Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486 Ghost actors use ransomware variants Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe to encrypt victim files for ransom.
    Inhibit System Recovery T1490 Ghost actors delete volume shadow copies.

    Mitigations

    The FBI, CISA, and MS-ISAC recommend organizations reference their #StopRansomware Guide and implement the mitigations below to improve cybersecurity posture on the basis of the Ghost ransomware activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    • Maintain regular system backups that are known-good and stored offline or are segmented from source systems [CPG 2.R]. Ghost ransomware victims whose backups were unaffected by the ransomware attack were often able to restore operations without needing to contact Ghost actors or pay a ransom.
    • Patch known vulnerabilities by applying timely security updates to operating systems, software, and firmware within a risk-informed timeframe [CPG 1.E].
    • Segment networks to restrict lateral movement from initial infected devices and other devices in the same organization [CPG 2.F].
    • Require Phishing-Resistant MFA for access to all privileged accounts and email services accounts.
    • Train users to recognize phishing attempts.
    • Monitor for unauthorized use of PowerShell. Ghost actors leverage PowerShell for malicious purposes, although it is often a helpful tool that is used by administrators and defenders to manage system resources. For more information, visit NSA and CISA’s joint guidance on PowerShell best practices.
      • Implement the principle of least privilege when granting permissions so that employees who require access to PowerShell are aligned with organizational business requirements.
    • Implement allowlisting for applications, scripts, and network traffic to prevent unauthorized execution and access [CPG 3.A].
    • Identify, alert on, and investigate abnormal network activity. Ransomware activity generates unusual network traffic across all phases of the attack chain. This includes running scans to discover other network connected devices, running commands to list, add, or alter administrator accounts, using PowerShell to download and execute remote programs, and running scripts not usually seen on a network. Organizations that can successfully identify and investigate this activity are better able to interrupt malicious activity before ransomware is executed [CPG 3.A].
      • Ghost actors run a significant number of commands, scripts, and programs that IT administrators would have no legitimate reason for running. Victims who have identified and responded to this unusual behavior have successfully prevented Ghost ransomware attacks.
    • Limit exposure of services by disabling unused ports such as, RDP 3398, FTP 21, and SMB 445, and restricting access to essential services through securely configured VPNs or firewalls.
    • Enhance email security by implementing advanced filtering, blocking malicious attachments, and enabling DMARC, DKIM, and SPF to prevent spoofing [CPG 2.M].

    Validate Security Controls

    In addition to applying mitigations, the FBI, CISA, and MS-ISAC recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 3 to Table 13).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    Reporting

    Your organization has no obligation to respond or provide information back to the FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to the FBI, reporting must be consistent with applicable state and federal laws.

    The FBI is interested in any information that can be shared, to include logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, and/or decryptor files.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, date of infection, date detected, initial attack vector, and host and network-based indicators.

    The FBI, CISA, and MS-ISAC do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (report@cisa.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. The FBI, CISA, and MS-ISAC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI, CISA, and the MS-ISAC.

    Version History

    February 19, 2025: Initial version.

    MIL Security OSI

  • MIL-OSI Global: Trust in politics is in long-term decline around the world – new research

    Source: The Conversation – UK – By Viktor Valgarðsson, Leverhulme Early Career Fellow in the Department of Politics and International Relations, University of Southampton

    Pro-Trump rioters stormed the US Capitol building to protest against the result of the 2020 presidential election. 72westy / Shutterstock

    Citizens’ trust in their political institutions has been falling around the world. This may not come as a shock to many.

    British politics has been in chaos since the Brexit referendum in 2016. Rioters stormed the US Capitol in protest against the result of the 2020 presidential election. And the US president, Donald Trump, is continuing to attack the supposed “deep-state” controlling American politics. None of these things scream public trust in government.

    But declining political trust is not self-evident. It’s possible that we may be too focused on a couple of countries that dominate our attention, and a lot has been going on in recent years that could explain the situation that we find ourselves in.

