Category: Transport

  • MIL-OSI Security: NPCC celebrates role of women in policing

    Source: United Kingdom National Police Chiefs Council

    The NPCC Chair, Gavin Stephens, responds to MP’s comments made yesterday (21 July), about the role of women in policing.

    Chief Constable Gavin Stephens, chair of the NPCC, said: “All of our officers come to work every day with passion, determination and courage to serve their communities.

    “There are an increasing number of women who choose a career in policing, bringing with them vital skills and experience that are critical to the progress of policing, our role in society, and keeping the public safe. Over a third of our officers and around 40% of our chief constables are women, and we must not jeopardise our progress by diminishing the value and role women play in our workforce.

    “There are no roles in policing which women cannot do, and the same exacting standards to qualify are met by all men and women who undertake some of the most challenging tasks of any profession.

    “We celebrate that women have an essential and irreplaceable role in every aspect of policing across the United Kingdom; policing is at its best when it represents the communities it serves, and our priority continues to be making policing a career where anyone can thrive and make a difference.”

    MIL Security OSI

  • MIL-OSI Security: NPCC celebrates role of women in policing

    Source: United Kingdom National Police Chiefs Council

    The NPCC Chair, Gavin Stephens, responds to MP’s comments made yesterday (21 July), about the role of women in policing.

    Chief Constable Gavin Stephens, chair of the NPCC, said: “All of our officers come to work every day with passion, determination and courage to serve their communities.

    “There are an increasing number of women who choose a career in policing, bringing with them vital skills and experience that are critical to the progress of policing, our role in society, and keeping the public safe. Over a third of our officers and around 40% of our chief constables are women, and we must not jeopardise our progress by diminishing the value and role women play in our workforce.

    “There are no roles in policing which women cannot do, and the same exacting standards to qualify are met by all men and women who undertake some of the most challenging tasks of any profession.

    “We celebrate that women have an essential and irreplaceable role in every aspect of policing across the United Kingdom; policing is at its best when it represents the communities it serves, and our priority continues to be making policing a career where anyone can thrive and make a difference.”

    MIL Security OSI

  • MIL-OSI: GRANITESHARES YieldBOOST ETFs SURPASSES $120M AUM AS TRADING VOLUMES SURGE

    Source: GlobeNewswire (MIL-OSI)

    • YieldBOOSTTMETFs linked to tech stocks and Bitcoin drive increased AUM
    • Growing interest in options income generating ETFs

    NEW YORK, July 22, 2025 (GLOBE NEWSWIRE) — GraniteShares, an entrepreneurial ETF provider, today announces that its range of YieldBOOSTTM ETFs has surpassed $100m in assets under management (AUM), reaching $127.2 million at the close of market.

    “YieldBOOSTTM ETFs are options-based income ETFs that aim to generate high weekly distributions for investors” said Will Rhind, Founder and CEO of GraniteShares. “We are experiencing huge demand for weekly income strategies that can provide large distributions in volatile markets”

    GraniteShares YieldBOOSTTM ETFs are a suite of exchange-traded funds designed to generate high income through options-based strategies, primarily by selling put options on leveraged ETFs tied to specific assets, such as individual stocks (e.g., Tesla, NVIDIA), indices (e.g., S&P 500, Nasdaq-100), or cryptocurrencies (e.g., Bitcoin). These ETFs aim to provide investors with weekly income distributions while maintaining exposure to the performance of the underlying assets, subject to a cap on potential gains. The YieldBOOST family includes ETFs like TSYY (Tesla), NVYY (NVIDIA), XBTY (Bitcoin), YSPY (S&P 500) and TQQY (Nasdaq-100). The strategy involves selling put options to generate premium income and buying put options to mitigate extreme downside risks, aligning with GraniteShares’ philosophy of innovative, low-cost, and high-conviction investment solutions

    The first YieldBOOSTTM ETF, the GraniteShares YieldBOOST TSLA ETF (TSYY) was launched in December 2024. TSYY is the most popular ETF so far by AUM. The suite has since continued to grow both in size of funds and popularity.

    For more information, please visit www.graniteshares.com.

    Media contact:

    Gregory FCA for GraniteShares
    Te’a Gray, 203-815-4514
    graniteshares@gregoryfca.com

    About GraniteShares:

    GraniteShares is an award-winning global investment firm dedicated to creating and managing ETFs. Headquartered in New York City, GraniteShares provides products on U.S., U.K, German, French & Italian stock exchanges. The firm is a market leader in leveraged single-stock ETFs and provides innovative, cutting-edge investment solutions for the high-conviction investor. Graniteshares believes the future of investing lies at the nexus of alternative thinking, low fees, and disruptive product structures—the core of its high-conviction investment philosophy. The firm launched its first product in 2017 and is a fast-growing ETF issuer with approximately $10* Billion in assets under management spanning a full array of investment strategies.

    *As of July 17, 2025

    1An option is a contract that gives the holder the right, but not the obligation to buy or sell a specific asset at a predetermined price on or before a specified date. Options are a type of derivative, meaning their value is derived from the underlying asset.

