Category: Transport

  • MIL-OSI: Presentation Reveals Details on Potential Starlink “Super-IPO” Announcement Predicted August 13

    Source: GlobeNewswire (MIL-OSI)

    Baltimore, MD, July 31, 2025 (GLOBE NEWSWIRE) — A released presentation suggests Elon Musk’s Starlink could be preparing for what some are calling a “Super-IPO” with an announcement expected as soon as August 13, 2025.

    In the presentation, tech entrepreneur James Altucher outlines what he describes as “a trillion-dollar technological revolution” that he believes “could have a far bigger impact on the world than any other technology [Elon Musk] has created before.”

    Three “Smoking Guns” Point to A Potential Announcement

    According to the presentation, Altucher highlights three pieces of evidence that Starlink is preparing for a public announcement:

    • Elon Musk Statement:
      In a previous public comment, Musk confirmed plans to take Starlink public when its cash flow became predictable. Altucher notes that the company has “officially crossed that milestone”
    • Financial Motivation:
      “What Musk really needs is another publicly traded company that would allow him to unlock some of his wealth and take the pressure off Tesla,” the presentation states, citing Barron’s coverage
    • Corporate Spinoff:
      Bloomberg reported that “SpaceX is discussing an initial public offering for its fast-growing Starlink satellite business as soon as late 2024… in a bid to capitalize on robust demand for communications via space”

    Altucher argues these moves combined with “a major industry conference scheduled for August 13, 2025” make the date a likely venue for what he calls a “historic announcement”

    The Technology Behind the Headlines

    The presentation describes Starlink as a radical reinvention of internet access, delivering “fast, reliable, unlimited internet through the air… directly to your device.” .Altucher claims the technology “could cripple the trillion-dollar telecom industry over time” while connecting “billions of previously un-connected people” to the web.

    Why This Matters

    “Fifty years from now, people may remember it as one of the greatest innovations of the 21st century,” Altucher says in the presentation. “An innovation which could be bigger than Tesla or anything else Elon has done before.”

    About James Altucher

    James Altucher is a tech entrepreneur, venture capitalist, and Wall Street Journal bestselling author. He has been recognized as “one of the best venture capitalists, angel investors, and tech entrepreneurs in the world.” Altucher has built a career spotting transformative technology trends early and has been featured in publications such as CNBC. He is the founder of Altucher’s Investment Network and host of The James Altucher Show podcast, which has been downloaded more than 40 million times.

    The MIL Network

  • MIL-OSI USA: Sherrill Statement on the Widespread Famine in Gaza and the Deepening Humanitarian Crisis

    Source: United States House of Representatives – Congresswoman Mikie Sherrill (NJ-11)

    Washington, D.C. — Representative Mikie Sherrill (NJ-11) today issued the following statement urging President Trump and the Israeli government to take immediate action to ensure that aid reaches innocent civilians in Gaza:

    “I am deeply concerned by the famine and perilous security situation in Gaza. In February 2024, I went to the Rafah Crossing in Egypt and saw the backlog of aid trucks being kept out of Gaza. I took my concerns about keeping aid from reaching civilians directly to Prime Minister Netanyahu and President Biden. Restricting life saving aid from reaching civilians was as dangerous then as it is today. Failure to take immediate action now will lead to the deaths of thousands of innocent civilians, including women and children, and the perpetuation of the war. 

    “I was encouraged to see the announcement earlier this week that increased humanitarian aid would be allowed to enter Gaza, but it is not enough. The previous system of distributing aid through the Gaza Humanitarian Foundation was ineffective and directly led to the deaths of civilians at aid sites within days of beginning the operation. It needlessly endangered civilian lives. I immediately called on President Trump to work with the Israeli government and humanitarian organizations operating in Gaza to develop a safer method of delivery aid, but no action was taken. 

    “It is unacceptable that Hamas walked away from the last round of ceasefire negotiations and rejected the proposal agreed to by Israel, the U.S., Egypt, and Qatar. I again urge both parties to return to the negotiating table immediately to reach a ceasefire and bring the hostages home. But that alone will not lead to the end of this conflict. For that to happen, the human suffering must end.

    “It is past time that President Trump stands up for American values and works with the Israeli government to ensure that aid reaches the innocent civilians who desperately need it. Limiting the delivery of aid has only allowed Hamas and criminal gangs to exploit the situation. Ending the humanitarian crisis in Gaza is vital to maintaining America’s values, weakening Hamas’s support, and permanently ending the conflict.”

    ###

    MIL OSI USA News

  • MIL-OSI USA: IAM District 4 Wins Voluntary Recognition for Maryland Veterans Home Nurses

    Source: US GOIAM Union

    In a significant development for healthcare workers at Charlotte Hall Veterans Home in Maryland, PruittHealth, the management company that runs the Home, has voluntarily recognized IAM District 4 as the official bargaining representative for approximately 80 Registered Nurses (RNs) and Licensed Practical Nurses (LPNs) employed at the facility.

    The decision came on July 9, 2025, just days before a union election was scheduled to take place. 

    IAM District 4 Organizer Kevin Gallegher had been in the process of bringing the group to a vote before IAM Eastern Territory International Representative Andrew Hounshell and the company’s legal counsel cordially agreed that PruittHealth would forgo a union election process. The company would instead voluntarily recognize IAM Union representation of the nurses based on a majority showing of support for the union through signed authorization cards.

    The bargaining unit includes all full-time and regular part-time RNs and LPNs at the veterans home, excluding managerial and certain supervisory roles. 

    IAM District 4 already represents multiple groups of workers at Charlotte Hall Veterans Home, including non-professional and service-related staff. Initial IAM representation at the facility started with maintenance staff, but the successful relationship between IAM Union and Charlotte Hall Veterans Home allowed for the IAM’s representation to grow to cover the entire facility’s non-managerial employees.

    “I’m very excited to see my home shop become completely unionized,” said IAM District 4 Business Representative Bonna McCarthy, who previously won voluntary recognition of drivers and the laundry and housekeeping staff with the company. “I’ve always believed we’re stronger together than divided like we have been for the past eight years. I look forward to preparing for negotiations and getting a fair contract so that the nurses’ voices can be heard.”

    Because of its strong presence at Charlotte Hall and its commitment to uplifting and supporting veterans, the IAM Union has put significant effort into bettering the veterans home to benefit all: In 2022, the IAM installed a new entry sign at the home after completely renovating and upgrading the communal courtyard space, all made possible with funds raised by the 2021 IAM International President’s Capital Classic Golf Tournament

    Additionally, IAM Veterans Services conducted collections of household and comfort items at IAM headquarters for Charlotte Hall veterans during the holiday season, and the IAM’s Winpisinger Center staff, which includes Local 4 members, host veterans from the home for lunch multiple times a year.

    “The recognition demonstrates a cooperative approach by PruittHealth to respect workers’ choices and avoid prolonged labor disputes,” said IAM District 4 Directing Business Representative Jay Wadleigh. “We’re proud to represent the staff at Charlotte Hall Veterans Home. We’re proud of the work they do, and we’re proud of the mutually beneficial relationship we have with management that ultimately leads to happy staff and well-cared-for veterans.”

    IAM District 4 now looks forward to entering negotiations with McCarthy at the helm to secure a first contract that reflects the needs and priorities of these dedicated nurses and new union members.

    “IAM District 4 is a strong force for good in Southern Maryland,” said IAM Eastern Territory General Vice President David Sullivan. “Their solidarity and union pride is strong, and we are pleased to welcome the rest of Charlotte Hall Veterans Home staff into our union. These are caregivers of our veterans, and we intend to make all of their lives better through the IAM.”

    The post IAM District 4 Wins Voluntary Recognition for Maryland Veterans Home Nurses appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI Security: Illicit firearms: Operation Trigger IX nets 14,260 arrests across Latin America

    Source: Interpol (news and events)

    18 April 2023

    Drugs worth USD 5.7 billion also seized in INTERPOL-led operation targeting key trafficking routes and organized crime groups

    LYON, France – In the biggest firearms operation ever coordinated by INTERPOL, authorities in Central and South America have made 14,260 arrests and seized some 8,263 illicit firearms, as well as 305,000 rounds of ammunition.

    With illicit firearms used by criminals to commit armed robberies and murder, they are also closely associated with the proliferation of a wide range of other crimes using the same trafficking routes.

    The links between illicit firearms and drug manufacturing and trafficking were thrown into sharp relief, with the seizure of 203 tonnes of cocaine and other drugs together worth some USD 5.7 billion, and 372 tonnes of drug precursors during Operation Trigger IX (12 March – 2 April).

    Law enforcement across INTERPOL’s 195 member countries have reported record drug seizures in the past year and, in many cases, a spike in drug-related violence, fueled by the traffic of illegal firearms.

    The operation, which saw an unprecedented level of cooperation across 15 countries, also identified a range of other crimes such as corruption, fraud, human trafficking, environmental crime and terrorist activities.

    Colombian authorities arrested the subject of an INTERPOL Red Notice

    Arrests in Honduras – Operation Trigger IX

    Firearms are closely associated with the proliferation of a wide range of other crimes.

    Border checks – Operation Trigger IX

    Operational hub – Operation Trigger IX

    Marine patrols – Operation Trigger IX

    Operation Trigger IX led to the disruption of 20 organized criminal groups

    Drug seizure – El Salvador

    A woman attempting to smuggle pistols and chargers between Paraguay and Brazil.

    Seizure by Chile – Operation Trigger IX

    Vehicle checks – Operation Trigger IX

    Uruguay saw its largest-ever seizure of ammunition.

    Operational highlights

    INTERPOL gathered firearms experts from participating countries at an operational hub in Foz do Iguaçu in the tri-border area of Argentina, Brazil, and Paraguay, to support frontline actions and ensure the swift exchange and cross-checking of intelligence.

    On the ground, coordinated actions led to the disruption of 20 organized criminal groups, including the arrest of members of Primeiro Comando da Capital, Mara Salvatrucha and the Balkans Cartel, all involved in firearms trafficking.

    In Uruguay, 100,000 pieces of ammunition trafficked internationally by two European nationals were seized by authorities, marking the country’s largest-ever such seizure.

    Authorities in Brazil and Paraguay shut down several firearms dealerships following the identification of irregular transfers and unlicensed sales.

    Other operational results include:

    • 11 victims were rescued in Paraguay, when authorities dismantled a human trafficking ring.
    • In cooperation with Venezuela, police in Colombia arrested a Venezuelan national subject to an INTERPOL Red Notice for terrorism and arms trafficking.
    • A 32 year old woman was arrested at the land border between Paraguay and Brazil with eight pistols and 16 chargers taped to her body.

    Looking ahead, some 30 investigations were opened as a result of actions on the ground, and authorities identified 15 new modus operandi for the illicit manufacturing, trafficking and concealment of firearms, with INTERPOL’s Purple Notice leveraged to help alert member countries.

    Officers perform real-time checks against INTERPOL’s databases during Operation Trigger IX.

    Operational hub – Brazil

    Border checks between Argentina and Brazil

    Seizure by Honduras – Operation Trigger IX

    Police checks by Argentina – Operation Trigger IX

    Authorities shut down several firearms dealerships in Brazil and Paraguay

    Authorities had immediate access to the INTERPOL Ballistic Information Network

    Arrest in Paraguay – Operation Trigger IX

    El Salvador firearms dealership checks – El Salvador

    INTERPOL’s global reach

    “The fact that an operation targeting illicit firearms resulted in such massive drugs seizures is further proof, if needed, that these crimes are intertwined,” said INTERPOL Secretary General Jürgen Stock.

    “The results, coming just weeks after our Americas Regional Conference was highlighting the need for greater information sharing on these linked organized crime activities, also demonstrate the unique value of INTERPOL in supporting efforts in the field.  

    “The organized crime networks behind all of these illicit activities have only one priority, which is profit. We, as law enforcement, must be equally determined to dismantle them across every region and globally,” concluded Secretary General Stock.

    Valdecy Urquiza, INTERPOL’s Vice-President for the Americas, highlighted the value of joint initiatives such as Trigger IX in prioritizing national and regional efforts against illicit flows. “Intelligence-led investigations and operations enable police to cooperate internationally and remove illicit firearms from circulation to protect the public,” said Mr Urquiza.

    INTERPOL global tools used by investigators during the operation include the Illicit Arms Records and Tracing Management System (iARMS), the only global database of illicit firearms, including stolen, lost and trafficked/smuggled firearms.

    Authorities also had immediate access to the INTERPOL Ballistic Information Network (IBIN), enabling law enforcement officials to compare images of ballistic fingerprints from fired casings and projectiles to establish links between crimes worldwide.

    Tracing the history and ownership of recovered firearms provides crucial investigative leads. Every firearm is unique and can be identified by its serial number, make, model and calibre as well as by its ballistic ‘fingerprint’. Comparing ballistics evidence of recovered cartridge casings and ammunition is therefore crucial to investigations.

    During the operation, INTERPOL’s Firearms Programme was supported by INTERPOL’s Regional Bureaus in Argentina and El Salvador, its Drugs and Fugitives units, and its Command and Coordination Centre.

    More than 100 national law enforcement agencies were involved in the operation, including the collaboration of US Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) and Homeland Security Investigations (HSI), which supported participating countries.

    Participating countries: Argentina, Bolivia, Brazil, Chile, Colombia, Costa Rica, Ecuador, El Salvador, Guatemala, Honduras, Mexico, Panama, Paraguay, Peru, Uruguay.

    Operation Trigger IX was funded by the European Union and carried out under the framework of Project Disrupt.

    MIL Security OSI

  • MIL-OSI Security: Greater strategic alignment key to facing Europe’s crime threats

    Source: Interpol (news and events)

    Police leaders throughout the region look to strengthen cooperation against terrorism, illicit trafficking and other crimes

    OHRID, North Macedonia – Three days of discussions between senior police officers from 53 countries in Europe and the wider INTERPOL membership have led to a call for greater coordination to effectively combat the region’s most pressing security threats.

    INTERPOL’s 50th European Regional Conference saw delegates adopt recommendations to more closely align international efforts in a range of strategic areas, including counterterrorism, illicit trafficking and the sharing of police data.

    The meeting took place as Europe faces a historic peak in the production of illegal narcotics, which has strengthened organized crime groups and led to an accompanying rise in violent crime across the region.

    “The globalized nature of crime means that our respective borders are only as strong as our weakest links,” said Stephen Kavanagh, INTERPOL Executive Director of Police Services.

    “The data contributed to INTERPOL is a contribution not just to national or regional security, but to global security,” Mr Kavanagh added.

    No alternative

    A panel featuring leaders from European Union law enforcement bodies Europol and Frontex focused on the need for greater alignment between INTERPOL and regional policing bodies, to build a global model for a police data-sharing architecture and ensure Global Policing Goals are aligned with the United Nations Sustainable Development Goals.

    “The most important part of international police cooperation is information exchange,” said Peter De Buysscher, INTERPOL Vice President for Europe, who chaired the conference. “We need a global data-sharing framework. There is no alternative.”

    The volume of data in policing has increased dramatically in recent years, opening up new investigative opportunities but also posing data management challenges. At the international level, there is a crucial need to minimize duplication and increase alignment so that investigators or frontline officers have access to the right information when they need it.

    Joint initiatives such as FIELDS, which brings together capabilities from INTERPOL and Frontex into a unified system that helps border officials spot fraudulent travel and identity documents, was highlighted as a concrete example of successful alignment.

    What drug traffickers fear

    European police leaders also discussed the rapidly evolving state of play with regards to drug trafficking and the organized crime groups behind the illicit trade.

    The adaptability of networks was identified as a key challenge to enforcement, with groups often working across national and regional lines to secure ever-greater profits. To effectively combat such networks, police must be just as adaptive and even more collaborative.

    Recent successes in INTERPOL initiatives such as the I-CAN project targeting the ‘Ndrangheta mafia group, closely involved in bringing cocaine from Latin America into Europe, were highlighted as examples of innovative international police cooperation.

    Launched in 2020, I-CAN has already produced results that have “exceeded expectations”, according to  one conference speaker, with more than 40 high-profile arrests and tens of thousands of pieces of intelligence exchanged.

    “This is what drug traffickers fear,” said one closing speaker. “All of us in the same room, working together, exchanging information and breaking down walls.”

    MIL Security OSI

  • MIL-OSI Security: Europe: Drug trafficking, organized crime increasing by “an order of magnitude”

    Source: Interpol (news and events)

    8 May 2023

    At INTERPOL’s 50th European Regional Conference, delegates have gathered to discuss common crime threats from drug trafficking to cybercrime.

    OHRID, North Macedonia – Strengthening international police cooperation to counter the rapidly escalating threat posed by organized crime networks was the key focus of INTERPOL’s 50th European Regional Conference.

    The three-day (8-10 May) conference brings together more than 140 participants from 53 countries in Europe and beyond to discuss the most pressing crime issues facing the region.

    The conference takes place in Ohrid, North Macedonia, which itself marks 30 years as an INTERPOL member country this year.

    “These past 30 years, through our membership in the world’s largest police organization, have witnessed our commitment and willingness to be engaged in global police cooperation,” said Oliver Spasovski, Minister of Interior of the Republic of North Macedonia, in remarks during the conference’s opening ceremony.

    “With the establishment of the global INTERPOL I-24/7 communication system, our country was among the first to connect with this global police family, to exchange information between members and the General Secretariat, as well as directly access global criminal databases,” the Minister added.

    Unprecedented scale

    Fueled by historic levels of drug trafficking, organized crime groups are increasingly posing a direct threat to state authority in many countries, and there is evidence that levels of violence related to these criminal networks is also increasing.

    “Organized crime is a top concern,” said INTERPOL President Ahmed Naser al-Raisi in the conference’s opening ceremony. “These transnational crimes not only threaten the safety and security of the region, but also have a spillover effect on the rest of the world.”

    Last month, INTERPOL announced its largest ever firearms trafficking operations, which saw more than 14,000 suspects arrested across Central and South America, and an unprecedented USD 5.7 billion in illegal narcotics seized.

    “Over the last five years, [drug] trafficking and consumption have increased by an order of magnitude, with Europe one of the main transit and destination markets,” said INTERPOL Secretary General Jürgen Stock.

    “We continue to see record seizures at European borders and ports, and a corresponding rise in violent crime, corruption and money laundering of unprecedented scale,” added Secretary General Stock.

    The global scale of many organized crime networks, often spanning multiple continents, has underlined that international cooperation through INTERPOL is often the only means for police in Europe and other regions to bring fugitives to justice or gather crucial intelligence.

    European crime landscape

    Beyond drug trafficking, the results of INTERPOL’s 2022 Global Crime Trend report, which surveyed police across the Organization’s 195-country membership, show that money laundering and cyber or cyber-enabled crimes also top European law enforcement’s list of concerns.

    Money laundering ranked second among the crime trends most frequently indicated by member countries in the region as posing a ‘high’ or ‘very high’ threat, with financial fraud also ranking very high.

    The report notes that the use of online tools by criminals to perpetrate financial fraud schemes has also rapidly expanded in recent years, particularly since the COVID-19 pandemic.

    Especially concerning, 76 per cent of police respondents from Europe expect online child sexual exploitation and abuse to increase or increase significantly in the next three to five years.

    The report notes that the demand for livestreaming abuse has steadily increased in recent years, likely intensifying during the pandemic. While live distance child abuse most often take place in Southeast Asia, cases in the European Union have also recently been detected.

    Keeping Europe safe

    Founded in the heart of Europe – in Vienna – during the region’s interwar period 100 years ago, INTERPOL’s history is closely intertwined with that of Europe.

    Established in a 1920s context of geopolitical upheaval and concerns of rising international crime, the Organization’s founding representatives agreed that only through collaboration could police combat transnational crime threats – a common goal shared throughout periods of political or economic tension.