    Many researchers have also pointed out that people have never been particularly fond of politics. They suggest that we’ve simply been seeing “trendless fluctuations” in trust – ebbs and flows where we happen to notice declines more than rises or stability.

    In a recently published study, my co-authors and I took on this debate. We analysed more data on political trust than previous studies, from over 5 million respondents to 3,377 surveys conducted in 143 countries between 1958 and 2019.

    Our models suggest that, at least since 1990, trust in parliament and government has indeed been declining by an average of about 8.4 and 7.3 percentage points respectively in democratic countries across the world.

    The same does not apply to trust in non-representative “implementing institutions”, such as the civil service, justice system or police. In fact, we find that trust in the police has increased by about 12.5 percentage points across democracies on average over the same period.

    Thus, declining trust in government appears to be rooted in how politics is practised, which is seemingly less inspiring to citizens today, rather than in a growing distaste for social institutions in general.

    Global trends in trust in six types of institutions in democratic countries between 1990 and 2019.
    Valgarðsson et al. (2025) / British Journal of Political Science, CC BY-NC-ND

    Of course, this global picture masks a more nuanced story. Political trust has been rising in a few smaller countries: Denmark, Ecuador, New Zealand, Norway, Sweden and Switzerland. These nations may chart a path forward for the rest of the democratic world.

    Conversely, trust in the legal system has been declining in many countries in eastern Europe and Latin America. The same appears to be the case more recently in the US, suggesting that implementing institutions are not immune to the political trust crisis.

    Our findings do not answer why citizens of democracies are gradually losing faith in their democratic institutions, or what the consequences could be. They also do not suggest how trust in politics can be rebuilt. But what we do know is concerning.

    For instance, our data tells us that political trust was declining dramatically in Hungary right up until 2010, when Viktor Orbán was re-elected as prime minister (his first term ended in 2002). When in office, Orbán started dismantling the country’s constitutional and liberal democratic order.

    Trust in parliament, the legal system and the police in western Europe and North America.
    Valgarðsson et al. (2025) / British Journal of Political Science, CC BY-NC-ND

    We also know that the US has seen one of the more dramatic declines of political trust in recent times, and that political distrust was a powerful predictor of voting for Trump at least in the 2016 Republican primaries.

    In a survey conducted that year by American National Election Studies, about 24% of Trump’s primary voters said they would “never” trust the federal government to do what is right. This compared with about 9% of voters for rival Republican candidate John Kasich, and 8% and 4% of voters for Democrat candidates Bernie Sanders and Hillary Clinton respectively.

    We do not yet have data for the 2024 US presidential election. But it does not take a political scientist to know that Trump leaned even more heavily on people’s distrust in government in his campaign. Since becoming president, he has stepped up his efforts to dismantle America’s constitutional and liberal democratic order.

    Declining political trust is not the only cause of these developments. We are also seeing illiberal candidates and parties doing increasingly well in countries where we didn’t see the same trust declines in our data. The rising popularity of Geert Wilders in the Netherlands or the far-right Alternative für Deutschland (AfD) party in Germany are both good examples.

    Some of this may be driven partly by more recent trust declines, like in the Netherlands where trust in parliament has dropped substantially since 2020. Or it could be driven by a polarisation of trust between a more trusting majority and a deeply distrusting minority. But much of it is also probably driven by other factors, such as economic distress, attitudes towards immigration and the “culture wars” of our day.

    It stands to reason that voters who deeply distrust the political establishment would tend to be attracted to populist leaders who rail against that establishment.

    These voters probably still support democracy as an ideal. Support for democratic principles has, in fact, remained high globally – although there are worrying signs among younger generations in US and UK. But these voters appear to be more willing to vote for politicians who will attack the institutions needed to make it work.

    Sceptical mistrust of government

    This brings us to one crucial question: are citizens right to distrust government? After all, political institutions haven’t been working all that well for a large portion of citizens – except maybe in areas like Scandinavia, where we have seen rising trust in recent times.