    Later, in one of the Organization’s darkest chapters, the Nazis assumed control of the International Criminal Police Commission – as INTERPOL was then called – after deposing its President. In 1946, Belgium spearheaded INTERPOL’s rebuilding in the new postwar era.

    Today, European member countries remain global leaders in their use of and contribution to INTERPOL capabilities – and this activity is quickly growing. With regards to INTERPOL databases, European member countries contribute more records, undertake more searches and – crucially – receive more hits than any other region.

    New historical peaks for records, searches and hits in INTERPOL databases from European member countries were reached in 2022. In the past year alone, searches of INTERPOL databases by European law enforcement have risen by nearly a third.

    The figures underscore the fundamental place INTERPOL capabilities occupy in European countries’ approaches to keeping their communities safe.

    MIL Security OSI

  • MIL-OSI Security: President Trump Ends Unfair “De Minimis” Tariff Exemption, A Major Victory in Securing the Homeland

    Source: US Department of Homeland Security

    President Trump’s Executive Order empowers DHS to continue cracking down on smuggling and unfair trade practices

    WASHINGTON – President Trump signed an Executive Order suspending duty-free de minimis tariff exemptions for low-value shipments from all countries. His order empowers Homeland Security Secretary Kristi Noem to close this loophole which was used to avoid tariffs and smuggle deadly synthetic opioids like fentanyl into the United States.

    “For decades, bad actors have taken advantage of America’s de minimis process by smuggling in deadly narcotics, harmful products, and other contraband in hidden products,” said Department of Homeland Security Assistant Secretary Tricia McLaughlin. “This loophole led to the death of thousands of Americans, fueled the opioid crisis, and harmed U.S. consumers. This decision to end de minimis will save American lives, increase revenue, and protect the American consumer and entrepreneur.”

    Under the de minimis treatment, imported goods that are valued at or under $800 were exempt from tariff duties. Countries exploited this system to flood the American market with cheap goods that undercut American manufacturers and cost American jobs. This exemption also allowed drug cartels and other criminal organizations to smuggle drugs and other contraband into our country.

    Over the past decade the volume of de minimis shipments to the United States exploded, growing from 134 million shipments in 2015 to over 1.36 billion shipments in 2024. De minimis shipments accounted for 90% of all cargo seizures in FY 24. These shipments often broke the law with 98% of narcotics seized from cargo falling under the de minimis exemption, as well as 97% of counterfeit items seized.

    Now, thanks to President Trump’s Executive Order, this loophole is closed. U.S. Customs and Border Protection is empowered to enforce tariffs on these goods and can continue to protect the homeland from the smuggling of deadly synthetic opioids like fentanyl and counterfeit goods. This will save American lives, protect American jobs, and restore billions in lost revenue.

    # # #

    MIL Security OSI

  • MIL-OSI: The Pink Salt Trick Recipe for Fast Weight Loss Trend in 2025: Why Trimology Is the Science-Backed Alternative

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, July 31, 2025 (GLOBE NEWSWIRE) —

    Pink Salt Trick Recipe Explained: Why It’s Trending for Weight Loss

    A viral wellness trend called the “Pink Salt Trick” has swept social media—particularly TikTok, Instagram, and wellness blogs. The hype: a morning ritual mixing Himalayan pink salt, water, lemon and honey claims to boost metabolism, reduce bloating, and even accelerate fat loss. But credible medical sources now label it a pseudoscientific fad with no proven weight‑loss benefits—and potential risks for high blood pressure sufferers.

    Enter Trimology, a science‑backed supplement brand positioned as a safer, evidence‑based alternative. Rather than quick fixes or social media stunts, Trimology takes its inspiration from a traditional Ugandan weight‑maintenance ritual: women consuming bitter green bananas rich in resistant starch (RS2), which naturally support gut microbiome health and metabolic resilience. Trimology translates that ritual into a modern capsule form by delivering concentrated RS2 plus supporting pre‑ and probiotics. 

    While the Pink Salt Trick rides on viral popularity, Trimology is introduced as a metabolic reset system—one that doesn’t promise overnight miracles, but rather aims for sustainable internal recalibration through gut‑brain‑fat signaling pathways. Want to Learn More About Trimology? Click Here

    Why Trimology Is the Safer, Science‑Backed Alternative

    Enter Trimology — a next‑generation, gut‑first weight‑loss supplement designed to offer credible, long‑term benefit rather than a viral illusion. Unlike the Pink Salt Trick, which hinges on vague mineral magic and untested methods, Trimology is rooted in microbiome science and targeted metabolic support.

    • Biological foundation: Trimology blends resistant starch (RS2), chicory inulin, and a signature probiotic triad (including Clostridium butyricum, Akkermansia muciniphila, Bifidobacterium infantis) to feed fat‑regulating gut bacteria and restore healthy metabolic signals.
    • Ancient inspiration: Derived from research into a traditional Ugandan practice—women consuming bitter green bananas rich in RS2 stayed lean well into older age—Trimology replicates the benefits in a clean capsule instead of a literal banana ritual.
    • Transparent formulation: Ingredients and microbial strains are fully disclosed, sourced at pharmaceutical quality, and backed by peer‑reviewed research—not buried in proprietary blends.
    • User‑friendly delivery: One capsule taken daily with breakfast. No meal‑timing restrictions, no yo‑yo dieting, no fasting requirements—just simple consistency. That ease of use appeals especially to women juggling busy schedules.
    • Safety and clarity: Trimology does not rely on caffeine, stimulants, hormone disruptors, or laxatives. It’s not sold as a cure, but a metabolic reset—respecting the body’s natural systems with traceable ingredients and no outrageous promises.

    While the Pink Salt Trick offers instant visual appeal and anecdotal enthusiasm, Trimology emphasizes measured improvement, restoring the gut‑brain‑fat axis, promoting satiety, and supporting energy through internal recalibration—not by shocking the system or inflating expectations. Unlock the Full Story Behind Trimology– Learn More Now

    Why the Internet Believed Deep‑Fake Celebrities Promoted the Pink Salt Trick

    The Pink Salt Trick’s rapid rise is strongly tied to deep‑fake endorsements and manipulated celebrity faces. Reports indicate that creators used AI‑generated clips mimicking well‑known public figures “trying” or “endorsing” the trend. Sensational headlines and algorithm‑driven reach amplified the illusion of legitimacy.

    The strategy tapped into users’ trust in celebrities, piggy‑backing on FOMO (fear of missing out) by suggesting these are insider weight‑loss secrets. Social platforms prioritized visually compelling before‑after testimonials and simplified recipes—despite medical experts warning the trend is unsupported or potentially unsafe.

    In essence, trust was manufactured—the product had no clinical trials, no published data—but looked persuasive because of faux celebrity endorsement and viral momentum. In contrast, Trimology emphasizes transparency, open ingredient sourcing, and no misleading influencer claims.

    Why the Pink Salt Trick Doesn’t Work — and Might Be Harmful

    At first glance, the Pink Salt Trick Recipe seems harmless. After all, pink Himalayan salt is often marketed as a “natural” source of minerals like magnesium, calcium, and potassium. But when used improperly—or in excess—it becomes not only ineffective, but potentially dangerous.

    Here’s why:

    • Too much sodium: One teaspoon of pink Himalayan salt contains about 2,300 mg of sodium—the maximum daily limit recommended by most health authorities. Those doing the trick multiple times a day (as some videos suggest) could be ingesting well over the safe threshold, increasing risk of high blood pressure, fluid retention, and cardiovascular strain.
    • No real metabolic effect: Despite its reputation, there is no clinical evidence that pink salt boosts metabolism, burns fat, or suppresses appetite in any meaningful way. The minor effects people feel—such as increased fullness or reduced cravings—are likely due to hydration or placebo, not salt-specific properties.
    • Dehydration and electrolyte imbalance: In some versions of the trick, users consume large quantities of saltwater without adjusting their hydration elsewhere. This can disrupt the body’s sodium-potassium balance, especially dangerous for people with kidney conditions, hypertension, or existing heart issues.
    • No support for gut health: While pink salt may contain trace minerals, it offers no prebiotic or probiotic benefit, meaning it does nothing to support the gut microbiome—which scientists now agree plays a crucial role in regulating metabolism, insulin sensitivity, and weight stability.
    • Not FDA-regulated: Most of the Pink Salt Trick kits sold online are unregulated and vary widely in quality. Some are sourced from poorly tested suppliers and may contain microplastics or industrial contaminants.

    In contrast, Trimology was developed to avoid all of these pitfalls. Its probiotic strains and resistant starches are carefully dosed for metabolic safety, backed by lab data, and formulated in cGMP-certified facilities. There’s no sodium loading, no electrolyte disruption, and no gimmicky biohacks.

    Trimology’s gut-first approach helps re-establish satiety signaling, healthy blood sugar control, and long-term fat regulation—all while nurturing the digestive ecosystem, not irritating it. Its gradual, cumulative effects are exactly what the body needs—not a one-time shock that confuses internal systems and creates dependency.

    Perhaps most importantly, Trimology doesn’t promise miracles. It encourages consistency, not urgency, which is critical in breaking the cycle of fad-based dieting that trends like the Pink Salt Trick perpetuate. Trimology provides a more intelligent, research-backed solution

    How Trimology Supports Weight Loss

    Trimology supports weight loss by targeting foundational metabolic pathways—not by temporary suppression or dehydration. Its key strategy: nourish beneficial gut bacteria with RS2 and inulin to optimize butyrate production. Butyrate enhances insulin sensitivity, reduces systemic inflammation, and reinforces the gut lining—helping the body regulate blood sugar and fat storage more effectively.

    The included probiotic strains further support natural hunger regulation: Akkermansia is linked with improved satiety hormone function and better insulin response; Clostridium butyricum promotes sustained butyrate output; and Bifidobacterium infantis may help stabilize mood, reduce food cravings, and normalize ghrelin/leptin balance.

    Users are advised to take a single capsule each morning with water or coffee—no complex fasting windows, no food tracking. Over time (usually 2–4 weeks), users report sharper energy, fewer cravings, less bloating, and gradual weight reduction—consistent with internal metabolic reset before visible change.

    Trimology positions weight loss not as an immediate outcome, but as a secondary benefit of restoring internal harmony and resilience—ideally paired with healthy eating and movement, but not dependent on them.

    Key Ingredients of Trimology

    Trimology’s formula stands on five core active components:

    • Pharmaceutical‐grade RS2 (resistant starch): sourced from green banana or potato starch; resists digestion until it reaches the colon, where specific bacteria ferment it, producing butyrate—a short-chain fatty acid central to metabolic regulation.
    • Chicory root (inulin): a soluble fiber and prebiotic that nourishes a diverse gut microbiome, amplifying butyrate production and improving digestion and glucose response.
    • Clostridium butyricum: a robust butyrate-producer that helps lower inflammation, stabilize gut environment, and support fat-burning pathways.
    • Akkermansia muciniphila: known to improve gut barrier integrity, increase satiety hormone responses, and enhance insulin sensitivity—like a natural appetite regulator.
    • Bifidobacterium infantis: associated with reduced cravings, hormone regulation, better digestion, and mood balance—all supportive of sustainable weight.

    These ingredients were chosen not for hype, but for measurable roles in reactivating the gut‑brain‑fat axis. Together, they form what Trimology refers to as the “Signal Reset Triad”—a synergy that supports calm inflammatory processes, improved satiety, and metabolic resilience.

     Visit Trimology Official Website To Know More About ……..

    What Makes Trimology Different From Other Weight Loss Supplements

    Trimology diverges from traditional fat burners or appetite suppressants in several key ways:

    1. No stimulants or synthetic hormones: unlike energizing fat‑burners loaded with caffeine or hormone‑mimicking compounds, Trimology works through microbiome support—not chemical triggers.
    2. Transparent labeling: ingredients are clearly identified, including specific probiotic strains and prebiotic sources. No proprietary blends or ambiguous fillers—each component was selected based on clinical research.
    3. Simplicity and compatibility: single capsule daily, compatible with most lifestyles and diet plans. No food tracking, no cycles, no loading phases. Reviewers consistently praise its integration ease and non‑aggressive positioning.
    4. Sustainable orientation: Trimology encourages long‑term use to rebuild metabolic signaling—not short bursts of weight loss that fade when the supplement ends.
    5. Gut‑focused rather than symptom focused: Rather than treating appetite or bloating as surface issues, Trimology treats them as symptoms of disrupted gut‑brain communication, aiming for root‑cause recalibration.

    Why Women Over 30 Are More Likely to Fall for These Weight Loss Trends

    Women over 30—especially in their late 30s and 40s—often encounter metabolic shifts as hormonal cycles evolve and gut microbiome diversity diminishes. Age-related declines in resistant starch intake, poorer insulin sensitivity, and changing satiety hormone patterns can make weight less responsive to diet and exercise alone.

    Traditional diet programs often backfire for this demographic, causing fatigue, rebound weight gain, or hormonal disruption. Many women report frustration after trying numerous programs with limited long-term results. This vulnerability makes them more susceptible to quick-fix trends like the Pink Salt Trick—offering false hope with minimal effort and social proof.

    Trimology acknowledges these real challenges. Unlike superficial hacks, it works by targeting age‑sensitive systems: gut‑brain communication, butyrate deficit recovery, and hormone stability. Its gentle, supportive approach aligns with women’s busy lives and biological realities: a daily capsule versus restrictive detoxes or influencer‑pushed gimmicks.

    By addressing the invisible drivers of metabolic slowdown—not just calories or fat—Trimology offers a credible alternative for those most affected by modern metabolic.

    Is This Product Backed by Science?

    Yes—while Trimology is a supplement, its formula is built on published scientific research into resistant starch, gut microbiota, and metabolic signaling.

    • RS2 has been shown in multiple studies to increase butyrate production, reduce inflammation, and support healthy glycemic response.
    • Akkermansia muciniphila has clinical data linking it to improved insulin sensitivity and satiety hormone levels.
    • Clostridium butyricum is documented for its resilience and butyrate‑producing capacity.
    • Bifidobacterium infantis has been associated with reduced appetite and improved digestion.

    Although Trimology capsules themselves haven’t undergone large‑scale clinical trials, each ingredient is supported by peer‑reviewed research. Independent reviewers and affiliate health blogs repeatedly cite these scientific underpinnings in endorsement articles.

    Furthermore, Trimology emphasizes ingredient sourcing transparency, avoids false claims or miracle marketing, and communicates realistic expectations—traits aligned with science‑based consumer trust.

    Where To Get Trimology?

    Trimology is available exclusively through its official website. This direct‑to‑consumer model helps ensure authenticity, clarity in pricing and subscription options, and avoids counterfeit distribution common in third‑party marketplaces.

    In contrast to viral “Pink Salt Trick” videos with undisclosed affiliate links, Trimology’s official site provides detailed ingredient listings, FAQ sections, customer support contacts, and opt‑out cancellation policies at no hidden fees.

    Users should purchase only via the official domain to avoid scams or unauthorized resellers. Many reviewers also recommend starting with the introductory offer (typically 30‑day supply) before committing to longer subscriptions.

    Final Thoughts: Why This Trend Matters More Than It Seems

    On the surface, the Pink Salt Trick appears harmless: a pinch of salt, a glass of water, maybe lemon and honey. But beneath the glossy viral veneer lies the risk of misinformation, procedural mimicry, and potential health issues for those with hypertension or kidney conditions.

    This trend exemplifies what happens when social media bypasses scientific validation—when AI‑generated celebrity testimonials and simplified ritual hacks displace rigorous evidence and expert guidance. It’s a warning sign: even well‑meaning health culture can propagate dangerous fads fast.

    Trimology represents the opposite trajectory. It doesn’t promise instant transformation but offers a model of sustainable metabolic realignment rooted in gut science, real‑food traditions, and transparent sourcing. It shifts the narrative from external fixes to internal recalibration.

    In a cultural moment flooded with wellness trends, the difference between viral popularity and scientific credibility matters. The Pink Salt Trick may vanish as its lack of efficacy becomes clearer; Trimology, by contrast, seeks longer‑term trust through measurable ingredients and consumer empowerment.

    For consumers—especially women over 30—it’s a reminder to prioritize evidence over endorsement, gut‑health over gimmicks, and sustainable support over superficial trend chasing.

    Media Contact:
    Brand website: https://trimologyweight.com/
    Project name: Trimology
    Email: support@trimologyweight.com
    Phone: +1 (302) 467-2939

    Attachment

    The MIL Network

  • MIL-OSI: The Pink Salt Trick Recipe for Fast Weight Loss Trend in 2025: Why Trimology Is the Science-Backed Alternative

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, July 31, 2025 (GLOBE NEWSWIRE) —

    Pink Salt Trick Recipe Explained: Why It’s Trending for Weight Loss

    A viral wellness trend called the “Pink Salt Trick” has swept social media—particularly TikTok, Instagram, and wellness blogs. The hype: a morning ritual mixing Himalayan pink salt, water, lemon and honey claims to boost metabolism, reduce bloating, and even accelerate fat loss. But credible medical sources now label it a pseudoscientific fad with no proven weight‑loss benefits—and potential risks for high blood pressure sufferers.

    Enter Trimology, a science‑backed supplement brand positioned as a safer, evidence‑based alternative. Rather than quick fixes or social media stunts, Trimology takes its inspiration from a traditional Ugandan weight‑maintenance ritual: women consuming bitter green bananas rich in resistant starch (RS2), which naturally support gut microbiome health and metabolic resilience. Trimology translates that ritual into a modern capsule form by delivering concentrated RS2 plus supporting pre‑ and probiotics. 

    While the Pink Salt Trick rides on viral popularity, Trimology is introduced as a metabolic reset system—one that doesn’t promise overnight miracles, but rather aims for sustainable internal recalibration through gut‑brain‑fat signaling pathways. Want to Learn More About Trimology? Click Here

    Why Trimology Is the Safer, Science‑Backed Alternative

    Enter Trimology — a next‑generation, gut‑first weight‑loss supplement designed to offer credible, long‑term benefit rather than a viral illusion. Unlike the Pink Salt Trick, which hinges on vague mineral magic and untested methods, Trimology is rooted in microbiome science and targeted metabolic support.

    • Biological foundation: Trimology blends resistant starch (RS2), chicory inulin, and a signature probiotic triad (including Clostridium butyricum, Akkermansia muciniphila, Bifidobacterium infantis) to feed fat‑regulating gut bacteria and restore healthy metabolic signals.
    • Ancient inspiration: Derived from research into a traditional Ugandan practice—women consuming bitter green bananas rich in RS2 stayed lean well into older age—Trimology replicates the benefits in a clean capsule instead of a literal banana ritual.
    • Transparent formulation: Ingredients and microbial strains are fully disclosed, sourced at pharmaceutical quality, and backed by peer‑reviewed research—not buried in proprietary blends.
    • User‑friendly delivery: One capsule taken daily with breakfast. No meal‑timing restrictions, no yo‑yo dieting, no fasting requirements—just simple consistency. That ease of use appeals especially to women juggling busy schedules.
    • Safety and clarity: Trimology does not rely on caffeine, stimulants, hormone disruptors, or laxatives. It’s not sold as a cure, but a metabolic reset—respecting the body’s natural systems with traceable ingredients and no outrageous promises.

    While the Pink Salt Trick offers instant visual appeal and anecdotal enthusiasm, Trimology emphasizes measured improvement, restoring the gut‑brain‑fat axis, promoting satiety, and supporting energy through internal recalibration—not by shocking the system or inflating expectations. Unlock the Full Story Behind Trimology– Learn More Now

    Why the Internet Believed Deep‑Fake Celebrities Promoted the Pink Salt Trick

    The Pink Salt Trick’s rapid rise is strongly tied to deep‑fake endorsements and manipulated celebrity faces. Reports indicate that creators used AI‑generated clips mimicking well‑known public figures “trying” or “endorsing” the trend. Sensational headlines and algorithm‑driven reach amplified the illusion of legitimacy.

    The strategy tapped into users’ trust in celebrities, piggy‑backing on FOMO (fear of missing out) by suggesting these are insider weight‑loss secrets. Social platforms prioritized visually compelling before‑after testimonials and simplified recipes—despite medical experts warning the trend is unsupported or potentially unsafe.

    In essence, trust was manufactured—the product had no clinical trials, no published data—but looked persuasive because of faux celebrity endorsement and viral momentum. In contrast, Trimology emphasizes transparency, open ingredient sourcing, and no misleading influencer claims.

    Why the Pink Salt Trick Doesn’t Work — and Might Be Harmful

    At first glance, the Pink Salt Trick Recipe seems harmless. After all, pink Himalayan salt is often marketed as a “natural” source of minerals like magnesium, calcium, and potassium. But when used improperly—or in excess—it becomes not only ineffective, but potentially dangerous.

    Here’s why:

    • Too much sodium: One teaspoon of pink Himalayan salt contains about 2,300 mg of sodium—the maximum daily limit recommended by most health authorities. Those doing the trick multiple times a day (as some videos suggest) could be ingesting well over the safe threshold, increasing risk of high blood pressure, fluid retention, and cardiovascular strain.
    • No real metabolic effect: Despite its reputation, there is no clinical evidence that pink salt boosts metabolism, burns fat, or suppresses appetite in any meaningful way. The minor effects people feel—such as increased fullness or reduced cravings—are likely due to hydration or placebo, not salt-specific properties.
    • Dehydration and electrolyte imbalance: In some versions of the trick, users consume large quantities of saltwater without adjusting their hydration elsewhere. This can disrupt the body’s sodium-potassium balance, especially dangerous for people with kidney conditions, hypertension, or existing heart issues.
    • No support for gut health: While pink salt may contain trace minerals, it offers no prebiotic or probiotic benefit, meaning it does nothing to support the gut microbiome—which scientists now agree plays a crucial role in regulating metabolism, insulin sensitivity, and weight stability.
    • Not FDA-regulated: Most of the Pink Salt Trick kits sold online are unregulated and vary widely in quality. Some are sourced from poorly tested suppliers and may contain microplastics or industrial contaminants.

    In contrast, Trimology was developed to avoid all of these pitfalls. Its probiotic strains and resistant starches are carefully dosed for metabolic safety, backed by lab data, and formulated in cGMP-certified facilities. There’s no sodium loading, no electrolyte disruption, and no gimmicky biohacks.

    Trimology’s gut-first approach helps re-establish satiety signaling, healthy blood sugar control, and long-term fat regulation—all while nurturing the digestive ecosystem, not irritating it. Its gradual, cumulative effects are exactly what the body needs—not a one-time shock that confuses internal systems and creates dependency.

    Perhaps most importantly, Trimology doesn’t promise miracles. It encourages consistency, not urgency, which is critical in breaking the cycle of fad-based dieting that trends like the Pink Salt Trick perpetuate. Trimology provides a more intelligent, research-backed solution

    How Trimology Supports Weight Loss

    Trimology supports weight loss by targeting foundational metabolic pathways—not by temporary suppression or dehydration. Its key strategy: nourish beneficial gut bacteria with RS2 and inulin to optimize butyrate production. Butyrate enhances insulin sensitivity, reduces systemic inflammation, and reinforces the gut lining—helping the body regulate blood sugar and fat storage more effectively.

    The included probiotic strains further support natural hunger regulation: Akkermansia is linked with improved satiety hormone function and better insulin response; Clostridium butyricum promotes sustained butyrate output; and Bifidobacterium infantis may help stabilize mood, reduce food cravings, and normalize ghrelin/leptin balance.

    Users are advised to take a single capsule each morning with water or coffee—no complex fasting windows, no food tracking. Over time (usually 2–4 weeks), users report sharper energy, fewer cravings, less bloating, and gradual weight reduction—consistent with internal metabolic reset before visible change.

    Trimology positions weight loss not as an immediate outcome, but as a secondary benefit of restoring internal harmony and resilience—ideally paired with healthy eating and movement, but not dependent on them.

    Key Ingredients of Trimology

    Trimology’s formula stands on five core active components:

    • Pharmaceutical‐grade RS2 (resistant starch): sourced from green banana or potato starch; resists digestion until it reaches the colon, where specific bacteria ferment it, producing butyrate—a short-chain fatty acid central to metabolic regulation.
    • Chicory root (inulin): a soluble fiber and prebiotic that nourishes a diverse gut microbiome, amplifying butyrate production and improving digestion and glucose response.
    • Clostridium butyricum: a robust butyrate-producer that helps lower inflammation, stabilize gut environment, and support fat-burning pathways.
    • Akkermansia muciniphila: known to improve gut barrier integrity, increase satiety hormone responses, and enhance insulin sensitivity—like a natural appetite regulator.
    • Bifidobacterium infantis: associated with reduced cravings, hormone regulation, better digestion, and mood balance—all supportive of sustainable weight.

    These ingredients were chosen not for hype, but for measurable roles in reactivating the gut‑brain‑fat axis. Together, they form what Trimology refers to as the “Signal Reset Triad”—a synergy that supports calm inflammatory processes, improved satiety, and metabolic resilience.

     Visit Trimology Official Website To Know More About ……..

    What Makes Trimology Different From Other Weight Loss Supplements

    Trimology diverges from traditional fat burners or appetite suppressants in several key ways:

    1. No stimulants or synthetic hormones: unlike energizing fat‑burners loaded with caffeine or hormone‑mimicking compounds, Trimology works through microbiome support—not chemical triggers.
    2. Transparent labeling: ingredients are clearly identified, including specific probiotic strains and prebiotic sources. No proprietary blends or ambiguous fillers—each component was selected based on clinical research.
    3. Simplicity and compatibility: single capsule daily, compatible with most lifestyles and diet plans. No food tracking, no cycles, no loading phases. Reviewers consistently praise its integration ease and non‑aggressive positioning.
    4. Sustainable orientation: Trimology encourages long‑term use to rebuild metabolic signaling—not short bursts of weight loss that fade when the supplement ends.
    5. Gut‑focused rather than symptom focused: Rather than treating appetite or bloating as surface issues, Trimology treats them as symptoms of disrupted gut‑brain communication, aiming for root‑cause recalibration.

    Why Women Over 30 Are More Likely to Fall for These Weight Loss Trends

    Women over 30—especially in their late 30s and 40s—often encounter metabolic shifts as hormonal cycles evolve and gut microbiome diversity diminishes. Age-related declines in resistant starch intake, poorer insulin sensitivity, and changing satiety hormone patterns can make weight less responsive to diet and exercise alone.

    Traditional diet programs often backfire for this demographic, causing fatigue, rebound weight gain, or hormonal disruption. Many women report frustration after trying numerous programs with limited long-term results. This vulnerability makes them more susceptible to quick-fix trends like the Pink Salt Trick—offering false hope with minimal effort and social proof.

    Trimology acknowledges these real challenges. Unlike superficial hacks, it works by targeting age‑sensitive systems: gut‑brain communication, butyrate deficit recovery, and hormone stability. Its gentle, supportive approach aligns with women’s busy lives and biological realities: a daily capsule versus restrictive detoxes or influencer‑pushed gimmicks.

    By addressing the invisible drivers of metabolic slowdown—not just calories or fat—Trimology offers a credible alternative for those most affected by modern metabolic.

    Is This Product Backed by Science?

    Yes—while Trimology is a supplement, its formula is built on published scientific research into resistant starch, gut microbiota, and metabolic signaling.

    • RS2 has been shown in multiple studies to increase butyrate production, reduce inflammation, and support healthy glycemic response.
    • Akkermansia muciniphila has clinical data linking it to improved insulin sensitivity and satiety hormone levels.
    • Clostridium butyricum is documented for its resilience and butyrate‑producing capacity.
    • Bifidobacterium infantis has been associated with reduced appetite and improved digestion.

    Although Trimology capsules themselves haven’t undergone large‑scale clinical trials, each ingredient is supported by peer‑reviewed research. Independent reviewers and affiliate health blogs repeatedly cite these scientific underpinnings in endorsement articles.

    Furthermore, Trimology emphasizes ingredient sourcing transparency, avoids false claims or miracle marketing, and communicates realistic expectations—traits aligned with science‑based consumer trust.

    Where To Get Trimology?

    Trimology is available exclusively through its official website. This direct‑to‑consumer model helps ensure authenticity, clarity in pricing and subscription options, and avoids counterfeit distribution common in third‑party marketplaces.

    In contrast to viral “Pink Salt Trick” videos with undisclosed affiliate links, Trimology’s official site provides detailed ingredient listings, FAQ sections, customer support contacts, and opt‑out cancellation policies at no hidden fees.

    Users should purchase only via the official domain to avoid scams or unauthorized resellers. Many reviewers also recommend starting with the introductory offer (typically 30‑day supply) before committing to longer subscriptions.

    Final Thoughts: Why This Trend Matters More Than It Seems

    On the surface, the Pink Salt Trick appears harmless: a pinch of salt, a glass of water, maybe lemon and honey. But beneath the glossy viral veneer lies the risk of misinformation, procedural mimicry, and potential health issues for those with hypertension or kidney conditions.

    This trend exemplifies what happens when social media bypasses scientific validation—when AI‑generated celebrity testimonials and simplified ritual hacks displace rigorous evidence and expert guidance. It’s a warning sign: even well‑meaning health culture can propagate dangerous fads fast.

    Trimology represents the opposite trajectory. It doesn’t promise instant transformation but offers a model of sustainable metabolic realignment rooted in gut science, real‑food traditions, and transparent sourcing. It shifts the narrative from external fixes to internal recalibration.

    In a cultural moment flooded with wellness trends, the difference between viral popularity and scientific credibility matters. The Pink Salt Trick may vanish as its lack of efficacy becomes clearer; Trimology, by contrast, seeks longer‑term trust through measurable ingredients and consumer empowerment.

    For consumers—especially women over 30—it’s a reminder to prioritize evidence over endorsement, gut‑health over gimmicks, and sustainable support over superficial trend chasing.

    Media Contact:
    Brand website: https://trimologyweight.com/
    Project name: Trimology
    Email: support@trimologyweight.com
    Phone: +1 (302) 467-2939

    Attachment

    The MIL Network

  • MIL-OSI USA: Kaine, Curtis, And Merkley Introduce Bipartisan Bill to Address Crimes in Brazilian Amazon and Strengthen Regional Stability

    US Senate News:

    Source: United States Senator for Virginia Tim Kaine

    WASHINGTON, D.C. – Today, U.S. Senators Tim Kaine (D-VA), John Curtis (R-UT), and Jeff Merkley (D-OR), senior members of the Senate Foreign Relations Subcommittee on the Western Hemisphere, introduced the Strengthening the Rule of Law in the Brazilian Amazon Act. The bipartisan legislation addresses crimes committed by transnational criminal organizations and drug trafficking groups, which are devastating communities in and around the Brazilian Amazon, upending the rule of law, and accelerating environmental degradation and deforestation. Violent deaths in the Brazilian Amazon are significantly higher than in other parts of the country. The bill would provide the U.S. government with more tools to support U.S.-Brazil efforts to address these crimes and prioritize identifying investment opportunities for U.S. companies in the Brazilian Amazon.

    “Addressing cartel violence and deforestation in the Brazilian Amazon is important to protecting our national security, promoting stability in the Western Hemisphere, and preserving the environment,” said Kaine, Ranking Member of the SFRC Subcommittee on the Western Hemisphere. “I’m proud to join with Senators Curtis and Merkley to introduce this bipartisan legislation to expand the United States’ role in cracking down on violence, forced displacement, and environmental degradation in the Amazon.”

    “Criminal networks thrive where the rule of law is weak—and when they do, both people and the planet suffer,” said Curtis, Chair of the SFRC Subcommittee on the Western Hemisphere. “This bill helps us partner with Brazil to crack down on lawlessness in the Amazon and support a model of conservation that is also rooted in economic opportunity.“

    “The Amazon provides sanctuary for countless wildlife, and the trees of this tropical forest support not only Brazil’s environment, but also the lungs of the planet,” said Merkley, a senior member of the Senate Foreign Relations Committee.?“As the impacts of climate chaos become deadlier and more frequent—threatening our health, planet, and future—the U.S. must support Brazil’s efforts to stand against the criminal and often violent efforts driving deforestation and environmental degradation in the Brazilian Amazon.”

    Specifically, the bipartisan Strengthening the Rule of Law in the Brazilian Amazon would:

    • Direct the U.S. Secretary of State, in coordination with other U.S. federal agencies, to prioritize supporting Brazil’s efforts to identify and disrupt transnational criminal networks committing environmental crimes.
    • Direct support to local communities and vulnerable areas in the Brazilian Amazon.
    • Recommend the U.S. International Development Finance Corporation (DFC) place an individual in Brazil responsible for identifying sustainable economic opportunities for U.S. businesses in the Brazilian Amazon.
    • Require the Secretary of State to submit a report to Congress regarding drivers of deforestation and environmental degradation in the Brazilian Amazon.
    • Advise the United States to encourage international financial institutions to prioritize promoting sustainable development in the Amazon and oppose loans or programs that would exacerbate environmental crimes in the region.

    Full text of the bill is available here.

    MIL OSI USA News

  • MIL-OSI USA: Attorney General Bonta Issues Consumer Alert Amid Increase in Reported Scams Targeting the Military Community

    Source: US State of California

    Thursday, July 31, 2025

    Contact: (916) 210-6000, agpressoffice@doj.ca.gov

    Does an offer seem too good to be true? Take a tactical pause to evaluate  

    OAKLAND — In recognition of Military Consumer Month, Attorney General Rob Bonta today issued a consumer alert to help protect California service members, veterans, and their family members from targeted common scams and fraud. The military community and their families are often targets for predatory scammers: According to the Federal Trade Commission, military consumers nationwide reported over 99,400 fraud complaints last year — an increase from 2023’s approximately 93,000 complaints — including 44,587 imposter scams that reportedly cost them and their families over $199 million.  

    “More and more often, service members, veterans, and their families are targets for predatory scammers promising everything from home loans to jobs, and continuing education. This is absolutely unacceptable. As part of our commitment to protect those who protect us, my office will continue to bring the full force of the law against those who seek to exploit California’s military community,” said Attorney General Bonta. “If you have fallen victim to a scam or suspect fraudulent activity, get help and share your story so that we can help your fellow service members. You can report fraud to your local military or civilian law enforcement agency, or to the California Department of Justice at oag.ca.gov/report.”

    Why is the Military Community Targeted? 

    Military service members, veterans, and their families are frequently targeted by scammers who want access to their pay and benefits, and who know that military members will often pay even fraudulent or over-stated debts to avoid security clearance issues or other disruptions to their military careers. In addition, the camaraderie that unites the military community is often exploited by impostors who claim to be veterans in attempts to perpetrate scams or access personal information for fraudulent purposes.   

    Common Scams Targeting the Military Community:

    Scammers use a variety of tactics to gain trust. Protect yourself by staying up to date on common military- and veteran-targeted scams. Beware of the following: 

    • Charity Scams: Just because a charity includes the word “veteran” in its name doesn’t mean that veterans are members of the group, or that veterans or their families will benefit from a donation. Scammers will use names that sound legitimate or those that mimic the names of well-known charities to create confusion. Take the time to make an informed decision and be wary of aggressive solicitations. Go to oag.ca.gov/charities, under the Resources & Tools section, and click on Registry Verification Search. If a charity is not listed, it should not be soliciting funds in California. If it is listed, you can view its financial reports, including the IRS Form 990 that the charity is required to file with DOJ’s Registry of Charitable Trusts.
    • Predatory Schools: The GI Bill and other military education programs offer you the chance to attend school and plan for your future, but for-profit schools sometimes target service members and veterans with false promises. Slow down and take the time you need to make the right decision. Predatory schools often use high-pressure sales tactics to try to get you to sign up. It’s important to ask for information about the programs, such as graduation rates, job placement, and graduate salary information. Offers that seem too good to be true generally are. Further, don’t forget that educational opportunities at the California Community Colleges, California State University, and University of California may be available to you. 
    • Home Loan Scams: Be aware of scammers that — through phone calls or fraudulent mailers — claim to be affiliated with the government, the Department of Veterans Affairs, or your home loan servicer. These fraudsters may attempt to convince you to agree to loan modifications, refinance your home, or make payments on your loans. Be cautious of any individual or lender that contacts you and asks you to pay fees upfront before receiving any services; tells you to cancel your mortgage payment and resend the funds elsewhere; tells you to make payments to someone other than your current loan servicer; or pressures you to sign papers you haven’t had a chance to read thoroughly or that you don’t understand — including asking you to sign over the title to your property. 
    • Identity Theft and Fraud: Some scammers will pretend to be from the Department of Defense, Department of Veterans Affairs, or other official organizations in order to get your personal information so that they can commit identity theft or fraud. Before you provide any information, always make sure a request is coming from an official organization by doing a quick search on the internet or consulting a trusted source to get the organization’s real contact information. Never trust the contact information given by the person that is asking for your personal information, as scammers often give out fake contact information. Be wary of letters and emails that have misspellings, look unprofessional, or send you to a non-government website for information or action, as these are almost always fake. Lastly, never give out your Social Security number to receive military or veteran discounts. Scammers often promise military or veteran discounts in order to obtain personal information. 
    • Job Scams: Service members looking for new career opportunities after leaving service are a target for scammers posting fictitious job listings with the goal of stealing their personal information and finances. Avoid becoming a victim of job scams by conducting thorough research on the company. Additionally, stick to well-known job search platforms and government career websites when looking for job opportunities. Remember, legitimate employers will never require you to pay fees for applications, interviews, or background checks. You should also look out for fake check scams, which occur when a scammer posing as an employer sends you a counterfeit check to deposit into your account. The scammer will then ask you to send a portion of the funds back to them or a third party, while letting you keep some as payment. Eventually, the bank reverses the fake check, leaving you stuck paying the money back to the bank. If something feels off or suspicious during the job search, trust your instincts and end communication immediately.
    • Pension Scams: Veterans ages 65 and over are targeted by scam financial advisers who try to persuade senior veterans to buy costly annuities or transfer their assets into trusts, or pay unnecessary and illegal fees for help with a veterans pension application. These “advisers” claim to help veterans qualify for Aid and Attendance or other veterans benefits, but may cause you to lose eligibility or access to pension, disability, or healthcare benefits. If you are interested in Aid and Attendance or other veterans benefits, you can get free help from your County Veterans Service Office here.
    • Affinity Fraud: Affinity scams target members of identifiable groups, including the military. The perpetrators are — or pretend to be — members of the targeted group, and use sales pitches that rely on group trust and loyalty. In the military community, this includes exploiting the trust that service members have for their fellow service members, and for veterans who previously served. Don’t make a significant purchase, or an investment decision, based on the salesperson’s supposed military service, or the claim that a business is military-friendly or endorsed by the Armed Forces. Take a tactical pause, and shop around for the best deal.
    • Debt Collection and Illegal Threats: Debt collectors may try to trick or scare service members into making payments on debts. It is illegal for debt collectors to do any of the following: revoke your security clearance; contact your command in order to collect a debt (unless they have your consent, given after the debt came due, to do so); discipline or demote you; or garnish your pay. If a debt collector is trying to collect a debt that you do not owe or have already paid, dispute the debt in writing. Tell the debt collector why you do not owe the debt, include copies of any evidence you have, and mail this dispute to the debt collector using registered mail so that you have proof that the collector received it — and make sure to keep copies of everything for yourself. If you dispute the debt within 30 days after the collector first contacted you, the collector must stop collection until it shows you written proof of the debt.
    • Rental Housing Scams: These scams target military personnel looking for housing near a base, especially prevalent during the Permanent Change of Station season. Scammers pretend to be real estate agents and post fake ads for rental properties on websites, sometimes promising military discounts and other incentives in order to get service members to send them money for fees and deposits upfront. If someone insists on receiving money or other payments before a property has been seen, it is likely a rental scam. Avoid wiring money to reserve apartments, and use your installation housing office or established property management companies to locate potential housing. 
    • Predatory Auto Sales and Financing: Car dealers located near military bases may try to lure service members with promises of special deals for military personnel. Often, these so-called deals conceal the terms of purchase for the vehicle and result in the service member drastically overpaying for both the vehicle and the cost of financing. For example, dealers may insist that military personnel will not qualify for financing unless they purchase overpriced and unnecessary add-ons. Other times, the dealer may tell a service member who just purchased a car that the initial financing fell through and insist on renegotiating for worse terms. You should not rely on oral promises, nor feel pressured to enter into any purchase, without first reading and understanding the contract. If you are looking to purchase a car, you should explore all of your options for financing — including by contacting your bank or credit union — before making a purchase.  