    A degree of sceptical mistrust of government is certainly vital for a healthy democracy. We are reminded of this by some of the more sobering points in our data.

    China has the highest rates of reported trust in the world, while Hungary and Russia have both seen rising trust levels as their governments have become less democratic and seized control of the media environment. Clearly, trust is not unequivocally good from a democratic perspective.

    Our challenge is to find the right balance: a climate of sceptical trust, where we hold our governments to account and engage critically with our institutions without throwing them away in favour of autocratic populists.

    To save the foundations of liberal democracy, we may need to rediscover its appeal to the ordinary citizen. If it’s something about the way politics is practised that citizens distrust, perhaps those politics need to change.

    Viktor Valgarðsson does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Trust in politics is in long-term decline around the world – new research – https://theconversation.com/trust-in-politics-is-in-long-term-decline-around-the-world-new-research-250078

    MIL OSI – Global Reports

  • MIL-OSI Global: How refugee entrepreneurs are supplying sustainable energy to the camps they live in

    Source: The Conversation – UK – By Sarah Rosenberg-Jansen, Research Advisor on Humanitarian Energy, University of Oxford

    Refugees are providing energy within camps home to millions of displaced people around the world, my research has found.

    There are now more than 120 million forcibly displaced people globally. Although United Nations humanitarian agencies provide firewood and small electric lanterns, these are often not enough for most families.

    To make up the shortfall, entrepreneurial refugees in the camps I visited have become energy suppliers by establishing shops, phone charging stations, even cinemas.

    While visiting camps administered by the UN Refugee Agency in Rwanda, Kenya, the Democratic Republic of the Congo, Somalia, Sudan, Uganda and other countries across Africa, I was struck by the hum of electricity and the smell of cooking in the camps’ markets. Energy was everywhere.

    A mobile phone and electronics market shop at the Kakuma refugee camp, Kenya.
    Sarah Rosenberg-Jansen, CC BY-NC-ND

    In all the camps I visited, people were selling clothes, cooking bowls and toys, as well as lighting and electrical appliances. These shops all used energy – computers totted up bills and printed receipts, radios played music, and people everywhere were using mobile phones and the internet. Fans and motors were working hard to keep things cool and the power on. Refugees buy these products at local markets – which are often run by refugees themselves.

    After conducting over 170 interviews with refugees and humanitarian practitioners, it became clear refugees buy their own energy to run many of these cafes and shops: buying their own diesel, generators, or electricity technologies including solar panels and batteries.

    Formal refugee energy access provided by humanitarian agencies or national governments is projected to be very low: Chatham House statistics suggest 94% of forcibly displaced people living in camps have no meaningful access to power, and 81% lack anything other than the most basic fuels for cooking.

    Renewable connections

    Local energy businesses operating around the camps in Rwanda and Kenya, such as BBOX or MESH Power, provide solar solutions such as selling solar panels and solar home systems from which refugees can have lighting, charge their phones and plug in electrical appliances. These renewable systems help to lower the costs – but sometimes the companies are not able to expand their businesses within refugee camps due to UN restrictions.

    As one of the refugees I spoke to in Rwanda explained: “You can see two types of solar business really. Those using energy that is easy to get to – off-the-shelf products and services – to keep the lights on in the night, or offer cool drinks or a fan. And those businesses where really energy is the business … where people can use solar home systems or other technologies.”

    Sadly, this picture is not uniform across the world. For example, buying diesel in refugee camps or purchasing kerosene for lanterns can be very expensive. Spending by displaced people on simple cooking fuels and technologies, as well as basic lighting, is estimated to be around US$200 (£160) per year per family, for less than four hours of energy a day.

    Buying from external energy suppliers often comes at great cost to refugee families as energy in refugee camps can be incredibly expensive. Estimates suggest that refugee households in Kenya and Burkina Faso spend between 15% and 30% of their income on energy – a figure that in the UK would mean a household was in a situation of extreme fuel poverty.