    Protect Yourself from Scams:  

    • Bring a battle buddy when making big decisions, and take a tactical pause: Take your time with big decisions and get advice. A business that pressures you to make a quick decision or to not talk with your family, friends, a military financial counselor, or an officer or NCO that you trust may be out to scam you.
    • Take advantage of free annual credit reports: You are entitled to one free credit report every year from each of the three national credit bureaus: Equifax, Experian and TransUnion. Your credit history contains information from financial institutions, utilities, landlords, insurers, and others. By checking your credit reports at least once a year, you can identify signs of identity theft, as well errors in your report that could be raising the cost of your credit. Order your free annual credit reports by phone, toll-free, at 1-877-322-8228, or online at www.annualcreditreport.com.
    • Place a Fraud Alert: If your identity is stolen, put a fraud alert on your credit report by contacting the three main credit reporting agencies: Equifax, Experian, and TransUnion. Also, consider requesting a credit freeze, which will restrict access to your credit file, making it difficult for identity thieves to open new accounts in your name. Report identity theft right away and get a recovery plan at identitytheft.gov. Additionally, file a police report with your local sheriff or police department and keep a copy for your records.
    • Report Suspicious Activity: Never give out personal information to a lender or servicer that contacts you out of the blue. If you are feeling unsure, hang up and call your loan servicer directly at the number that is listed on your mortgage statement. Report suspicious activity to the Office of the Attorney General at oag.ca.gov/report and file a complaint with the FTC at reportfraud.ftc.gov.
    • Protect your online information and accounts with strong passwords: Protect yourself by using different, unique passwords for each of your online accounts. Make sure that the passwords you use are at least eight characters, including a mix of letters, numbers, and symbols.
    • Check your credit card bills and bank statements often: Look for unauthorized charges, withdrawals, or unexpected bills, and report irregular activity to your bank as soon as you see it. If you notice that a bill didn’t arrive on time, it may mean that someone has changed the contact information on your account in order to hide fraudulent charges. Don’t share personal information: Be careful about what personal information you share, such as your address or financial information.
    • Sign up for the Enhanced Homeowner Notification Program: If you reside in Los Angeles County, you may sign up to receive mailed copies of documents recorded against your home, allowing you to review recorded real estate documents so you are aware of actions taken against your property.

    If you believe you have been the victim or target of a scam, immediately contact your local police department or reach out to your base legal office. For the legal office’s contact information, ask your command or visit to legalassistance.law.af.mil/. California National Guard personnel can also obtain legal help at calguard.ca.gov. You may also file a complaint with the Office of the Attorney General at oag.ca.gov/report. For additional information on military-targeted scams, visit our website at oag.ca.gov/consumers/general/military.

    # # #

    MIL OSI USA News

  • MIL-OSI Security: Hays man sentenced to 4 years in prison on gun charges

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    BILLINGS – A Hays man who possessed illegal firearms was sentenced today to 48 months in prison to be followed by 3 years of supervised release, U.S. Attorney Kurt Alme said.

    Wylon Alfred Plainfeather, 54, pleaded guilty in March 2025 to one count of possession of an unregistered firearm and one count of possession of an unregistered silencer.

    U.S. District Judge Susan P. Watters presided.

    The government alleged in court documents that on December 27, 2022, law enforcement officers responded to a Billings residence to search for a probationer. The probationer was not present, but officers searched the house and found three firearms in the basement.

    As law enforcement was preparing to leave the residence following the search, Plainfeather pulled into the driveway. He admitted owning all three guns and acknowledged one was a sawed-off shotgun and another, a .22 caliber rifle, had a tube on it. Plainfeather said he fired the gun with the tube and claimed it was not very effective at making it quieter. He said he got all the firearms from the reservation and that he traded for them. Law enforcement officers confirmed the firearms were in operable condition but not registered to Plainfeather (or anyone else) in the National Firearms Registration and Transfer Record (NFRTR).

    Assistant U.S. Attorney Kelsey Hendricks prosecuted the case. The investigation was conducted by the ATF, Montana Division of Criminal Investigation, and Montana Probation and Parole.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    XXX

    MIL Security OSI

  • MIL-OSI Analysis: European gloom over the Trump deal is misplaced. It’s probably the best the EU could have achieved

    Source: The Conversation – UK – By Maha Rafi Atal, Adam Smith Senior Lecturer in Political Economy, School of Social and Political Sciences, University of Glasgow

    The trade deal between the US and the European Union, squeezed in days before the re-introduction of Donald Trump’s “liberation day” tariffs, is reflective of the new politics of global trade. Faced with the threat of 30% baseline tariffs from Washington, as well as additional levies on specific sectors, the EU has secured a partial reprieve of a flat 15% tariff on all goods.

    Was this the best the bloc could have achieved? In the time available, it may well have been. The 15% rate is higher than the UK secured earlier this year, but it’s significantly below the level applied to China and Mexico, and on par with Japan.

    The EU has also managed a “zero-for-zero” tariffs deal on some hi-tech goods, notably semiconductors vital for products like phones and laptops. This is something the UK did not push for or secure in its own framework agreed with the US president.




    Read more:
    Donald Trump has reduced tariffs on British metals and cars, but how important is this trade deal? Experts react


    What’s more, EU leaders have argued that agreeing to the deal has security benefits in protecting dwindling US support for European defence. The urgency of Europe’s security concerns in Ukraine made these talks different from trade negotiations in the first Trump administration, when Europe could afford to be more aggressive.

    The biggest winners in this deal are Europe’s carmakers. The US has collapsed various sector-specific duties on goods like aircraft, cars and automotive parts into the 15% ceiling. This effectively reduces tariffs on EU-made cars (from 27.5%).

    American automakers, meanwhile, rely heavily on parts from Mexico and China – still subject to higher tariffs at the time of writing. This makes EU vehicles more competitive for US consumers than “American” cars that rely on overseas parts.

    Most importantly however, like the UK deal before it, the new EU agreement is a statement of understanding between the White House and the European Commission, rather than a formal treaty. A treaty would be subject to parliamentary ratification on both sides.

    But the semi-formal nature of this agreement allows both Trump and European leaders to portray the deal as a “win” by playing fast and loose with what’s actually in it.

    For example, the Trump administration will celebrate an EU commitment to buy US$250 billion (£189 billion) in US energy imports annually. Yet the concession holds no legal weight in the EU. The European Commission, which negotiated with Trump, does not buy any energy nor does it manage the power grid inside its 27 member states.

    The commission can encourage, but cannot compel, those states to buy American. (Indeed, it might want to do so anyway, since it helps it to pivot away from Russian gas). But ultimately, member states and businesses decide where their energy supply comes from, and they are not direct parties to the deal. Only a formal treaty ratified by the European parliament would compel them.

    No guarantees from Trump

    The informal nature of this agreement also allows EU member states to protest against what they see as capitulation to Trump’s demands without real consequence. After all, there is not yet a treaty text they would be required to vote on or implement.

    The Trump administration similarly imposed its sweeping tariff threats in early spring without a vote from Congress, and has been making ad hoc changes to the rates in the same way.

    On the one hand, this means European countries may not ultimately be required to implement some of the deal’s less savoury elements such as the energy purchases or lowering the bloc’s own tariffs on US goods.

    On the other hand, this means the Trump administration – notorious for abrupt changes of turn – can also renege at any time. In reality, there is little the EU can do about this. The question of leverage looms large. Trump’s longstanding antipathy towards the EU – seeing it less as an ally and more as a rival – meant that Brussels was never negotiating from a position of strength.

    The fact that the EU avoided the worst-case scenario, protected key sectors and secured other sector-specific advantages suggests a deal shaped not by triumph, but by containment of Trump. Since the deal was announced, the picture emerging from many European leaders has been one of gloom. True, the EU didn’t win – but it survived. And that, for now, is probably enough.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.

    Maha Rafi Atal does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. European gloom over the Trump deal is misplaced. It’s probably the best the EU could have achieved – https://theconversation.com/european-gloom-over-the-trump-deal-is-misplaced-its-probably-the-best-the-eu-could-have-achieved-262369

    MIL OSI Analysis

  • MIL-OSI Analysis: Will the latest diplomatic moves to end the war in Gaza work?

    Source: The Conversation – UK – By Jonathan Este, Senior International Affairs Editor, Associate Editor, The Conversation

    This article was first published in The Conversation UK’s World Affairs Briefing email newsletter. Sign up to receive weekly analysis of the latest developments in international relations, direct to your inbox.


    It feels as if things are moving at completely different speeds in Gaza and in the outside world. From the embattled Gaza Strip the narrative is depressingly familiar. Dozens more Palestinian civilians have been killed in the past 24 hours as they try to get hold of scarce supplies of food.

    Aid agencies report that despite air drops of supplies and “humanitarian pauses” in the fighting, the amount of food getting through to the starving people of Gaza remains pitifully insufficient.

    Two more children are reported to have died of starvation, bringing the total number of hunger-related deaths to 159, according to Palestinian sources quoted by al-Jazeera.

    US envoy Steve Witkoff arrived in Jerusalem for more talks as the US president Donald Trump posted his latest bout of social media diplomacy on his TruthSocial site, a message which appears pretty faithful to the Netanyahu government’s position: “The fastest way to end the Humanitarian Crises in Gaza is for Hamas to SURRENDER AND RELEASE THE HOSTAGES!!”

    Both sides continue to reject the other side’s demands, bringing ceasefire negotiations to an effective standstill.

    In the outside world, meanwhile, events seem to be gathering pace. A “high-level conference” at the United Nations in New York brought together representatives of 17 states, the European Union and the Arab League, resulting in “a comprehensive and actionable framework for the implementation of the two-state solution and the achievement of peace and security for all”.


    Sign up to receive our weekly World Affairs Briefing newsletter from The Conversation UK. Every Thursday we’ll bring you expert analysis of the big stories in international relations.


    What first catches the eye about this proposal, which was signed by Saudi Arabia,
    Qatar, Egypt and Jordan, is that it links a peace deal with the disarming and disbanding of Hamas. It also condemns the militant group’s savage attack on southern Israel on October 23 2023, which was the catalyst for the latest and arguably most grievous chapter of this eight-decade conflict. It’s the first time the Arab League has taken either of these positions.

    The New York declaration, as it has been dubbed, envisages the complete withdrawal of Israeli security forces from Gaza and an end to the displacement of Palestinians. Government will be the responsibility of the Palestinian Authority (PA), and a conference to be scheduled in Egypt will design a plan for the reconstruction of Gaza, much of which has been destroyed in the 20-month assault by the Israel Defense Forces.

    It is, writes Scott Lucas, a “bold initiative” which, “in theory could end the Israeli mass killing in Gaza, remove Hamas from power and begin the implementation of a process for a state of Palestine. The question is whether it has any chance of success.”

    Lucas, an expert in US and Middle East politics at the Clinton Institute of University College Dublin, is not particularly sanguine about the short-term prospects for a ceasefire and the alleviation of the desperate conditions for the people of Gaza. But what it represents more than anything else, is “yet another marker of Israel’s increasing isolation”.

    He points to recent announcements that France, the UK (subject to conditions) and Canada will recognise the state of Palestine at the UN general assembly in September. The prospect of normalisation between Israel and Arab states, at the top of the agenda a few short years ago, is now very unlikely. And in the US, which remains Israel’s staunchest ally, a Gallup poll recently found that public opinion is turning against Israel and its prime minister, Benjamin Netanyahu.




    Read more:
    New peace plan increases pressure on Israel and US as momentum grows for Palestinian statehood


    But how important are the declarations by France, the UK and Canada of intent to potentially recognise Palestinian statehood, asks Malak Benslama-Dabdoub. As expert in international law at Royal Holloway University of London, who has focused on the question of Palestinian statelessness, Benslama-Dabdoub thinks that the French and British pledges bear closer examination.

    The French declaration was made on July 24 on Twitter by the president, Emmanuel Macron. Macron envisages a “demilitarised” state, something Benslama-Dabdoub sees as a serious problem, as it effectively denies the fundamental right of states to self-determination and would rob a future Palestinian state of the necessary right to self-defence.

    The declaration by the UK prime minister that Britain may also recognise Palestinian statehood in September is framed as a threat rather than a pledge. Unless Israel agrees to a ceasefire, allows the UN to recommence humanitarian efforts and engages in a long-term sustainable peace process, the UK will go ahead with recognising Palestine at the UN.

    You have to consider that the UK government’s statement said that the position has always been that “Palestinian statehood is the inalienable right of the Palestinian people”. So to frame this as a threat rather than a demand is arguably to deny that “inalienable right”.




    Read more:
    UK to recognise Palestinian statehood unless Israel agrees to ceasefire – here’s what that would mean


    Paul Rogers also sees serious problems with the pledges to recognise Palestinian statehood. Demands for Hamas to disarm and play no further role in Palestinian government he sees as a non-starter as is the thought of a demilitarised Palestine. “Neither plan has the slightest chance of getting off the ground.”

    Rogers, who has researched and written on the Middle East for more than 30 years, also thinks that without the full backing of the US there is very little chance that a peace plan could succeed.

    Rogers finds it hard to believe that Washington will change tack on the Palestinian question, “unless the US president somehow gets the idea that his own reputation is being damaged”. There’s always a chance of this. News from the Gaza Strip is relentlessly horrifying and the aforementioned polls suggest many voters are reassessing their views of the conflict. But Trump is heavily indebted for his re-election to the far-right Christian Zionist movement, who wield a great deal of power with the White House.

    The other thing that might influence the conflict is if enough of the IDF’s top brass recognise the futility of waging what has always been an unwinnable conflict. This, writes Rogers, is whispered about in Israel’s military circles and one eminent retired general, Itzhak Brik, has come out and said: “Hamas has defeated us.”

    These, writes Rogers, are currently the only routes to an end to the conflict.




    Read more:
    UK and France pledges won’t stop Netanyahu bombing Gaza – but Donald Trump or Israel’s military could


    Inside Trumpian diplomacy

    We mentioned earlier that the Canadian prime minister, Mark Carney, has also pledged to recognise the state of Palestine in September. This was immediately greeted by Trump with the threat that he does so it will derail a trade deal with the US. Whether this will cut any ice with Carney, who had to make concessions to get the trade deal done in the first place, remains to be seen.

    But there’s a broader point here, writes Stefan Wolff. As Wolff reports, this week the foreign ministers of the Democratic Republic of Congo and Rwanda got together in Washington to sign a ceasefire deal, brokered by the US. Trump also claims to have successfully ended a conflict between India and Pakistan at the end of May and hostilities between Thailand and Cambodia earlier this month.

    Meanwhile his efforts to secure peace deals, or even a lasting ceasefire, in Gaza or Ukraine have been unsuccessful.

    Wolff considers why some countries respond to Trump’s diplomatic efforts while others don’t. There are a number of reasons, principally the US president’s ability to apply leverage through trade deals or sanctions and the differing complexity of the conflicts.

    He also points to the depleted resources of the US state department, Trump’s use of personal envoys with little foreign affairs experience and the US president’s insistence on making all the important decisions himself. He concludes: “The White House simply may not have the bandwidth for the level of engagement that would be necessary to get to a deal in Ukraine and the Middle East.”




    Read more:
    Why Donald Trump has stopped some conflicts but is failing with Ukraine and Gaza


    One US government department whose resources haven’t been depleted under Donald Trump is the US Immigration and Customs Enforcement agency, known as Ice. Part of the Department of Homeland Security, Ice has been responsible for identifying and detaining non-citizens and undocumented migrants.

    Their agents carry guns, wear masks and typically operate in plain clothes, although they often wear military kit. The agency received massive funding via Trump’s One Bzig Beautiful Bill Act earlier this month, which will allow the agency to recruit hundreds, if not thousands, of new agents. The number of arrests is increasing steadily, as is the disquiet their operations are prompting in many American cities, where opposition protests are also growing.

    Dafydd Townley, an expert in US politics at the University of Portsmouth, explains how Ice operates and where it sits in Donald Trump’s plan to deport millions of illegal migrants from the US.




    Read more:
    Masked and armed agents are arresting people on US streets as aggressive immigration enforcement ramps up


    World Affairs Briefing from The Conversation UK is available as a weekly email newsletter. Click here to get updates directly in your inbox.


    ref. Will the latest diplomatic moves to end the war in Gaza work? – https://theconversation.com/will-the-latest-diplomatic-moves-to-end-the-war-in-gaza-work-262380

    MIL OSI Analysis

  • MIL-OSI Security: CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization

    Source: US Department of Homeland Security

    Summary

    The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement. The purpose of this advisory is to highlight identified cybersecurity issues, thereby informing security defenders in other organizations of potential similar issues and encouraging them to take proactive measures to enhance their cybersecurity posture. This advisory has been coordinated with the organization involved in the hunt engagement.

    In 2024, CISA led a proactive hunt engagement at a U.S. critical infrastructure organization with the support of USCG analysts. During hunts, CISA proactively searches for evidence of malicious activity or malicious cyber actor presence on customer networks. The organization invited CISA to conduct a proactive hunt to determine if an actor had been present in the organization’s environment. (Note: Henceforth, unless otherwise defined, “CISA” is used in this advisory to refer to the hunt team as an umbrella for both CISA and USCG analysts).

    During this engagement, CISA did not identify evidence of malicious cyber activity or actor presence on the organization’s network, but did identify cybersecurity risks, including:

    • Insufficient logging;
    • Insecurely stored credentials;
    • Shared local administrator (admin) credentials across many workstations;
    • Unrestricted remote access for local admin accounts;
    • Insufficient network segmentation configuration between IT and operational technology (OT) assets; and
    • Several device misconfigurations.

    In coordination with the organization where the hunt was conducted, CISA and USCG are sharing cybersecurity risk findings and associated mitigations to assist other critical infrastructure organizations with improving their cybersecurity posture. Recommendations are listed for each of CISA’s findings, as well as general practices to strengthen cybersecurity for OT environments. These mitigations align with CISA and the National Institute for Standards and Technology’s (NIST) Cross-Sector Cybersecurity Performance Goals (CPGs), and with mitigations provided in the USCG Cyber Command’s (CGCYBER) 2024 Cyber Trends and Insights in the Marine Environment (CTIME) Report.