    In total, refugee households around the world spend at least US$2.1 billion (£1.68 billion) on energy each year.

    Refugee-led businesses

    In the face of such challenges, refugee energy entrepreneurs are expanding the range of energy services and products available to refugee communities in terms of sustainability: providing new solar solutions and electricity connections from solar-powered energy sources. For members of the refugee community who use this service, this can reduce the cost of energy.

    These refugee-led enterprises often start after refugees have saved or borrowed money from friends and family to start their energy businesses – for example, by buying a solar panel and battery and charging customers to use the electricity it generates. Sometimes referred to as micro-enterprises or energy entrepreneurs, they go beyond being passive users of electricity and become active participants in the energy economies of refugee camps.

    Examples of such businesses include Kakuma Ventures, based in Kakuma refugee camp in Kenya, which provides wifi and solar energy access to more than 1,500 people in the camps.

    A grid pylon next to refugee homes at Kigeme refugee camp, Rwanda.
    Sarah Rosenberg-Jansen, CC BY-NC-ND

    Another example is Patapia, based in camps in Uganda, which helps refugee women launch and grow businesses powered by clean energy. Successful refugee-led energy businesses are highlighted by the work of climate change charity Ashden through its Humanitarian Energy Award, and its support for local businesses leading the way on sustainable energy in humanitarian settings.

    Indeed, many new global initiatives and humanitarian programmes are starting to take seriously the role of refugee-led organisations and businesses. Take the work of Last Mile Climate, which is dedicated to helping grassroots initiatives, refugee-led businesses, charities, humanitarian agencies and government organisations tackle climate-related challenges.

    Refugees are also writing on this issue in the media, highlighting how important the issue of inclusivity is in delivering the sustainable energy transition in humanitarian contexts.


    Don’t have time to read about climate change as much as you’d like?

    Get a weekly roundup in your inbox instead. Every Wednesday, The Conversation’s environment editor writes Imagine, a short email that goes a little deeper into just one climate issue. Join the 40,000+ readers who’ve subscribed so far.


    Sarah Rosenberg-Jansen received funding from the Independent Social Research Foundation (ISRF)

    ref. How refugee entrepreneurs are supplying sustainable energy to the camps they live in – https://theconversation.com/how-refugee-entrepreneurs-are-supplying-sustainable-energy-to-the-camps-they-live-in-242862

    MIL OSI – Global Reports

  • MIL-OSI Security: Fifty-Two-Month Prison Sentence for a D.C. Convicted Felon Who Traveled to the Jersey Shore to Rob an Overnight Pharmacy

    Source: Federal Bureau of Investigation (FBI) State Crime News

               WASHINGTON – Ashawntea Henderson, 32, of Washington, D.C., was sentenced today in U.S. District Court in Washington D.C. to 52 months in federal prison for participating in an early morning robbery of a drug store at the Jersey Shore. During the May 2020 robbery, he and his co-conspirators jumped the counter, overpowered the night pharmacist, stole thousands of prescription narcotics, and then – as they attempted to flee to the District – crashed into a responding police cruiser.

               The sentencing was announced U.S. Attorney Edward R. Martin, FBI Special Agent in Charge Sean Ryan of the Washington Field Office Criminal and Cyber Division, and FBI Special Agent in Charge Terence Reilly of the Newark Field Office.

                Henderson pleaded guilty on October 30, 2024, to interference of commerce by robbery (Hobbs Act robbery). In addition to the 52-month prison sentence, Judge Amy Berman Jackson ordered Henderson to serve three years of supervised release.

    According to court documents, Henderson and his co-conspirators researched potential targets including Walgreens and CVS pharmacies which were open all night. On May 9, 2020, Henderson and others drove more than 200 miles from Washington, D.C. to a Walgreens Pharmacy on State Road 33, in Neptune, New Jersey.

    At 3:09 a.m., Henderson and two others dressed in masks and gloves entered the Walgreens. All three jumped over the pharmacy counter and demanded codeine, Adderall, and Percocet. One of the co-conspirators grabbed the night pharmacist, demanded that he open the locked cabinets containing additional pills, and forced the pharmacist to assist them. After grabbing thousands of prescription medicines – including Oxycodone, morphine, amphetamine, and Nucynta – Henderson and the two co-conspirators fled in a black Nissan Altima operated by a fourth co-conspirator. At one point, the Nissan collided with a responding police officer’s patrol car but continued at high speed back to Washington D.C.

    After returning to the District, as they celebrated at a hotel, one of the co-conspirators received a text from a known drug distributor asking the price for a drug of the same type stolen from Neptune, New Jersey. The co-conspirator and the drug distributor continued to exchange texts about the sale of drugs for the following weeks.

               Henderson is currently serving a five-year prison sentence in Maryland in connection with his 2022 possession of a firearm. 

               The case was investigated by the FBI Washington Field Office’s Violent Crimes Task Force and the Neptune Township Police Department. The matter is being prosecuted by AUSAs Justin Song, Sarah Martin and Cameron Tepfer.

    23cr190

    MIL Security OSI

  • MIL-OSI United Nations: ‘Fragile stability’ in Libya increasingly at risk, Security Council hears

    Source: United Nations 2

    Peace and Security

    The dream of a civil, democratic and prosperous Libya remains unfulfilled 14 years after the revolution that led to the overthrow of the Gaddafi regime, the head of UN Political and Peacebuilding Affairs told the Security Council on Wednesday. 

    Rosemary DiCarlo said entrenched divisions, economic mismanagement, continued human rights violations, and competing domestic and external interests, continue to erode unity and stability in the country.

    “The fragile stability in Libya is increasingly at risk,” she warned. “The country’s leaders and security actors are failing to put the national interest ahead of their competition for political and personal gain.”

    Support new UN envoy

    She urged Council members to support the newly appointed UN Special Representative for Libya Hanna Tetteh “in her work to help break the political impasse, resolve Libya’s protracted crisis and support the Libyan people towards unifying Libya’s institutions and holding inclusive national elections.”

    The North African country has been split between two rival administrations for over a decade, with the internationally recognized Government of National Unity (GNU) based in the northwest while the Government of National Stability (GNS) is in the east.

    Landmark elections scheduled for December 2021 were cancelled, including due to disputes over the eligibility of candidates.

    Advisory Committee established

    Ms. DiCarlo stressed the urgent need for progress in Libya. She said the UN Mission there, UNSMIL, is taking steps to revive a political process anchored in the principles of inclusivity and national ownership.

    UNSMIL recently established an Advisory Committee that will provide recommendations for resolving outstanding contentious issues that have prevented national elections from taking place.

    The Committee is composed of 20 members who include legal and constitutional experts. More than a third are women. She emphasized that it is not a decision-making body, but its proposals will support efforts to remove obstacles to holding national elections.

    Many Libyan stakeholders, including political parties, social movements, and women and youth groups, have publicly welcomed its establishment as an opportunity to move the political process forward,” she said.

    Supporting inclusive dialogue

    UNSMIL convened the Committee’s inaugural meeting in the capital, Tripoli, last week. Members are meeting again over three days this week to examine the contentious issues in detail and begin considering ways to overcome them.

    “In parallel, UNSMIL is also taking steps to convene a structured dialogue among Libyans on ways to address longstanding drivers of conflict and develop an inclusive, bottom-up vision for their country’s future,” she said.

    The Mission is also facilitating consultations among Libyan economic experts to identify priorities, barriers and solutions to achieve sound economic governance.  

    Divisions and competition

    Ms. DiCarlo said divisions and competition over the control of State institutions continue to dominate the political and economic landscape. No progress has been made on a unified budget or agreed spending framework despite UNSMIL engagement with all relevant stakeholders.