    Although no malicious activity was identified during this engagement, critical infrastructure organizations are advised to review and implement the mitigations listed in this advisory to prevent potential compromises and better protect our national infrastructure. These mitigations include the following (listed in order of importance):

    • Do not store passwords or credentials in plaintext. Instead, use secure password and credential management solutions such as encrypted password vaults, managed service accounts, or built-in secure features of deployment tools.
      • Ensure that all credentials are encrypted both at rest and in transit. Implement strict access controls and regular audits to securely manage scripts or tools accessing credentials.
      • Use code reviews and automated scanning tools to detect and eliminate any instances of plaintext credentials on hosts or workstations.
      • Enforce the principle of least privilege, only granting users and processes the access necessary to perform their functions.
    • Avoid sharing local administrator account credentials. Instead, provision unique, complex passwords for each account using tools like Microsoft’s Local Administrator Password Solution (LAPS) that automate password management and rotation.
    • Enforce multifactor authentication (MFA) for all administrative access, including local and domain accounts, and for remote access methods such as Remote Desktop Protocol (RDP) and virtual private network (VPN) connections.
    • Implement and enforce strict policies to only use hardened bastion hosts isolated from IT networks equipped with phishing-resistant MFA to access industrial control systems (ICS)/OT networks, and ensure regular workstations (i.e., workstations used for accessing IT networks and applications) cannot be used to access ICS/OT networks.
    • Implement comprehensive (i.e., large coverage) and detailed logging across all systems, including workstations, servers, network devices, and security appliances.
      • Ensure logs capture information such as authentication attempts, command-line executions with arguments, and network connections.
      • Retain logs for an appropriate period to enable thorough historical analysis (adhering to organizational policies and compliance requirements) and aggregate logs in an out-of-band, centralized location, such as a security information event management (SIEM) tool, to protect them from tampering and facilitate efficient analysis.

    For more detailed mitigations addressing the identified cybersecurity risks, see the Mitigations section of this advisory.

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See Appendix: MITRE ATT&CK Tactics and Techniques for a table of potential activity mapped to MITRE ATT&CK tactics and techniques.

    Overview

    Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard (USCG) analysts (collectively referred to as CISA in this report) conducted a threat hunt engagement at a critical infrastructure organization in 2024. During this hunt, CISA proactively searched for evidence of malicious activity or the presence of a malicious cyber actor on the customer’s network using host, network, industrial control system (ICS), and commercial cloud and open-source analysis tools. CISA searched for evidence of activity by looking for specific exploitation tactics, techniques, and procedures (TTPs) and associated artifacts.

    While CISA did not find evidence of threat actor presence on the organization’s network, the team did identify several cybersecurity risks. These findings are listed below in order of risk. Technical details of each identified cyber risk are included, along with the potential impact from threat actor exploitation of each risk (recommendations for mitigating each risk are listed in the Mitigations section below).

    Several of these findings align with those observed during similar engagements conducted by US Coast Guard Cyber Command (CGCYBER), which are documented in their 2024 Cyber Trends and Insights in the Marine Environment (CTIME) report. The authoring agencies encourage critical infrastructure organizations to review the CTIME report to understand trends in the techniques/attack paths threat actors are using to compromise at-risk organizations, and what mitigations organizations should implement to prevent a successful attack.

    Key Findings

    Shared Local Admin Accounts with Non-Unique Passwords Stored as Plaintext

    Details: CISA identified a few local admin accounts with non-unique passwords; these accounts were shared across many hosts. The credentials for each account were stored plaintext in batch scripts. CISA discovered these authorized scripts were configured to create user accounts with local admin privileges and then set identical, non-expiring passwords—these passwords were stored in plaintext in the script. One script was configured to create an admin account (set with a password stored in the script in plaintext) and automatically add to the admin group. The account was set as the local admin account on many other hosts.

    Potential Impact: The storage of local admin credentials in plaintext scripts across numerous hosts increases the risk of widespread unauthorized access, and the usage of non-unique passwords facilitates lateral movement throughout the network. Malicious actors with access to workstations with either of these batch scripts could obtain the passwords for these local admin accounts by searching the filesystem for strings like net user /add, identifying scripts containing usernames and passwords [T1552.001], and accessing these accounts to move laterally.

    For example, during a controlled security validation exercise (with explicit permission from the customer), CISA used the credentials found in one of the scripts to log into its associated admin account locally on a workstation [T1078.003], and then establish a Remote Desktop Protocol (RDP) connection to another workstation [T1021.001]. This demonstrated that the credentials allowed local login to an admin account and enabled lateral movement to any workstation with the account. While using this account, the user had local admin privileges on many workstations. Upon initiating the RDP session, the system issued out a notification that another user was currently logged in and that continuing the session would disconnect the existing user, confirming that the account can be accessed remotely via RDP.

    The uniform use of local admin accounts with identical, non-expiring passwords across numerous hosts, coupled with the storage of these credentials in plaintext within accessible scripts, elevates the risk of unauthorized access and lateral movement throughout the network.

    With local admin access, malicious cyber actors can:

    • Modify existing accounts or create new accounts [T1098], potentially escalating privileges or maintaining persistent access.
    • Install malicious browser extensions on compromised systems [T1112].
    • Communicate with compromised systems using standard application layer protocols [T1071], which may bypass certain security monitoring tools.
    • Modify local policies to escalate privileges or disable security features [T1484].
    • Alter system configurations or install software that executes at startup [T1547], ensuring continued access and persistence.
    • Hijack the execution flow of applications to inject malicious code [T1574].

    The widespread distribution of plaintext credentials and the use of identical passwords across hosts increases the risk of unauthorized access throughout the network. This vulnerability heightens the potential for attackers to conduct unauthorized activities, which may impact the confidentiality, integrity, and availability of the organization’s assets.

    Note: This finding was associated with workstations only; servers and other devices were not affected.

    Insufficient Network Segmentation Configuration Between IT and Operational Technology Environments

    Details: While assessing interconnectivity between the customer’s IT and operational technology (OT) environments, CISA identified that the OT environment was not properly configured. Specifically, standard user accounts could directly access the supervisory control and data acquisition (SCADA) virtual local area network (VLAN) directly from IT hosts.

    First, CISA determined it was possible to establish a connection via port 21 from a user workstation in the IT network to a system within the SCADA VLAN. The test established that a network path was available, the remote host was reachable, the port was open and listening for connections, and that the port was directly accessible between the IT and SCADA VLANs, with misconfigured network-level restrictions—for example, firewalls or access control lists (ACLs)—blocking the Transmission Control Protocol (TCP) connection on the port. This test was conducted using a standard user account on a regular IT workstation without administrative privileges [T1078].

    Second, CISA discovered that the customer did not have sufficient secured bastion hosts dedicated for accessing SCADA and heating, ventilation, and air conditioning (HVAC) systems. A bastion host­—sometimes referred to as a jump box or jump server—is a specialized, highly secured system (often a server or dedicated workstation) that serves as the sole access point between a network segment (such as an internal IT network) and a protected internal network (like an OT or ICS environment). By inspecting and filtering all inbound and outbound traffic, a bastion host is designed to prevent unauthorized access and lateral movement, ensuring that only authenticated and authorized users can interact with internal systems. Though several hosts were designated as bastion hosts for remote access to SCADA and HVAC systems, they lacked the enhanced security configuration, dedicated monitoring, and specialized scrutiny expected of bastion hosts.

    Potential Impact: Insufficient OT network segmentation configuration, network access control (NAC), and the ability of a non-privileged user within the IT network to use their credentials to access the critical SCADA VLAN [T1078] presents a security and safety risk. Given that SCADA and HVAC systems control physical processes, compromises of these systems can have real-world consequences, including risks to personnel safety, infrastructure integrity, and equipment functionality.

    Malicious actors could further exploit potentially unsecured workstations with access to OT systems, and insufficient network segmentation configuration between IT and OT systems, in the following ways:

    • Use RDP or Secure Shell (SSH) protocols to move laterally from compromised IT workstations to OT systems [T1021.001] [T1021.004].
    • Execute commands and scripts using scripting languages like PowerShell to attack OT systems [T1059].
    • Map network connections to identify paths to OT systems [T1049].
    • Gather information about network configurations to plan attacks on OT systems [T1016].

    By exploiting these weaknesses, attackers can potentially gain unauthorized access to critical OT systems, manipulate physical processes, disrupt operations, and cause harm.

    Insufficient Log Retention and Implementation

    Details: CISA was unable to hunt for every MITRE ATT&CK® procedure in the scoped hunt plan partly because the organization’s event logging system was insufficient for this analysis. For example, Windows event logs from workstations were not being forwarded to the organization’s security information event management (SIEM), verbose command line auditing was not enabled (meaning command line arguments were not being captured in Event ID 4688), logging in the SIEM was not as comprehensive as required for the analysis, and log retention did not allow for a thorough analysis of historical activity.

    Potential Impact: The absence of comprehensive and detailed logs, along with a lack of an established baseline for normal network behavior, prevented CISA from performing thorough behavior and anomaly-based detection. This limitation hindered the ability to hunt for certain TTPs, such as living-off-the-land techniques, the use of valid accounts [T1078], and other TTPs used by sophisticated threat actors. Such techniques often do not produce discrete indicators of compromise or trigger alerts from antivirus software, intrusion detection systems (IDS), or endpoint detection and response (EDR) solutions. Further, the lack of workstation logs in the organization’s SIEM meant CISA could not analyze authentication events to identify anomalous activities, such as unauthorized access using local administrator credentials. This gap exposes networks to undetected lateral movement and unauthorized access.

    Insufficient logging can prevent the detection of malicious activity by hindering investigations, which makes detection of threat actors more challenging and leaves the network susceptible to undetected threats.

    Additional Findings

    Misconfigured sslFlags on a Production Server

    Details: CISA used PowerShell to examine the ApplicationHost.config file[1]—a central configuration file for Internet Information Services (IIS) that governs the behavior of the web server and its applications and websites—on a production IIS server. CISA observed an HTTPS binding configured with sslFlags==“0”, which keeps IIS in its legacy “one-certificate-per-IP” mode. This mode disables modern certificate-management features, and because mutual Transport Layer Security (TLS) (client-certificate authentication) must be enabled separately in “SSL Settings” or by adding , the binding leaves the client-certificate enforcement off by default, allowing any TLS client to complete the handshake anonymously. Moreover, sslFlags does not control protocol or cipher selection, so outdated protocols or weak cipher suites (e.g., SSL 3.0, TLS 1.0/1.1) may still be accepted unless Secure Channel (Schannel)[2] has been explicitly hardened.

    Potential Impact: The misconfigured sslFlags could enable threat actors to attempt an adversary-in-the-middle attack [T1557] to intercept credentials and data transmitted between clients and the IIS server. Malicious actors could also exploit vulnerabilities in older Secure Sockets Layer (SSL)/TLS protocols, as well as weak cipher suites, increasing the risk for protocol downgrade attacks in which an attacker forces the server and client to negotiate the use of weaker encryption standards [T1562.010]. This compromises the confidentiality and integrity of data transmitted over this channel. Furthermore, the absence of client certificate enforcement meant the server did not validate the identity of the connecting clients beyond the basic SSL/TLS handshake. This deficiency exposed the server to risks where unauthorized or malicious clients could impersonate legitimate users, potentially gaining access to sensitive resources without proper verification.

    Misconfigured Structured Query Language Connections on a Production Server

    Details: CISA reviewed machine.config file on a production server and identified that it was configured with a centralized database connection string, LocalSqlServer, for both profile and role providers. This configuration implies that, unless overridden in each application’s web.config files, every ASP.NET site on the server connects to the same Structured Query Language (SQL) Express or aspnetdb database and shares the same credentials context.

    Additionally, CISA identified that the machine.config file set the minRequiredPasswordLength to be less than 15 characters, which is CISA’s recommended password length.

    Potential Impact: Using a centralized database approach increases risk, as a single breach or misconfiguration in this central SQL database server can compromise all applications dependent on the server. This creates a single point of failure and could be exploited by attackers aiming to gain broad access to the system.

    Additionally, setting the minimum password length to any password under 15 characters is more vulnerable to various forms of brute-force attacks, such as password guessing [T1110.001], cracking [T1110.002], spraying [T1110.003], and credential stuffing [T1110.004]. If a threat actor successfully cracked these weak passwords, they could gain unauthorized access to user or application accounts and leverage vulnerabilities within applications to further escalate privileges, potentially leading to unauthorized access to the backend SQL Server databases. This could result in data breaches, data manipulation, or a loss of database integrity.

    Mitigations

    CISA and USCG recommend that critical infrastructure organizations implement the mitigations below to improve their organization’s cybersecurity posture. Recommendations to reduce cyber risk are listed for each of CISA’s findings during this engagement and are ordered starting from the highest to lowest importance for organizations to implement. CISA and USCG also include general practices to strengthen cybersecurity for OT environments that are not tied to specific findings.

    These mitigations align with the Cross-Sector Cybersecurity Performance Goals jointly developed by CISA and the National Institute for Standards and Technology (NIST). The Cybersecurity Performance Goals (CPGs) provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful TTPs. Visit CISA’s CPGs webpage for more information.

    Many of these mitigations also align with recommendations made by CGCYBER in their 2024 CTIME report. The report provides relevant information and lessons learned about cybersecurity risks gathered through operations similar to this threat hunt engagement, and best practices to mitigate these risks. Please see the 2024 CTIME report for additional recommendations for critical infrastructure organizations to implement to harden their environments against malicious activity.

    Implement Unique Credentials and Access Control Measures for Administrator Accounts

    • Provision unique and complex credentials for local administrator accounts [CPG 2.C] on all systems. Do not use shared or identical administrative credentials across systems. Ensure service accounts/machine accounts have passwords unique from all member user accounts.
      • For example, organizations can deploy Microsoft LAPS (see Microsoft Learn’s Windows LAPS Overview for more information) to ensure each machine has a unique, complex local administrator password; passwords are rotated automatically within Microsoft Active Directory, reducing the window of vulnerability; and that password retrieval is limited to authorized personnel only.
    • Require phishing-resistant multifactor authentication (MFA) [CPG 2.H] in addition to unique passwords for all administrative access, including local- and domain-level administrator accounts, RDP sessions, and VPN connections.
    • Use privileged access workstations (PAWs) dedicated solely for administrative tasks and isolate them from the internet and general network to reduce exposure to threats and lateral movement.
      • Harden PAWs by applying CIS Benchmarks: limit software to essential administrative functions, disable unnecessary services and ports, and ensure regular updates and patches.
      • Enforce strict access controls to restrict PAW access to authorized administrators only.
    • Conduct continuous auditing of privileged accounts by regularly collecting and analyzing logs of administrative activities, such as login attempts, command executions, and configuration changes [CPG 2.T].
      • Configure automated alerts for anomalous behaviors, including logins outside standard hours, access from unauthorized locations, and repeated failed logins.
      • Periodically review all administrator accounts to confirm the necessity and appropriateness of access levels; align these auditing practices with NIST SP 800-53 Rev. 5 Controls AU-2 (Auditable Events) and AU-12 (Audit Record Generation).
    • Apply the principle of least privilege by limiting administrative privileges to the minimum required for users to perform their roles [CPG 2.E].
      • Create individual administrative accounts with unique credentials and role-specific permissions and disable or rename built-in local administrator accounts to reduce common attack vectors.
      • Avoid using shared administrator accounts to improve accountability and auditability, and ensure administrators use standard accounts for non-administrative tasks to minimize credential exposure.
      • Implement Role-Based Access Control (RBAC) to assign permissions based on job functions, as aligned with NIST SP 800-53 Rev. 5 Control AC-5 (Separation of Duties).
    • Identify and remove unauthorized or unnecessary local administrator accounts, maintain oversight by documenting and tracking all authorized accounts, and enforce strict account management policies by restricting account creation privileges and implementing approval workflows for new administrator accounts.

    Securely Store and Manage Credentials

    • Purge credentials from the System Center Configuration Manager (SCCM). Review SCCM packages, task sequences, and scripts to ensure that no plaintext credentials are embedded, and update or remove any configurations that deploy scripts with plaintext credentials.
    • Do not store plaintext credentials in scripts. Instead, store credentials in a secure manner, such as with a credential/password manager or vault, or other privileged account management solution [CPG 2.L].
    • Use encrypted communication. If scripts must retrieve credentials at runtime, use encrypted channels and protocols (e.g., TLS 1.3) to communicate with secure credential stores. Ensure that credentials are not written to disk or exposed in logs.
    • Use unique local administrator passwords, such as by deploying Microsoft LAPS. Set appropriate permissions on Active Directory attributes used by LAPS (ms-MCS-AdmPwd and ms-MCS-AdmPwdExpirationTime) per Microsoft’s security recommendations.

    Establish Network Segmentation Between IT and OT Environments

    • Assess the existing network architecture to ensure effective segmentation between the IT and OT networks [CPG 2.F]—this process should evaluate both logical and physical segmentation, ensuring clear boundaries between IT and OT assets.
      • Use NIST SP 800-82 Rev. 3 (Guide to OT Security) and International Electrotechnical Commission (IEC) 62443 standards as guides for network segmentation best practices.
      • Network segmentation is essential for containing breaches within isolated segments and preventing them from spreading across networks. Depending on your environment, consider implementing the following segmentation:
        • Implement VLAN segmentation with inter-VLAN access controls.
        • Create separate VLANs for IT and OT systems, specifically isolating OT components such as SCADA systems from IT network VLANs.
        • Configure inter-VLAN access controls, including Layer 3 ACLs, to restrict traffic between IT and SCADA VLANs.
        • Deploy firewalls with application-layer filtering capabilities to monitor and control data flow between the VLANs, ensuring that only authorized protocols and devices can communicate across segments.
    • Implement a demilitarized zone (DMZ) between IT and OT environments to provide an additional security layer.
      • Position firewalls at both the IT-DMZ and OT-DMZ boundaries to filter traffic and enforce strict communication policies.
      • Configure the DMZ to act as an intermediary, with only essential communications permitted between IT and OT networks.
      • Ensure the DMZ hosts shared services (e.g., bastion hosts, jump servers, or data historians) that require limited interaction with both environments, with access controls and monitoring in place.
    • Consider a full network re-architecture if current segmentation methods cannot effectively separate IT and OT networks.
      • Collaborate with cybersecurity and network experts to design an architecture that meets ICS-specific security requirements—this redesign may involve transitioning to a micro-segmented or zero trust architecture, which includes strict identity verification for all users and devices attempting to access OT assets.[3]
    • Implement unidirectional gateways (data diodes) where appropriate to prevent bidirectional communication.
    • Keep network diagrams, configuration files, and asset inventories up to date.
    • Regularly test segmentation controls to validate their effectiveness in restricting unauthorized access by conducting penetration testing and security assessments.
      • Include simulated breach scenarios to confirm that segmentation contains threats within isolated zones.
      • Ensure compliance with NIST SP 800-53 Rev. 5 Control AC-4 (Information Flow Enforcement) to align segmentation measures with best practices for controlled information flow.

    Prevent Unauthorized Access via Port 21

    • Disable File Transfer Protocol (FTP) services on SCADA devices and servers if they are not required. Replace FTP with secure alternatives, such as SSH FTP (SFTP) or FTP over TLS/SSL (FTPS).
    • Block inbound and outbound FTP traffic on port 21 using firewalls and ACLs.
      • Implement restrictive ACL policies at network boundaries to control FTP access across all network layers.
      • As outlined in CIS Control 9.2 (Limit Unnecessary Ports, Protocols, and Services), close any unused ports to strengthen network defenses.
    • Implement IDS/Intrusion Prevention System (IPS) technologies to monitor traffic between the IT network and SCADA VLAN, use signature and anomaly detection, and integrate IDS/IPS with a SIEM system for centralized monitoring.
    • Enhance authentication and encryption mechanisms. Require MFA for SCADA access, use secure remote access technologies when necessary, securely encrypt communications (using protocols such as TLS 1.2 or higher, preferably TLS 1.3), and establish VPN tunnels to communicate between IT networks and SCADA systems.
    • Perform network traffic filtering and deep packet inspection.
      • Use SCADA-aware firewalls capable of understanding SCADA protocols and inspecting and filtering traffic at the application layer.
      • Only allowlist authorized protocols and command structures to SCADA operations. Use one-way communication devices to prevent data from flowing back into the SCADA network.

    Establish Secure Bastion Hosts for OT Network Access

    • Ensure bastion hosts are dedicated secure access points exclusively used to access the OT network and deployed as exclusive management gateways for all devices within a network.
      • Make bastion hosts the single access points for conducting all administrative tasks, system management, and configuration changes; this centralizes access control and ensures any interaction with the OT system passes through a rigorously monitored and secure environment, minimizing the potential for unauthorized access.
    • Do not allow staff to use bastion hosts as regular workstations.
      • Provide staff with separate workstations for accessing email, internet browsing, etc., on the IT network.
      • Establish and enforce policies that prohibit non-administrative activities on bastion hosts, ensuring they remain dedicated to OT network access.
    • Regularly audit and monitor bastion hosts to maintain security integrity, prevent unauthorized use, and quickly address any vulnerabilities or policy non-compliance.
    • Configure comprehensive logging of all activities on bastion hosts, including authentication attempts, command executions, configuration changes, and file transfers. Aggregate logs into a SIEM.
    • Isolate bastion hosts from the IT network; bastion hosts should reside in a separate security zone with restricted communication pathways (see CISA’s infographic on Layering Network Security Through Segmentation).
      • Deploy bastion hosts in a DMZ, imposing physical and logical isolation from other networks.
      • Configure firewalls between the IT network, bastion hosts, and the OT network, enforcing strict access control policies to allow only necessary traffic.
    • Ensure secure configuration and hardening of bastion hosts: Comply with NIST SP 800-123 and CIS Benchmarks and CNSSI 4009-2015, remove nonessential applications and services to reduce the attack surface, configure system settings to be secure, conduct effective patch management, enforce the principle of least functionality, and disable unused ports and protocols.
    • Implement access control policies: remove any access permissions to the OT network from IT workstations and ensure only bastion hosts have access to the OT network.
      • Implement NAC solutions to enforce policy-driven access control decisions based on device compliance and user authentication to provide dynamic access control and real-time visibility into the devices on the network.
    • Equip each bastion host with robust authentication mechanisms, including phishing resistant MFA [CPG 2.H], to verify the identity of users accessing the network.
      • Align with AAL3 as defined in NIST SP 800-63B. AAL3 requires hardware-based authenticators and proof of possession of cryptographic keys through secure authentication protocols.
    • Implement stringent access controls that restrict access to authorized personnel only using RBAC principles, ensuring that personnel can only access information and perform tasks pertinent to their roles and duties. This reduces the risk of internal threats or lateral movement and prevents unauthorized access.
    • Securely configure remote access tools, including by using secure protocols and disabling remote access tools on IT workstations to the OT network, enforcing that all remote access occurs through bastion hosts.
      • Disable insecure protocols like Telnet and unencrypted VNC to prevent interception and unauthorized access.
      • Log all remote access sessions and monitor for unauthorized or anomalous activities.

    Implement Comprehensive Logging, Log Retention, and Analysis

    • Implement comprehensive and verbose (i.e., detailed) logging across all systems, including workstations, servers, network devices, and security appliances [CPG 2.T].
      • Enable logging of critical events such as authentication attempts, command-line executions with command arguments (Event ID 4688), and network connections.
    • Aggregate logs in an out-of-band, centralized location [CPG 2.U] where adversaries cannot tamper with them, such as a dedicated SIEM, in order to facilitate behavior analytics, anomaly detection, and proactive threat hunting [CPG 2.T, 2.U]. For more information on behavior- and anomaly-based detection techniques, see joint guidance Identifying and Mitigating Living off the Land.
    • Ensure comprehensive logging on bastion hosts for all activities. Capture detailed records of login attempts [CPG 2.G], commands executed (with command arguments enabled), configurations changed, and files transferred.
    • Continuously monitor logs for early detection of anomalous activities. Configure the SIEM to generate automatic alerts for suspicious activity and implement behavior analysis techniques to detect anomalies.
    • Securely store log backups and use tamper resistant storage [CPG 2.U] to prevent a threat actor from altering or purging logs to conceal malicious activity.

    For additional guidance on logging, see joint guidance Best Practices for Event Logging and Threat Detection.

    Securely Configure HTTPS Bindings and LocalSqlServer Connection String

    • Enforce both client certificate verification and secure renegotiation in IIS by configuring the sslFlags setting to “3” in the ApplicationHost.config file. Setting sslFlags=“3” requires clients to present valid X.509 certificates for authentication and implements the TLS Renegotiation Indication Extension (RFC 5746). To implement this, perform the following steps:
      • Locate the element for the HTTPS site within ApplicationHost.config.
      • Set the sslFlags attribute to “3”: .
      • Restart IIS to apply the changes: iisreset.
    • Restrict the server to use only secure and up-to-date SSL/TLS protocols and cipher suites.
      • Disable deprecated protocols like SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 to prevent protocol downgrade attacks that compromise the confidentiality and integrity of data.
    • Override the global settings in machine.config by modifying each application’s web.config file to define its own connection strings and providers. This isolates applications at the database level and allows for tailored security configurations for each application.
    • Create dedicated SQL Server database accounts for each application with permissions limited to necessary operations (e.g., SELECT, INSERT, UPDATE), and avoid granting excessive privileges.
      • Do not assign roles like db_owner or sysadmin to application accounts. This reduces the risk of privilege escalation and enhances accountability through segregated access logs.
    • Use machine.config only for configurations that must be applied globally across all applications on the server.
      • Audit the machine.config file to ensure no application-specific settings are present.

    Enforce Strong Password Policies

    • Implement a system-enforced policy that requires a minimum password length of 15 or more characters for all password-protected IT assets and all OT assets, when technically feasible [CPG 2.B].
      • Consider leveraging passphrases and password managers to make it easier for users to maintain sufficiently long passwords.
    • In instances where minimum password lengths are not technically feasible, apply and record compensating controls, such as rate-limiting login attempts, account lockout thresholds, and strong network segmentation. Prioritize these systems for upgrade or replacement.
    • Implement MFA [CPG 2.H] in addition to strong passwords (i.e., passwords 15 characters or longer).

    Additional Mitigation Recommendations to Strengthen Cybersecurity

    CISA and USCG recommend critical infrastructure organizations implement the following additional mitigations (not tied to specific findings from the engagement) to improve the cybersecurity of their IT and OT environments:

    • Secure RDP from the IT to OT environments by deploying dedicated VPNs for all remote interactions with the OT network. Using RDP without strong authentication practices can lead to credential theft. Additionally, RDP does not inherently segregate or closely monitor user sessions, which can allow a compromised session to affect other parts of the network.
      • Deploy VPNs with strong encryption protocols such as SSL/TLS or Internet Protocol Security (IPsec) [CPG 2.K] to safeguard data integrity and confidentiality; use MFA [CPG 2.H] at all VPN access points to ensure only authorized personnel can gain access.
      • Configure VPN gateways to perform rigorous security checks and manage traffic destined for the OT network, ensuring comprehensive validation of all communications through pre-defined security policies.
        • VPN gateways should function as the primary enforcement points for access controls, scrutinizing every data packet to detect and block unauthorized access attempts.
      • Align the VPN traffic monitoring with the DMZ’s capabilities to regulate and inspect the data flow between IT and OT environments.
      • As part of the broader network architecture review, ensure the VPN infrastructure is correctly segmented from other network resources [CPG 2.F] to prevent any spillover effects from the IT environment to the OT network, containing potential breaches within isolated network zones.
      • Within the VPN configuration, enforce strict routing rules that require all remote access requests to pass through the DMZ and be authenticated by bastion hosts. This minimizes the risk of unauthorized access and ensures that all remote interactions with the OT network are monitored and controlled.
    • If wireless technology is employed within the OT environment, implement Wi-fi Protected Access 3 (WPA3)-Enterprise encryption with strong authentication protocols like Extensible Authentication Protocol (EAP)-TLS to ensure data confidentiality and integrity.
      • Deploy and continuously monitor Wireless Intrusion Prevention Systems (WIPS) to detect, prevent, and respond to unauthorized access attempts and anomalous activities within the wireless network infrastructure.
      • Disable unnecessary features like Service Set Identifier (SSID) broadcasting and peer-to-peer networking, enable Media Access Control (MAC) filtering as an additional layer, and keep wireless firmware updated.

    Validate Security Controls

    In addition to applying mitigations, CISA and USCG recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA and USCG recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 9).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program—including people, processes, and technologies—based on the data generated by this process.

    CISA and USCG recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Contact Information

    Critical infrastructure organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

    Additional Resources

    For more information on improving cyber hygiene for critical infrastructure IT and OT environments, please see the following additional resources authored by CISA, CGCYBER, and international partners:

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. CISA and USCG do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and USCG.

    Version History

    July 31, 2025: Initial version.

    Appendix: MITRE ATT&CK Tactics and Techniques

    See Table 1 to Table 9 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 1: Initial Access
    Technique Title ID Use
    Valid Accounts T1078 Malicious actors could use access to valid accounts for access to IT and OT networks.
    Valid Accounts: Local Accounts T1078.003 Threat actors could use credentials obtained for local administrator accounts to gain administrator access to workstations or services that use the account.
    Account Manipulation T1098 Malicious actors could modify existing accounts or create new accounts to maintain access or escalate privileges. 
    Table 2: Execution
    Technique Title ID Use
    Command and Scripting Interpreter  T1059 Malicious actors could use script interpreters like PowerShell to execute commands and scripts. 
    Table 3: Persistence
    Technique Title ID Use
    Boot or Autostart Execution T1547 Malicious actors could configure autostart execution paths to ensure persistence.
    Hijack Execution Flow T1574 Malicious actors could hijack the execution flow of applications and inject malicious code.
    Table 4: Privilege Escalation
    Technique Title ID Use
    Domain or Tenant Policy Modification T1484 Malicious actors could modify domain policies to escalate privileges or evade defenses.
    Table 5: Defense Evasion
    Technique Title ID Use
    Modify Registry T1112 Malicious actors could install malicious browser extensions on compromised systems.
    Impair Defenses: Downgrade Attack T1562.010 Malicious actors could exploit vulnerabilities in older systems to force a downgrade to a less secure mode of operation.
    Table 6: Credential Access
    Technique Title ID Use
    Unsecured Credentials: Credentials in Files T1552.001 Malicious actors could search for and exploit credentials stored in unsecured files. 
    OS Credential Dumping T1003 Malicious actors could extract credentials from memory or storage from unsecured workstations.
    Adversary-in-the-Middle T1557 Malicious actors could position themselves between networked devices to intercept credentials and other data. 
    Brute Force: Password Guessing T1110.001 Malicious actors could systematically guess possible passwords.
    Brute Force: Password Cracking T1110.002 Malicious actors could recover plaintext credentials after obtaining password hashes or other similar credential material.
    Brute Force: Password Spraying T1110.003 Malicious actors could attempt to use a common password against different accounts to try to obtain account access. 
    Brute Force: Credential Stuffing T1110.004 Malicious actors could try to use credentials gained from an unrelated account to gain access to a desired account in the victim’s environment. 
    Table 7: Discovery
    Technique Title ID Use
    System Network Connections Discovery T1049 Malicious actors could map network connections to identify paths to OT systems from an unsecured IT workstation with access to the OT network. 
    System Network Configuration Discovery T1016 Malicious actors could use an unsecured workstation to discover network configurations.
    Table 8: Lateral Movement
    Technique Title ID Use
    Remote Services: Remote Desktop Protocol T1021.001 Malicious actors could use valid credentials to establish an RDP connection to access a workstation. 
    Remote Services: SSH T1021.004 Malicious actors could use valid accounts to establish an SSH connection to a workstation.
    Table 9: Command and Control
    Technique Title ID Use
    Application Layer Protocol T1071 Malicious actors could use application layer protocols to communicate with systems they compromised while blending in with existing network traffic. 

    MIL Security OSI

  • MIL-OSI USA: Congressman Jonathan L. Jackson Commemorates the Illustrious Career of Congressman Danny Davis

    Source: United States House of Representatives – Representative Jonathan Jackson – Illinois (1st District)

    FOR IMMEDIATE RELEASE

    Congressman Jonathan L. Jackson Commemorates the Illustrious Career of Congressman Danny Davis

    WASHINGTON, D.C. – Congressman Jonathan L. Jackson today issued the following statement regarding Congressman Danny Davis’s announcement that he will not seek reelection, marking the conclusion of a truly remarkable career in public service:

    “It is with profound respect and admiration that we acknowledge the impending retirement of my esteemed colleague, Congressman Danny Davis. For decades, Congressman Davis has served the people of Illinois’ 7th Congressional District with unparalleled dedication, embodying a spirit of advocacy that deeply mirrors the African experience of perseverance and progress.

    Chicago is fortunate to call Danny Davis our very own. His journey, beginning in a one-room schoolhouse in Arkansas, is a testament to his extraordinary grit and determination. Rising from such humble beginnings to earn a Ph.D. and become a revered legislator in the halls of Congress, his story is an inspiration to us all. He holds the unique distinction as the only Black person from Arkansas to be in Congress, a powerful symbol of breaking barriers and achieving the impossible.

    Congressman Davis has consistently been a champion for civil rights, affordable housing, prison reentry, and healthcare. His unwavering commitment to his constituents has made him a highest vote getter time and again, reflecting the deep trust and affection he has earned from those he serves. He carries a profound legacy of greatness, built on tireless work and a genuine desire to uplift communities.

    Beyond his legislative achievements, Congressman Davis has always conducted himself with immense grace and undeniable charm. He has been a mentor, a leader, and a beacon of hope for countless individuals. His presence in Congress will be deeply missed, but his impact will resonate for generations.

    We extend our deepest gratitude to Congressman Davis for his exceptional service and wish him all the best in his well-deserved retirement. His contributions to our nation and to the city of Chicago are indelible.”

    ###

    MIL OSI USA News

  • MIL-OSI Russia: Tatyana Golikova held a meeting on the national project “Personnel”.

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    Deputy Prime Minister Tatyana Golikova held a meeting of the project committee for the national project “Personnel”. The meeting was attended by Minister of Labor and Social Protection Anton Kotyakov, head of the State Council commission on “Personnel”, Governor of the Kaluga Region Vladislav Shapsha, representatives of the Ministry of Education and Science, the Ministry of Education, the Ministry of Finance, the Federal Agency for Youth Affairs and others. The meeting participants discussed the results of the national project implementation in the first half of 2025, as well as the federal projects included in it.

    As noted by Tatyana Golikova, four federal projects are being implemented within the framework of the national project “Personnel”: “Labor Market Management”, “Active Measures to Promote Employment”, “Education for the Labor Market” and “The Labor Person”. Federal projects include measures to actively involve graduates of educational institutions in employment, synchronization of modern qualification requirements in the spheres of labor and education, which will allow for more efficient and high-quality training of personnel for the needs of the economy. In addition, vocational training and additional vocational education are provided for people experiencing difficulties in finding a job, as well as increasing the labor mobility of citizens and the popularity of blue-collar jobs.

    As part of the “Labor Market Management” project, employment centers are being modernized into modern “Work of Russia” personnel centers. They are becoming full-fledged partners of employers in building teams and personal consultants for those wishing to build a career. In total, over 480 centers are planned to be modernized this year; the modernization of the center in Omsk Oblast has already been completed. By the end of 2028, the entire employment service system in the country will be updated. Over 2.5 thousand employees of the employment service have been trained; in total, about 6 thousand employees will be trained this year.

    All regions have approved regional plans to combat illegal employment for the period 2025–2027.

    As part of the implementation of the federal project “Education for the Labor Market”, national rankings of universities and colleges for graduate employment were published on June 15. Since the beginning of the year, a pilot test of methodological recommendations for organizing a system of professional orientation and routing of students and graduates has been conducted in 11 regions. The pilot experience will be replicated throughout the country.

    Preparatory work is underway to modernize career centers. In total, 162 career centers aimed at facilitating graduate employment are planned to be modernized in 2025.

    Under the federal project “Active measures to promote employment” within the framework of the implementation of the vocational training program for certain categories of citizens, 44.2 thousand applications were approved, and 20.7 thousand people were sent for training.

    Within the framework of the federal project “Working Man”, events are planned for the competition “Best in Profession”, the All-Russian Employment Fair, and the All-Russian Competition of Best Practices in Youth Employment.

    On June 27, the federal stage of the All-Russian Job Fair took place. 454 thousand people took part in it. In total, over 529 thousand vacancies were presented by almost 23 thousand employers.

    The regional stages of the “Best in Profession” competition are coming to an end in the regions – a total of 210 regional stages are planned in 73 regions, 183 stages have already been held. The award ceremony will take place in Moscow in early December.

    From June 23 to August 31, the application submission stage for the All-Russian competition of best youth employment practices is underway.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: Government meeting.

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    On the agenda: the results of a working trip to the Far Eastern and Siberian Federal Districts, writing off debt on budget loans to regions, and increasing the grace period for mortgage payments upon the birth of a second child.

    Opening remarks by Mikhail Mishustin:

    Good afternoon, dear colleagues!

    Before we move on to the agenda of today’s Government meeting, I would like to talk about the results of the trip to Omsk Oblast, which became the final point of our major working trip to the Far Eastern and Siberian Federal Districts.

    The region is developing. Significant infrastructure is being actively built, including transport infrastructure, which is part of the high-speed automobile route “Russia” – from St. Petersburg to Vladivostok. It is necessary to complete all planned work within the established deadlines.

    We visited several healthcare and educational facilities. We made a number of decisions on the hospital and clinic for war veterans so that participants in the special military operation could undergo treatment and recovery in comfortable conditions. Comprehensive support for our heroes is one of the key priorities of the Government.

    Agenda of the meeting

    Materials for the Government meeting on July 31, 2025

    We got acquainted with the course of the admission campaign at Omsk University. We will help with equipping its main building with educational equipment. We will allocate additional funds for major repairs of dormitories.

    The region presented its initiative to create an inter-university campus. The modern educational space will become a point of attraction for talented young people. This will be decided within the framework of the competition of the Ministry of Science and Higher Education.

    Participants of the meeting

    List of participants of the Government meeting, July 31, 2025

    In September, the first branch of a foreign university in our country, the Kazakh National University, will begin teaching students in Omsk. Almost everything is ready for its opening. We will continue to strengthen cooperation between the two countries in the field of higher education and scientific research.

    In the Amur Region, we inspected how the reconstruction of the airport complex is being carried out, the expansion of the road that leads to the airport – the most important objects for the region and residents. Here I would ask, Vitaly Gennadyevich (addressing V. Savelyev), you, the Ministry of Transport to monitor the timing and progress of the work.

    We also visited the customs and logistics terminal and the checkpoint on the border with China – Kani-Kurgan. I know how Vitaly Gennadyevich was actively involved in this. This will be a model checkpoint, to which we distribute, among other things, technological solutions built on domestic software products.

    Completion of its construction will increase the volume of transportation on the new bridge crossing over the Amur River. This is only part, I will say again, of the large work on developing cross-border logistics. Almost 180 billion rubles have been allocated for the modernization of points in the next three years, taking into account the prospective trade turnover and priority areas for the country.

    The most important thing now is that plans for launching such facilities in the region and throughout the country as a whole are implemented clearly and on time.

    In the Trans-Baikal Territory, in Chita, a separate meeting was held on issues of grain export development.

    Our own production covers our domestic needs. Let me remind you that Russia is a world leader in wheat and barley supplies abroad. The potential is even higher. It is important to fully realize it. We will continue to support our farmers, expand port capacities, and create the necessary infrastructure for both storage and transportation of products.

    Oksana Nikolaevna (addressing O. Lut), I would like to ask you to create additional opportunities for domestic agricultural producers to enter foreign markets.

    I know there are a number of questions. I also want to tell the members of the Government that we need to help our exporters in this regard.

    This is also necessary to increase the competitiveness of our economy and to fulfill the task approved by the President to increase exports of the Russian agricultural sector.

    We also inspected the perinatal center in Chita. The national project “Family” provides for its re-equipment already this year. Equipment is being received so that both mothers and babies receive modern treatment.

    This work continues throughout the country. In just six years, advanced equipment will be delivered to 142 perinatal centers, including nine federal ones.