    “It is critical to address the issue to support the efforts of the Central Bank of Libya to stabilize the financial situation of the country and enable transparent and equitable public spending,” she explained.

    A dispute over the position of president of the High Council of State, a top governing body, also remains unresolved even after six months of litigation and contradictory rulings. The Council now stands “deeply divided and unable to fulfil its institutional role.” 

    UNSMIL

    People gather at a market in Tripoli, the capital of Libya. (file)

    National reconciliation at risk

    Politicization and political divisions are also hindering progress on national reconciliation, she added. 

    Last December, UNSMIL facilitated an agreement among three key institutions – the Presidential Council, the House of Representatives, and the High Council of State – on a draft law on the issue. 

    However, subsequent amendments to the draft law by parliamentarians have raised concerns over the independence of a National Reconciliation Commission.

    A charter for reconciliation was agreed earlier this month through a process led by the African Union.  It was adopted on 14 February in the margins of the bloc’s summit in Addis Ababa, Ethiopia.

    “While some Libyan stakeholders have supported the charter, others did not,” she said, noting that UNSMIL continues to engage with all relevant parties.

    Security threats persist

    Meanwhile, the activities of non-State and quasi-State armed groups continue to pose a threat to Libya’s fragile stability. 

    Ms. DiCarlo called for a full and transparent investigation into an armed attack on a Government of National Unity (GNU) Minister in Tripoli on 12 February.

    She said the Libyan National Army took control of a military base in the south previously held by a GNU-affiliated military officer. Furthermore, the 2020 Ceasefire Agreement has only been partially implemented. 

    “Renewed efforts by Libyan authorities to implement its remaining provisions are crucial to improve the fragile security situation and to create conditions for the reunification and reform of security institutions,” she said. 

    Migrants and mass graves

    Turning to other challenges, she said the continuing trend of arbitrary arrests and enforced disappearances is deeply concerning and the increasing number of deaths in custody is troubling, with 15 cases recorded since March 2024. 

    Migrants and asylum-seekers, including children, also continue to face serious human rights violations including torture and cruel and inhumane treatment. 

    The alarming and tragic discovery of mass graves following raids on human trafficking sites highlights the severe danger faced by migrants in Libya,” she said.

    On 7 February a mass grave was discovered on a farm in Jikharra in the northeast; another was found a day later in Al-Kufra in the southeast. To date, 93 bodies have been exhumed.

    “A full and independent investigation is critical to bring the perpetrators to justice. “This is yet another reminder of the urgent need to protect migrants and combat human trafficking,” she said.

    Last December, a joint UNSMIL and UN mission to Al-Kufra engaged with local authorities, partners, refugees and host communities to strengthen humanitarian response for Sudanese refugees, who continue to flee to Libya.

    Ms. DiCarlo said the chapter of the 2025 Sudan Refugee Regional Response Plan relating to Libya targets 446,000 people and requires $106 million – double the support from 2024. 

    She appealed to donors for their continued support to address the growing needs of Sudanese refugees in Libya and across the region. 

    MIL OSI United Nations News

  • MIL-OSI USA: Senator Murray Presses VA Deputy Secretary Nominee on Mass Firings of VA Researchers, Holding Oracle Accountable to Get EHR Right for Veterans

    US Senate News:

    Source: United States Senator for Washington State Patty Murray
    ICYMI: Senator Murray: Trump Must Reverse Firing of VA Researchers Across the Country, Threatens to Decimate Lifesaving Work on Veterans’ Medical Care, Prosthetics, and More
    ICYMI: Murray, Colleagues Request Information on Elon Musk’s Access to VA Medical Records
    ***VIDEO of Murray’s Q&A at nomination hearing HERE**
    Washington, D.C. – Today at a Senate Veterans’ Affairs Committee hearing on Dr. Paul Lawrence’s nomination to be Deputy Secretary of the U.S. Department of Veterans Affairs (VA), U.S. Senator Patty Murray (D-WA), a senior member and former Chair of the Senate Veterans’ Affairs Committee, questioned Dr. Lawrence—who will oversee the Electronic Health Record (EHR) system—on what he will do differently to hold Oracle accountable and get the EHR system right for veterans in Washington state. Murray also pressed him on whether he supports the decision by Trump and Musk last week to fire en masse VA researchers in the middle of research on everything from burn pit exposure to mental health, opioid addiction, and preventing veteran suicide, among much else.
    “EHR started in 2018 under President Trump and in 2020, it deployed to two Washington state VA hospitals. Instead of helping to improve our veterans’ health care, the rollout ending up being a complete disaster, and it endangered veteran patients,” Murray said at today’s hearing. “Unfortunately, the system still is not working the way that the VA doctors and nurses need—and veterans are continuing  to suffer. Last month, the VA announced that it would be moving forward with pre-deployment activities at the next four sites for this Electronic Health Record.”
    “You will oversee the EHR program—so if confirmed, I want to know what you are going to do differently to hold Oracle accountable and to make sure we get this system right for our veterans?”
    Dr. Lawrence replied that he would aim to better understand why VA did not listen to employees earlier when they raised issued with the EHR system, and that he would work with the team Secretary Collins plans to convene with “everybody involved” to figure out the best path going forward for EHR. “If confirmed, I want to work on that and figure out what the plan should be in terms of holding everybody accountable for what’s supposed to take place, right, to get the most benefits as quickly as possible to our veterans within the amount of money we have,” Dr. Lawrence said.
    “Well let me make this very clear: we have heard that answer from every VA person that’s come before this committee for a number of years now,” Murray pushed back. “Everybody’s looked at it, everybody’s considered it, everybody’s talked about it, everybody’s convened panels. It is not working. So, I need your commitment that it’s not just—convene people and take a look at, but that you are going to make changes to it and demand changes, and get those fixed. Because we have spent, literally, millions and millions of dollars—and worse, veterans are still in jeopardy in their care, and doctors and nurses and VA facilities are really frustrated.”
    “I asked you a really important question: what are you going to do differently? The answer you gave me—I understand where you’re coming from—but it is the same one I’ve heard over and over,” Murray said.
    Dr. Lawrence responded that the Secretary conveyed a “strong sense of urgency that it should be done much sooner than later,” and that, in his previous tenure at VA as Under Secretary for Benefits, he dealt with technology problems around the GI Bill, appeals modernization, and other issues, and implemented technology: “I’ve actually done this, and so that’s the difference I will bring to this. And I understand the frustration, and I pledge to work as best, as hard as I can to get this done,” said Dr. Lawrence.
    “Well I don’t want to be sitting here again, two years from now, same conversation, new person,” Murray said.
    Murray continued her questioning by pressing Dr. Lawrence on Trump and Elon Musk’s unprecedented firings of VA researchers—last week the administration abruptly refused to honor researchers’ three-year “Not to Exceed” term limits (NTEs) by rolling them over as is standard. Instead, the Trump administration immediately dismissing researchers, including at VA Puget Sound, who were in the middle of research on topics including mental health, alcohol and opioid withdrawal, cancer treatments, burn pit exposure, prosthetics, diabetic ulcers, and so much else.
    “Last week, my office’s phones were ringing off the hook—as I assume a lot of people’s were—with really panicked calls from researchers at the VA. They had been laid off with ZERO justification, ZERO warning,” Murray said.