    In Transbaikalia, major repairs are also being carried out at medical institutions, and a number of new ones are being created.

    Mikhail Albertovich (addressing M. Murashko), as we agreed, we need to monitor the construction deadlines to ensure their timely opening. This is very important for people. We need to interact more actively with colleagues from the region in this area.

    Issues of improving healthcare infrastructure were also given attention during a working visit to the Altai Republic. There, under the national project “Long and Active Life”, a hospital admissions department was built using federal funds. High-tech medical care will become even more accessible to local residents. It is in demand there.

    With the head of this Russian subject, Andrey Anatolyevich Turchak, we discussed in detail the progress of the implementation of the individual program of socio-economic development, which, by decision of the President, was formed until 2030.

    We also looked separately at how projects that are important for people are being implemented, including those to strengthen transport connectivity. Roads, bridges, and crossings are being repaired. The airport is being modernized. This is also important given the significant growth in tourist flow to this region. Travelers come there from all over Russia and from abroad. In early July, a separate domestic terminal opened in Gorno-Altaisk, and last week, a new international one, in line with all standards. Its first visitors were guests of the International Environmental Conference, in which we took part.

    Together with our colleagues – heads of government of a number of countries, during the plenary session we exchanged a vision of joint work to protect the environment in the interests of the present and future generations. We will strengthen cooperation in this important area.

    In our country, environmental well-being has been approved by the President as one of the national goals. We will continue to do everything necessary to achieve it. First of all, if we list the priorities, this is the conservation of forests, water bodies, rare species of animals and plants, the development of protected areas. We will also continue to form a closed-loop economy.

    The Ministry of Natural Resources needs to expand cooperation with foreign partners in all these areas. Establish an exchange of best practices, create conditions for ecotourism – all the colleagues who spoke spoke about this – so that more people could see pristine nature.

    And I would also like to say that the topic of ecology and environmental protection is very important for our colleagues from the CIS countries.

    This topic is also relevant for the Altai Territory. We discussed this in detail with Governor Viktor Petrovich Tomenko. In the region, with the support of the federal budget, transport accessibility is being improved, and the infrastructure needed for travelers is being formed. Without a doubt, this work should be continued.

    Colleagues, I ask all area curators to constantly monitor how the implementation of projects is proceeding locally.

    I would like to separately mention one important issue that I discussed with the governors of the Amur Region and the Zabaikalsky Krai – emergency situations caused by forest fires.

    The situation has now stabilized. But the fight against the fire required the involvement of additional forces – specialists, heavy equipment, aviation. In connection with which, of course, the costs of the necessary measures have increased. An order has been prepared to provide almost 1.4 billion rubles to these regions, as well as to Krasnoyarsk Krai and the Republic of Buryatia. These funds will be used to compensate for the costs of extinguishing the fires.

    It is difficult to predict fire situations and their intensity accurately, but I ask the leadership of regions where such cases are not uncommon to pay special attention to prevention. There should be no threats to people’s health and safety. And at the same time, of course, it is necessary to monitor the efficiency of spending budget funds.

    On to another topic.

    Document

    The government has written off debt on budget loans to eight regions that have implemented infrastructure projects

    The government continues to stimulate economic development in Russian regions. To do this, we are reducing the financial burden, primarily for those who actively attract investment and build infrastructure. For them, on the instructions of the President, we have provided the opportunity to write off two-thirds of the debt on budget loans. The corresponding rules were adopted in February.

    Today, we will write off such loans for eight more regions in the amount of over 47.27 billion rubles. These are the republics of Kalmykia and Karelia, as well as the Voronezh, Kirov, Kemerovo, Moscow, Smolensk and Tver regions. They previously allocated funds for the implementation of national projects, improvement of housing and utilities, resettlement of citizens from dilapidated housing, support for industry and other purposes.

    Such a decision on debts should have a positive impact on the budget system of these territories, on the dynamics of their development, which will contribute to the fulfillment of many tasks, including social issues.

    And also – about supporting families with children. This is one of the key priorities of the Government’s work, which the head of state has repeatedly drawn attention to. A number of measures have been taken on his instructions. Today we will supplement them with another one.

    A bill has been prepared that is intended to reduce the burden on parents paying off a mortgage. Currently, when a child is born, the borrower is entitled to a six-month credit holiday if his or her income has decreased by more than 20%, and the costs of servicing the loan exceed 40% of average monthly income.

    Now, for those who have given birth to or adopted a second or subsequent child, the grace period will be increased to one and a half years. At the same time, interest on the principal debt will be charged only from the 7th to the 18th month. And they can be paid not immediately, but after the obligations under the current agreement are paid off. In equal parts and with the same frequency as before.

    This will support families during the most difficult period, when one of the parents is caring for a child and is unable to go to work. And of course, we expect that together with other current measures, this will affect the demographic situation in the country as a whole.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: Marat Khusnullin: About 700 km of roads to sports facilities will be updated in 2025 thanks to the national project “Infrastructure for Life”

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    Thanks to the national project “Infrastructure for Life”, work continues on upgrading roads leading to stadiums, clubs, youth schools and other sports facilities. In total, this year it is planned to upgrade about 700 km of such sections of regional and local roads, Deputy Prime Minister Marat Khusnullin reported.

    “Updating roads to sports facilities is an important part of creating a comfortable environment. This helps ensure convenient and unimpeded access to sports facilities for thousands of residents. First of all, this is important for popularizing a healthy lifestyle. Thanks to the national project “Infrastructure for Life”, in 2025 we plan to bring 225 sections of the regional and local road network leading to stadiums, clubs, children’s and youth schools and other sports facilities to a regulatory state – this is 695 km of regional and local roads,” said Marat Khusnullin.

    Sporting events often attract large crowds. Good road conditions ensure safe traffic and pedestrian traffic, and reduce the risk of accidents and injuries.

    “In 2024 alone, 270 road sections were updated under the already completed national project “Safe High-Quality Roads”. Their total length was more than 800 km. Sports facilities are visited by people of all ages, including children. Therefore, we pay special attention to safety elements: we equip the necessary signs, traffic lights, sidewalks and pedestrian crossings,” said Minister of Transport Andrei Nikitin.

    In Bryansk, Menzhinsky Street is undergoing a major overhaul along its entire length – 2.3 km. This is the route to the Spartak stadium, which was renovated in 2020. The stadium is home to a sports school of the same name, where more than 200 young football players study. The road surface is being renovated, sidewalks and storm drains are being installed at the site. To ensure traffic safety, a pedestrian fence, outdoor electric lighting lines, speed bumps, bus stops, public transport access pockets and a new bus shelter will be installed, as well as new road signs, paint and thermoplastic markings with reflective elements.

    In the Bolsheglushitsky District of the Samara Region, a 1.4 km section of the access road to the village of Bolshaya Glushitsa is being overhauled. The road leads to the Yubileiny sports complex, which houses a structural division of the children’s and youth sports school based at Secondary Comprehensive School No. 2. There are 10 sports sections here. The school is attended by more than 150 children aged 5 to 18.

    Another significant “sports” route that is being repaired under the national project is a 9.2 km section of the Moscow Highway in Samara. This is part of the route to the Olympic Reserve Sports School No. 7 for Cycling named after Honored Coach of the USSR V.P. Petrov. More than 370 athletes undergo basic training here.

    The road to the sports facility is also being renovated in the Bogatovsky District. A section of the Bogatoye – Samara – Orenburg highway, almost 10 km long, is being repaired here. The highway leads to the district center – the village of Bogatoye. A children’s and youth sports school is located here on the basis of a secondary comprehensive school. 550 children are involved in sections in several areas: football, volleyball and judo. In addition to local children, the school is attended by children from nearby villages, including Andreyevka and Vilovatoye.

    In total, 10 road facilities leading to 25 sports facilities, with a total length of 80.87 km, will be renovated in the Samara Region under the national project “Infrastructure for Life” this year.

    In Krasnoyarsk, a 3.3 km section of Partizana Zheleznyaka Street is being repaired this year under the national project “Infrastructure for Life”. The street leads to the Sokol Ice Palace. Children’s and youth teams of the sports school train here in hockey. In addition, sports matches and figure skating competitions are held, which are attended by thousands of spectators from all over the region.

    Also this year, a 3.6 km section of Sverdlovskaya Street from Aleksandra Matrosova Street to house No. 73 was renovated. Now residents and guests of Krasnoyarsk can comfortably get to the Bobrovy Log ski resort, which includes trails of varying difficulty, a snowboard park, a cross-country ski route and other locations. This is a popular place for active winter recreation. More than 550 thousand residents and guests of the city visit it annually.

    In total, 12 sections of roads to sports facilities with a total length of more than 20 km will be updated in Krasnoyarsk Krai under the national project “Infrastructure for Life” this year.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI United Nations: Angola protests: UN urges restraint, investigations into deaths

    Source: United Nations MIL OSI

    The Office of the UN High Commissioner for Human Rights (OHCHR) on Thursday urged Angolan authorities to conduct prompt, thorough and independent investigations into the deaths, as well as the reported use of excessive force during the demonstrations.

    Unverified footage suggests that security forces used live ammunition and tear gas to disperse protesters, which points to an unnecessary and disproportionate use of force,” OHCHR spokesperson Thameen Al-Kheetan said.

    He added that while some demonstrators resorted to violence and looting, any force used by authorities must comply with international human rights standards.

    Any individuals who may have been arbitrarily detained must be immediately released.

    Rapid escalation in situation

    The protests began on Monday as a strike by minibus taxi drivers over a one-third rise in diesel prices, part of a government effort to reduce fuel subsidies. According to media reports, the demonstrations quickly spread, becoming one of Angola’s most disruptive protest waves in recent years.

    Government officials reported that at least one police officer was among those killed. Nearly 200 people are said to have been injured, and shops and vehicles reportedly vandalized – mostly in the capital, Luanda.

    Sporadic gunfire was also reported in parts of the city earlier in the week, and emergency services were overwhelmed. Many businesses remained shuttered Thursday and hospitals reportedly struggled to cope with the number of casualties.

    Ensure rights protection

    OHCHR emphasised that while authorities have a responsibility to maintain public order, they must do so in a way that protects human rights.

    All protesters taking to the streets to express their opinions should do so peacefully,” said Mr. Al-Kheetan. “All human rights violations must be investigated and those responsible held accountable.

    The UN rights office also reiterated the importance of safeguarding fundamental freedoms, including the rights to life, expression and peaceful assembly, in any law enforcement response.

    MIL OSI United Nations News

  • MIL-OSI USA: LEADER JEFFRIES STATEMENT ONRETIREMENT ANNOUNCEMENT OFREP. DANNY DAVIS

    Source: United States House of Representatives – Congressman Hakeem Jeffries (8th District of New York)

    Today, Democratic Leader Hakeem Jeffries released the following statement after Congressman Danny Davis announced he would not seek another term in the House of Representatives:

    Throughout his historic career as an educator and community organizer and later as a distinguished public servant, Congressman Davis has never wavered in his commitment to serving those back home. Whether on the Cook County Board of Commissioners, the Chicago City Council or in the United States Congress, Congressman Davis has been a tremendous champion for racial, social and economic justice and a fierce fighter for the people he is privileged to represent in Chicago. 

    For more than three decades in the Congress, including as a Member of the exclusive Ways and Means Committee and the top Democrat on the Worker and Family Support Subcommittee, Danny has worked to ensure our tax code lifts up the least, lost and left-behind in Chicago and across our nation. He introduced and ushered through the transformative Second Chance Act to help returning citizens with services to rebuild their futures. Danny has been a co-chair and leader of the Congressional Caucus on Black Men and Boys where he advocated for solutions to systemic racism, police brutality and income inequality.  

    Danny forged a remarkable legacy and made clear his commitment to public service. The House Democratic Caucus family will miss Danny deeply and wish him and his family the best in this next chapter. 

    ###

    MIL OSI USA News

  • MIL-OSI Asia-Pac: Hong Kong Science Museum’s new exhibition to showcase country’s achievements in aerospace, aviation and navigation (with photos)

    Source: Hong Kong Government special administrative region – 4

         Jointly presented by the Hong Kong Special Administrative Region Government and the China National Space Administration (CNSA), the “Bank of China (Hong Kong) Presents: National Development and Achievements Series – Endless Exploration: The Journey of Chinese Aerospace, Aviation and Navigation” exhibition will be launched at the Hong Kong Science Museum (HKScM) from tomorrow (August 1) to September 7. This is the first time for Hong Kong to showcase the country’s achievements in these three major arenas in the same exhibition. Featuring a rich array of artefacts, models, graphics, videos and interactive exhibits, the exhibition not only presents important developments in relevant fields, but also aims to inspire the public, especially youngsters, with a passion for technological innovation while enhancing national confidence in science and technology.
     
         Addressing the opening ceremony today (July 31), the Chief Secretary for Administration, Mr Chan Kwok-ki, said that the Chang’e-6’s successful return to earth bringing lunar soil samples from the far side of the Moon last year represents a global first, underscoring China’s leading position in lunar exploration. Hong Kong is proactively integrating into national development matters and making significant contributions, with local scientists having the opportunity to participate in major national scientific research projects. These achievements affirm Hong Kong’s unique advantages in contributing to national development with an international vision. He further said that this exhibition showcases the remarkable achievements of the Chang’e lunar exploration programme as well as the country’s remarkable accomplishments in aerospace, aviation and navigation. It also highlights Hong Kong’s role as a cultural hub connecting China with the world, telling the good story of China and promoting patriotism to the public.

         Other officiating guests today included the Chief Engineer of the CNSA, Dr Li Guoping; the First-level Inspector of the Department of Educational, Scientific and Technological Affairs of the Liaison Office of the Central People’s Government in the Hong Kong Special Administrative Region, Mr Liu Maozhou; the Vice Chairman and Chief Executive of Bank of China (Hong Kong) Limited, Mr Sun Yu; the Under Secretary for Culture, Sports and Tourism, Mr Raistlin Lau; the Convenor of the Working Group on Patriotic Education under the Constitution and Basic Law Promotion Steering Committee, Legislative Council Member, Dr Starry Lee; the Chairperson of the Science Sub-committee of the Museum Advisory Committee, Professor Alexander Wai; the Director of Leisure and Cultural Services, Ms Manda Chan; and the Museum Director of the HKScM, Mr Patrick Lau.
     
         This exhibition achieves several “firsts”, including the first concurrent display in Hong Kong of lunar soil samples collected from the far side and near side of the Moon by the Chang’e-6 and the Chang’e-5 respectively. Other exhibits debuting in Hong Kong include the Chang’e-6 returner and parachute, seawater samples collected from 10,000 metres under the sea, as well as models of the “three pearls” of the shipbuilding industry, namely an aircraft carrier, a luxury cruise ship and a liquefied natural gas carrier.
     
    Moreover, the HKScM will display large-scale aerospace, aviation and maritime models concurrently, including an approximately 12m-tall 1:5 Long March-5 launch vehicle and a full-size Fendouzhe full-ocean-depth manned submersible with a length of approximately 10m displayed outdoors, as well as a 1:8 model of a Y-20 heavy lifter with a wingspan of approximately 6m displayed indoors for the first time.
     
         Apart from the exhibits from the Mainland, the exhibition also presents Hong Kong’s significant contributions to the space and deep-sea exploration projects of the country. There are also interactive exhibits, namely the “Lunar Base”, the “Zhurong Rover Expedition” and more, for visitors to experience the challenges of building a lunar base and exploring Mars.
     
    Fixed-point guided tours will be provided on Saturdays and Sundays from August 9 to September 7. A series of lectures will be conducted on August 1 and August 4 by experts invited from the Mainland, who will share their knowledge of aviation, aerospace and navigation, as well as the achievements and future plans of the country in related fields. Members of the public are welcome to participate in the tours and lectures on-site. Other activities include experiment classes, workshops and demonstrations for the public to explore the scientific principles behind aviation and deep-sea navigation.
       
         The exhibition is jointly organised by the Leisure and Cultural Services Department and the News Center of the CNSA, as solely sponsored by the Bank of China (Hong Kong) Limited. It is one of the activities of the Chinese Culture Promotion Series. For details of the exhibition and activities, please visit the HKScM website at hk.science.museum/en/web/scm/exhibition/exploration2025.html.

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: DH fully committed to promoting and supporting breastfeeding in support of World Breastfeeding Week (with photos)

    Source: Hong Kong Government special administrative region – 4

    To support World Breastfeeding Week, the Department of Health (DH) today (July 31), in collaboration with the Hospital Authority (HA), the Hong Kong Committee for United Nations Children’s Fund (UNICEF) and the Baby Friendly Hospital Initiative Hong Kong Association, held a celebration event for World Breastfeeding Week 2025 to fully promote and support breastfeeding.
     
    World Breastfeeding Week is observed annually between August 1 and 7. The theme of this year is “Prioritise breastfeeding and create sustainable support systems”, which urges all sectors in the community to attach importance to breastfeeding, collaborate to provide comprehensive support to increase the sustainability of breastfeeding with the aim to enhance overall maternal and child health.
     
    International research shows that breastmilk is the ideal food for infants. Breastmilk is safe, clean and contains antibodies which can help prevent many common childhood illnesses. Breastfed children perform better in intelligence tests, are less likely to become overweight or obese, and are less prone to develop diabetes later in life.
     
    Speaking at the celebration event, the Under Secretary for Health, Dr Cecilia Fan, noted that cross-sector collaboration is crucial in achieving comprehensive support. The Government has long attached importance to the promotion, protection and support for breastfeeding, and has set up a multisectoral Committee on Promotion of Breastfeeding to promote breastfeeding through collaboration and a multipronged approach.
     
    The DH has fully launched and expedited the accreditation process for Baby-Friendly Health Facilities at its Maternal and Child Health Centres (MCHCs). Seven newly accredited Baby-Friendly MCHCs this year received certificates from the Baby Friendly Hospital Initiative Hong Kong Association at the event today. Currently, there are 15 Baby-Friendly MCHCs under the DH, while the remaining 14 MCHCs are undergoing the accreditation process. All eight public hospitals with obstetrics departments under the HA have been accredited as Baby Friendly Hospitals (BFHs). Two private hospitals providing delivery services have also started the accreditation process, with one of them already accredited. The Government encourages more private hospitals to join the BFHs. A dedicated working group under the Committee on Promotion of Breastfeeding has been set up to enhance and reinforce baby friendly measures at hospitals with maternity services. Accredited facilities have to formulate infant feeding policies and action plans, provide relevant training to staff members and continue to monitor the implementation of breastfeeding support measures, etc.
     
    Apart from the healthcare systems, the Government is also committed to creating a breastfeeding-friendly environment. Since early 2019, the Government mandated the provision of babycare and breastfeeding facilities in the newly built government premises for public and staff members’ use. Separately, since 2017, the Government has specified detailed requirements in the Conditions of Sale of new commercial land sale sites, including the area and number of babycare facilities and/or lactation rooms that shall be provided in these commercial development projects. Regarding workplaces, the Government encourages the implementation of the Breastfeeding Friendly Workplace policy. The DH issued guidelines for employers and employees with specific advice on supporting breastfeeding to enable working mothers to continue breastfeeding after returning to work. The Health Bureau, the DH and the Hong Kong Committee for UNICEF jointly launched the large-scale community-based campaign Say Yes to Breastfeeding since 2015 which aims to enhance breastfeeding support among premises and workplaces. 
     
    Comprehensive support is also provided for premature and critically ill babies. Dr Fan expressed that the Hong Kong Breast Milk Bank (HKBMB) which commenced service early this year, provides the best possible nutrition to many clinically needy infants through breast milk donated by selfless lactating mothers. The celebration event also invited breastfeeding families, a peer counsellor and a mother who benefited from the HKBMB, to share their experiences and feelings, with a view to reaffirming the importance of breastfeeding and appealing to family members, the community and workplace to support breastfeeding.
     