    “And in fact, up until then, the VA had assured them that they were protected from Trump and Musk’s mass firings. VA research shouldn’t be political. And firing VA researchers who are in the middle of a process to find life-saving treatment for veterans with conditions like PTSD, or opioid addiction, or cancer from toxic exposure is really cruel and wasteful. Some veterans are literally in the middle of receiving breakthrough treatment through these clinical trials. What will happen to them and their care when their lead researcher was just fired?”
    “Were you aware of the Trump Administration’s decision to fire these VA researchers?,” Murray asked.Dr. Lawrence responded that he was “not engaged” in anything at the Department now.
    “Do you support it?,” Murray pressed.Dr. Lawrence replied: “If confirmed, I will look into this to better understand what took place—I don’t have enough information to comment on that.”
    “So you won’t commit to restoring these VA researchers’ positions so they can continue that research on PTSD, and opioid addiction, and cancer that was caused by their exposure to toxic chemicals?” Murray pressed again.
    “If confirmed, I commit to looking in to understand what happened and why,” said Dr. Lawrence. “Well, I hope that’s not like every other answer we get from people that we are hearing from that they’ll look into it and no action is taken—you’ve just promised to look into it; this is critical,” said Senator Murray.
    “I understand,” said Dr. Lawrence.
    Senator Murray was the first woman to join the Senate Veterans’ Affairs Committee and the first woman to chair the Committee—as the daughter of a World War II veteran, supporting veterans and their families has always been an important priority for her. Senator Murray has fought throughout her career for increased benefits for veterans, housing assistance, better access to veterans’ clinics throughout Washington state, and more accountability from the VA.
    Senator Murray has spoken out forcefully against President Trump and Elon Musk’s mass firing of VA employees across the country. Just yesterday, Murray and her colleagues sent a letter to VA Secretary Doug Collins pressing him to protect veterans, their families, and VA staff from unprecedented access to sensitive information by Elon Musk and his “Department of Government Efficiency” (DOGE). Earlier this month, Senator Murray sounded the alarm over reports of DOGE at the VA and voted against Doug Collins’s nomination to be VA Secretary, making clear that the Trump administration’s lawlessness was putting our national security and our veterans at risk. Alongside 25 of her colleagues, Murray sent another letter earlier this month to Secretary Collins, demanding that he deny and sever Musk and DOGE’s access to any VA or other government system with information about veterans, and to delete any veterans’ information in their possession.
    Senator Murray has been conducting oversight on the flawed EHR rollout in Washington state since the Trump Administration first negotiated the contract with Cerner (later acquired by Oracle), and at every point in the process since then. Murray has consistently pushed VA on its failed implementation of EHR—conducting oversight, holding the administration accountable, and calling on VA to halt deployment of EHR until they get it right in Washington state. In March 2023, Murray introduced comprehensive legislation that would require VA to implement a series of EHR reforms to better serve veterans, medical personnel, and taxpayers. In the Fiscal Year 2024 funding bills, Senator Murray negotiated and passed as Chair of the Appropriations Committee stronger language to hold VA and Cerner accountable for the rollout of the EHR system, and in May 2024, she sent a letter urging VA to consider feedback on the system from providers and veterans in Spokane and Walla Walla and reiterating that VA must not move forward on the rollout of EHR until the myriad issues that have plagued the system in the locations where it has been launched are fixed.

    MIL OSI USA News

  • MIL-OSI Security: Winter Park Man Pleads Guilty To Possessing A Firearm As A Convicted Felon

    Source: Office of United States Attorneys

    Orlando, Florida – Acting United States Attorney Sara C. Sweeney announces that Bailey Joseph Friese (23, Winter Park) has pleaded guilty to possession of a firearm by a convicted felon. Friese faces a maximum penalty of 15 years in federal prison. Friese has also agreed to forfeit the Glock firearm involved in the offense. A sentencing date has not yet been set. 

    According to the plea agreement, Friese sold a Glock firearm in December 2023. At the time Friese sold the firearm, he had a previous felony conviction for burglary. As a previously convicted felon, he is prohibited from possessing firearms or ammunition under federal law.

    This case was investigated by the Bureau of Alcohol, Tobacco, Firearms and Explosives and the Seminole County City County Investigative Bureau. It is being prosecuted by Assistant United States Attorney Richard Varadan.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    MIL Security OSI