    With the start of the World Breastfeeding Week, a series of promotional activities will be launched by the DH, including displaying of publicity materials across the territory, producing a new Announcement in the Public Interest for TV broadcasts and advocating breastfeeding through radio, newspapers, social media and webpages etc.
     
    The Government will continue to encourage all sectors of the community to further promote, protect and support breastfeeding with a view to creating a breastfeeding-friendly environment and enhancing the sustainability of breastfeeding.
     
    Members of the public can visit the thematic website www.fhs.gov.hk/wbw2025/index.html for more information on World Breastfeeding Week 2025.

    MIL OSI Asia Pacific News

  • MIL-OSI USA: Early-Career Spotlight: From Astrophysics to Applied Artificial Intelligence, Hilary Egan Charts a Creative Path Through Science

    Source: US National Renewable Energy Laboratory


    Welcome to the Materials, Chemical, and Computational Science (MCCS) Early-Career Spotlight, a monthly feature showcasing NREL’s early-career researchers’ interests, motivations, and achievements. This month, features Hilary Egan, who has been a data scientist at NREL since 2020.

    When not in the lab solving AI problems, Hilary Egan enjoys outdoor activities like paddleboarding, climbing, and biking. Photo by Hilary Egan, NREL

    For Hilary Egan, a data scientist at NREL, a career in science was not a straight line but rather one shaped by curiosity, adaptability, and a deep interest in computational problem-solving.

    “I was born in Germany to Canadian parents, and we moved around a lot throughout Canada and the United States,” Egan said. “When it came time for college, I landed at Michigan State University, majoring in physics with minors in math and computer science. I dabbled in experimental physics and worked in a laser lab early on, but honestly, I was a little too clumsy for it. I wanted something that connected all my interests.”

    That desire to connect the dots led Egan to computational physics, where she found her stride.

    “I started working at the high-performance computing center on campus and eventually joined an astronomy lab doing computational research—I absolutely loved it,” she said. That experience inspired her to pursue a Ph.D. in astrophysics and planetary science at the University of Colorado Boulder, with a strong focus on computation.

    From Fellowship to National Laboratory Career

    Egan’s graduate work was supported by the U.S. Department of Energy Computational Science Graduate Fellowship, a pivotal experience that introduced her to the national laboratory system.

    “Through the fellowship, I had the opportunity to intern at NREL. I wanted to challenge myself and get outside my comfort zone, and NREL’s mission really resonated with me,” she said. “I was also curious about artificial intelligence (AI), which was just starting to gain momentum. During my internship, I worked on using AI to predict data center loads and align them with renewable energy availability. It was a great experience, and I was lucky to come back to NREL after finishing my Ph.D. I’ve been here ever since.”

    Today, Egan applies her expertise in AI and computational science to a wide range of energy challenges.

    “My work spans applied AI and computational methods across NREL’s mission space—from enhancing energy efficiency in data centers to using AI to accelerate building retrofits to developing autonomous laboratory systems,” she said.

    This year, she is on detail to the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy, where she is helping coordinate an agencywide AI strategy.

    Embracing Growth, in Science and Beyond

    What Egan enjoys most about her work is the constant opportunity to learn.

    “I love getting to be a bit of a scientific dilettante,” she said. “I wasn’t interested in narrowing my focus to one small corner of science for my entire career. At NREL, I get to explore new areas and work with incredibly smart, passionate people who care deeply about the mission. It’s really inspiring.”

    Egan credits strong communication skills as one of the most valuable tools in her professional toolkit.

    “To me, scientific communication means understanding your audience, writing clearly, and giving compelling presentations,” she said. “I’ve developed those skills through everything from taking writing-focused liberal arts courses in college to writing science blogs and even doing community theater. Getting feedback from different audiences is key—it teaches you where the message isn’t landing and why.”

    Outside the lab, Egan brings the same curiosity and enthusiasm to her free time.

    “I’m definitely a serial hobby picker-upper,” she said. “I love climbing, mountain biking, birding, and paddleboarding. I also read constantly, and I’ve spent years playing and coaching competitive ultimate frisbee. Lately, I’ve been sewing and just started pottery classes. I kind of run my free time like a kid at summer camp!”

    From astrophysics to AI-driven energy solutions, Egan exemplifies the spirit of scientific exploration and innovation that drives NREL forward.

    Learn more about NREL’s computational science and AI research.

    MIL OSI USA News

  • MIL-OSI Security: Convicted Felon Pleads Guilty to Gun and Drug Charges

    Source: US FBI

    BUFFALO, N.Y.-U.S. Attorney Michael DiGiacomo announced today that Jeremy Hodge, 39, of Buffalo, NY, pleaded guilty before U.S. District Judge Lawrence J. Vilardo to possession with intent to distribute 40 grams or more of fentanyl and being a felon in possession of a firearm, which carry a mandatory minimum penalty of five years in prison, a maximum of 40 years, and a $5,000,000 fine.

    Assistant U.S. Attorney Jeffrey E. Intravatola, who is handling the case, stated that on April 4, 2025, the FBI executed a search warrant at Hodge’s Ernst Avenue residence, on his vehicle, and person. Law enforcement seized a semi-automatic handgun, ammunition, and drug paraphernalia. Hodge was arrested at the scene. He was previously convicted of felony charges in April 2008 and March 2009, and is legally prohibited from possessing a firearm.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    The plea is the result of an investigation by the Federal Bureau of Investigation Safe Streets Task Force, under the direction of Acting Special Agent-in-Charge Mark Grimm.

    Sentencing is scheduled for December 8, 2025, before Judge Vilardo.

    # # # #

     

    MIL Security OSI

  • MIL-OSI USA: Rep. Dan Goldman Convenes Section 8 & 9 Townhall to Discuss Trump Administration’s Threats to Affordable Housing

    Source: US Congressman Dan Goldman (NY-10)

    Goldman Joined by Representatives from NYCHA, NYC Housing Preservation and Development, and New York State Homes and Community Renewal  

     

    View a Recording of the Event Here 

    New York, NY – Congressman Dan Goldman (NY-10) hosted a Section 8 & 9 townhall at Grand St. Settlement to discuss how the Trump administration’s policies are affecting Section 8 and 9 housing in New York and help inform tenants on how city and state housing agencies may be impacted. The Congressman was joined by representatives from the New York City Housing Authority (NYCHA), New York City Housing Preservation and Development, and New York State Homes and Community Renewal. 

    “Programs like Section 8 and 9 are a vital lifeline for over one million New York residents who are already struggling to make ends meet, and as the Trump administration slashes funding and fires critical staff, I was proud to bring local officials together and give tenants a platform to ask questions and get answers,” Congressman Dan Goldman said. “With New York City set to remain in this administration’s cross-hairs, I will continue working at all levels of government to protect Section 8 and 9 tenants and ensure every single one has the safe, dignified, and affordable housing that they deserve.”  

    Since taking office, the Trump Administration has proposed sweeping changes to federal housing programs like Section 8 and Section 9 that would devastate low-income households. While they have not yet succeeded in enacting the most extreme policies, they’ve already caused serious harm, most notably by gutting HUD’s workforce by 30%. The administration’s budget proposals have called for drastic cuts to rental assistance, a two-year cap on support for able-bodied adults, and expanded work requirements that would jeopardize housing for thousands of working families, caregivers, and students. These changes, if implemented, would lead to mass evictions, overwhelming paperwork burdens, and a significant increase in homelessness—particularly in high-cost areas like New York City. Fortunately, Congress has so far rejected many of these proposals, but the threat remains real and ongoing. 

    In March, Goldman led 13 of his New York Delegation colleagues in sending a letter to Housing and Urban Development Secretary Scott Turner demanding that he reverse the Trump Administration’s decision to drastically reduce staffing at regional HUD field offices. The Administration’s “fork in the road” scheme and their potentially illegal firing of probationary workers had already left HUD field offices short-staffed and vulnerable. 

    ### 

    MIL OSI USA News

  • MIL-OSI USA: Rep. Dan Goldman’s Bipartisan Legislation Supporting Families of Fallen Law Enforcement Officers Passes Senate

    Source: US Congressman Dan Goldman (NY-10)

    Senate Adoption Tees Up Final Passage by the House in the Fall 

    ‘Chief Herbert D. Proffitt Act’ Ensures Those Who Give the Ultimate Sacrifice Are Not Unjustly Denied Benefits 

    Read the Bill Here 

    Washington, D.C. – Congressman Dan Goldman (NY-10) today celebrated the Senate’s passage of his bipartisan ‘Chief Herbert D. Proffitt Act,’ which would ensure the families of law enforcement officers who are killed as a result of their work on behalf of their communities are not unjustly denied benefits due to arbitrary retirement status restrictions. Under current law, families of officers who have retired but are later targeted and killed because of their past service are denied death benefits under the Public Safety Officers’ (PSOB) program. The unanimous Senate vote sets the legislation on a glide path to final passage by the House when members come back in session in September. Congressman Goldman introduced the legislation with Congressman Barr (KY-06) in February.  

    “We have an obligation to care for those who pay the ultimate price while serving in the line of duty, even after they have retired,” Congressman Dan Goldman said. “At a time when partisan gridlock is grinding Congress to a halt, I’m encouraged that both parties came together to pass this commonsense legislation honoring our fallen heroes. I urge Republican leadership to bring this bill to the House Floor in September and ensure that any law enforcement officers killed or injured in the line of duty receive the benefits they deserve—regardless of retirement status.” 

    Chief Herbert D. Proffitt dedicated his life to serving others, first as a U.S. Army veteran of the Korean War and then as a law enforcement officer for 55 years before retiring in 2009 as Chief of the Tompkinsville, Kentucky Police Department. On August 28, 2012, Chief Proffitt was tragically shot and killed in his driveway by an individual he had arrested a decade earlier. Although his murder was a direct retaliation for his service in uniform, his family was denied benefits under the PSOB program simply because he had retired. 

    Congressman Dan Goldman has made safeguarding public safety officers and first responders a key priority of his time in office.   

    In the Winter of 2024, Goldman publicly condemned the House Republican’s rejection of the bipartisan budget bill, which would have fully funded the World Trade Center Health Program (WTCHP).  
    In the Summer of 2024, Goldman, alongside other New York lawmakers, introduced a bipartisan, bicameral bill to address any funding gap or shortfall for World Trade Center Health Program. The ‘9/11 Responder and Survivor Health Funding Correction Act of 2024’ intended to secure permanent and mandatory funding for the WTCHP, to prevent any future funding shortfall.   
    In the Fall of 2023, Goldman joined Congressman Bill Pascrell (NJ-09), Senator Amy Klobuchar (D-MN), and Senator Kevin Cramer (R-ND) in introducing the ‘Honoring Our Fallen Heroes Act’ (Honor Act). This legislation would recognize occupational cancer deaths as line-of-duty deaths, and ensure fire fighters, police, and EMS personnel receive benefits under the Public Safety Officers’ Benefits (PSOB) program. 

    ### 

    MIL OSI USA News

  • MIL-OSI USA: VIDEO: Capito Remarks at Markup for FY26 Labor-HHS Funding Bill

    US Senate News:

    Source: United States Senator for West Virginia Shelley Moore Capito

    [embedded content]

    Click here or on the image above to watch Senator Capito’s remarks. 

    WASHINGTON, D.C. — Today, U.S. Senator Shelley Moore Capito (R-W.Va.), Chairman of the Labor, Health and Human Services, and Education Appropriations Subcommittee, delivered remarks at a full Appropriations Committee markup on the FY26 Labor-HHS funding bill.

    Below is the opening statement of Chairman Capito as prepared for delivery:

    “Thank you, Chair Collins and Vice Chair Murray.

    “I applaud your steadfast commitment to returning to regular order, and I hope that our work continues to the Senate floor.

    “As we near the end of these subcommittee markups, I’d like to thank all my fellow committee members for their input.

    “We received 12,548 total member requests for the Labor-H appropriations bill. This bill is always one of the most difficult appropriations bills to negotiate.

    “This is the third year Senator Baldwin and I have been at the helm of the Labor-H Subcommittee, and I’m pleased to once again present a bipartisan bill to the Full Committee.

    “The Labor-H bill allocates limited taxpayer resources to key bipartisan priorities at a lower level than fiscal year 2025.

    “The bill includes a number of bipartisan member priorities such as greater investments in America’s biomedical research, child care, education, mental and rural health, and continued efforts to combat the opioid epidemic.

    “As we work to right-size the federal government, the bill also includes careful, targeted decreases, while ensuring that agencies have appropriate staffing levels to carry out their statutory responsibilities.

    “The bill also maintains long-standing riders and excludes any new controversial riders.

    “I have heard from many West Virginians throughout this process about questions they have regarding funding for programs throughout the state. I am proud that this bill provides critical funding for those worthy initiatives.

    “Our legislation seeks to provide more certainty and support for the work being done in my home state that help improve the lives of so many West Virginians.

    “Our bill provides an increase for the National Institutes of Health to continue prioritizing biomedical research in the United States.

    “This investment includes targeted increases for research in specific areas such as Alzheimer’s, Diabetes, Parkinson’s, women’s health, maternal health, rare diseases, and cancer.

    “We have also maintained funding for NIH’s IDeA program, that provides funding to 23 states that historically had lower levels of NIH funding, including my state of West Virginia.

    “The IDeA state program has been so important for research at West Virginia institutions like WVU and Marshall University.

    “Today’s bill also builds on our efforts to combat substance abuse, which remains a serious problem in West Virginia, by providing funding for addiction treatment, prevention, research, and recovery programs. 

    “This bill also provides resources to support our health workforce, including nurses, geriatric providers, and professionals to respond to the addiction crisis, which will help providers in West Virginia. 

    “The Labor-HHS bill again prioritizes our children starting with early childhood all the way through postsecondary education to make sure our students are prepared for jobs today and in the future.

    “The bill also makes critical investments in our workforce to improve outcomes for workers looking to upskill and advance in their careers.

    “The bill includes funding for apprenticeship grants, including those designed to boost the utility sector workforce, to support the administration’s goal of creating 1 million active apprenticeships.

    “The bill maintains important funding to support workers’ rights and ensure the safety of our workplaces.

    “I’ve just described several bipartisan programs we have included to improve the lives of Americans, and I encourage my colleagues to support this Labor-H bill.

    “I want to briefly thank all the staff that worked to put this product together.

    “On Senator Baldwin’s staff: Mike Gentile, Mark Laisch, Meghan Mott, Kathryn Toomajian, Erin Dugan, Amanda Beaumont, and Janie Dulaney.

    “On my Labor-HHS staff: Emily Slack, Catherine Knowles, Elizabeth Joseph, Heather Wadyka, and Jordan Lawlor.

    “And, I’d like to thank those on the Full Committee staff that help all of our subcommittees: Clint Trocchio, Ben Hammond, and the wonderful GPO team led by Valerie Hutton.

    “Thank you again Chair Collins and Vice Chair Murray.”

    MIL OSI USA News

  • MIL-OSI Africa: Golar LNG Strengthens Africa Commitment as Chief Commercial Officer (CCO) Federico Petersen Joins African Energy Week (AEW) 2025 Speaker Lineup

    Source: APO – Report:

    Federico Petersen, Chief Commercial Officer of marine LNG infrastructure operator Golar LNG, has confirmed his participation as a speaker at African Energy Week (AEW): Invest in African Energies 2025, taking place from September 29 to October 3 in Cape Town. His participation follows a series of landmark achievements across the continent, positioning Golar LNG at the forefront of Africa’s natural gas revolution.

    In July 2025, the company announced that its Gimi floating LNG (FLNG) unit has reached commercial operations date under a 20-year lease-and-operate agreement for the Greater Tortue Ahmeyim (GTA) project offshore Senegal and Mauritania. Backed by an estimated 15 trillion cubic feet (tcf) of natural gas, the Gimi facility will produce 2.4 million tons per annum (mtpa) of LNG, ramping up to its nameplate capacity of 2.7 mtpa.

    AEW: Invest in African Energies is the platform of choice for project operators, financiers, technology providers and government, and has emerged as the official place to sign deals in African energy. Visit https://AECWeek.com/ for more information about this exciting event.

    In Nigeria, Golar LNG signed a project development agreement in June 2024 with global energy company the Nigerian National Petroleum Corporation for the deployment of a new FLNG facility offshore the Niger Delta. With a planned processing capacity of 400-500 million standard cubic feet per day, the facility will produce LNG, LPG and condensate, with first gas targeted for 2027.

    The project falls under Nigeria’s broader “Decade of Gas” initiative, which aims to monetize the country’s 209 tcf of gas reserves and accelerate energy access and industrial growth. Supported by reforms such as the Petroleum Industry Act and the Nigerian Gas Flaring Commercialization Program, the project is a critical step toward establishing Nigeria as a global gas hub.

    In Cameroon, Golar LNG operates the Hilli Episeyo FLNG facility offshore Kribi, which made history as the world’s first LNG conversion and the project that introduced Cameroon as the world’s 20th LNG-exporting nation in 2018. In October 2023, the vessel offloaded its 100th LNG cargo to the Energy Integrity, underscoring nearly six years of reliable operations.

    With a nameplate capacity of 2.4 mtpa and a strong track record of commercial uptime, Hilli Episeyo continues to serve as a benchmark for small- and mid-scale FLNG deployment. Golar LNG holds a 50% interest in Trains 1 and 2, with the facility enabling the monetization of associated gas while contributing to regional energy diversification and security.

    “Golar LNG’s proven ability to deliver bankable, scalable FLNG infrastructure in frontier markets has redefined what’s possible for gas monetization in Africa. With operations in Senegal, Mauritania, Nigeria and Cameroon, the company is a true partner to Africa’s energy future,” states Tomás Gerbasio, VP of Commercial and Strategic Engagement, African Energy Chamber.

    Federico’s participation at AEW: Invest in African Energies highlights Golar LNG’s commitment to advancing FLNG development and natural gas monetization across Africa. In line with the company’s growing presence in Africa’s energy landscape, Golar LNG will participate as a Gold Partner at this year’s edition of the conference and exhibition, which serves as a strategic platform to showcase innovative FLNG solutions and a long-term commitment to the continent’s energy development.

    – on behalf of African Energy Chamber.

    Media files

    .

    MIL OSI Africa

  • MIL-OSI United Kingdom: Highland Council hails the importance of Nigg, as port changes hands

    Source: Scotland – Highland Council

    Wind turbine components at Nigg Bay. Pic Highland Council

    Highland Council has today hailed the importance of the Port of Nigg to the region’s economy after ownership of the facility formally changed hands.

    The multi-sector energy port forms part of the Inverness and Cromarty Firth Green Freeport – a partnership of public and private sector organisations, including The Highland Council, which aims to ensure the Cromarty Firth and wider region becomes a major global hub for green energy, delivering transformational benefits to Highland communities and the decarbonisation agenda.

    The Port of Nigg has been sold by Global Energy Group (GEG) to Mitsui Group, a Japanese trading and investment group which has been an investor in GEG since 2012 and which will now drive the next stage of development at Nigg.

    Highland Council praised the contributions made by Roy MacGregor and Global Energy Group, and wished the new owners continued success.

    Highland Council leader Raymond Bremner said: “Roy MacGregor and the Global Energy Group have established an outstanding facility which has been integral to the establishment of the Inverness and Cromarty Firth Green Freeport and which has led the way in supporting the country’s energy transition.

    “The legacy they leave is a substantial one – significant inward investment and jobs for the Highlands.

    “We wish the new owners every success as they drive the next stage of development at Nigg, building on the solid foundations which have delivered long-term, secure, skilled employment.”

    Highland Council convener Bill Lobban said: “Green energy continues to offer hope and opportunity for present and future generations to develop a highly skilled career without having to leave the region.

    “Though under new ownership, we have no doubt the port will continue to innovate and grow as Scotland’s energy transition continues apace, and Nigg will continue to be a tribute to all that Roy has achieved to date.”

    31 Jul 2025

    MIL OSI United Kingdom