    2A put option is a contract that gives the buyer the right, but not the obligation, to sell an underlying asset at a specified price (the strike price) by or on a specific fate (the expiration date).

    RISK FACTORS & IMPORTANT INFORMATION

    The Fund is newly launched and has risks associated with its limited operating history.

    Investors should consider the investment objectives, risks, charges and expenses carefully before investing. For a prospectus or summary prospectus with this and other information about the Funds, please call (844) 476-8747. Read the prospectus or summary prospectus carefully before investing.

    There is no guarantee that the Fun’s investment strategy will be properly implemented, and an investor may lose some or all of their investment.

    An Investment in these Funds is not an investment in the Underlying ETFs’

    The Fund’s strategy will cap its potential gain if the Underlying ETFs’ shares increase in value

    The Fund’s strategy is subject to all potential losses if the Underlying ETFs share declines, which may not be offset by the income received by the Fund,

    The Fund does not invest directly in the Underlying ETFs.

    Investment in the Fund is not an investment in the Underlying Stock.

    Fund shareholders are not entitled to any distribution paid by Underlying ETFs.

    Shares are bought and sold at market price (not NAV) and are not individually redeemed from the ETF. There can be no guarantee that an active trading market for ETF shares will develop or be maintained, or that their listing will continue or remain unchanged. Buying or selling ETF shares on an exchange may require the payment of brokerage commissions, and frequent trading may incur brokerage costs that detract significantly from the returns.

    An investment in the Fund involves risk, including the possible loss of principal. The Fund is non-diversified and includes risks associated with the Fund concentrating its investments in a particular industry, sector, or geographic region which can result in increased volatility. The use of derivatives such as option contracts and swaps is subject to market risks that may cause their price to include Risk of the Underlying ETF, Derivatives Risk, A Risk, Put Writing Strategy Risk, Option Market Liquidity Risk. These and other risks can be found in the prospectus.

    This information is not an offer to sell or a solicitation of an offer to buy the shares of any Funds to any person in any jurisdiction in which an offer, solicitation, purchase or sale would be unlawful under the securities laws of such jurisdiction. Please consult your tax advisor about the tax consequences of an investment in Fund shares, including the possible application of foreign, state, and local tax laws. You could lose money by investing in the ETFs. There can be no assurance that the investment objective of the Funds will be achieved. None of the Funds should be relied upon as a complete investment program.

    THE FUNDS ARE DISTRIBUTED BY ALPS DISTRIBUTORS, INC. GRANITESHARES IS NOT AFFILIATED WITH ALPS DISTRIBUTORS, INC.

    ©2025 GraniteShares Inc. All rights reserved. GraniteShares, GraniteShares ETFs, and the GraniteShares logo are registered and unregistered trademarks of GraniteShares Inc., in the United States and elsewhere. All other marks are the property of their respective owners.

    The MIL Network

  • MIL-OSI: Guaranteed Approval Loans for Bad Credit with No Credit Check from 1F Cash Advance in 2025

    Source: GlobeNewswire (MIL-OSI)

    BOULDER, Colo., July 22, 2025 (GLOBE NEWSWIRE) — In a significant move to support borrowers with poor or no credit history, 1F Cash Advance has rolled out a new line of guaranteed approval payday loans for Americans facing financial hardships in 2025. With loan amounts ranging from $100 to $1,000, these flexible online loan solutions are designed to offer speed, security, and accessibility, even for people with poor credit or no credit score.

    A Fast, Flexible Lifeline for Bad Credit Borrowers

    Traditional lenders often reject applicants with low credit scores, but 1F Cash Advance offers an alternative by providing access to no credit check loans with guaranteed approval. Borrowers can apply online in minutes, receive an instant decision, and get funds deposited into their bank accounts as soon as the same day.

    “Millions of Americans are just one emergency away from a financial crisis. We built our platform to offer fast, stress-free access to cash, no matter your credit score,” said Adrienne Bailey, Public Relations Specialist for 1F Cash Advance.

    What’s a Payday Loan?

    Payday loans are a short-term way to get up to $1,000 in difficult financial circumstances quickly. Whether it’s an unexpected bill, a car repair, or another emergency expense, these loans are designed to help you cover urgent needs. They’re typically meant to be repaid in full, along with fees and interest, by your next payday, usually within 14 to 31 days.

    Payday loans are especially helpful for people who may not qualify for traditional bank loans due to factors such as a low credit score, inconsistent income, or unemployment. The application process is typically quick and easy, often requiring only proof of income, an active bank account, and a few other basic documents.

    APPLY FOR NO CREDIT CHECK PAYDAY LOANS

    How Do Payday Loans Work?

    Payday loans are straightforward to get. You fill out an application, and if you meet the requirements, the money is deposited directly into your bank account, often the same day.

    Unlike traditional loans, which often involve a mountain of paperwork and require waiting for days, payday loans are much more streamlined. The entire process is typically handled online, from application to approval and receiving the funds. Automated systems speed things up by checking your eligibility in real time, so you don’t have to wait in line or deal with unnecessary steps.

    Once you’re approved, you’ll receive the details of the loan agreement, including repayment terms and fees. You can review everything and decide whether to accept the offer—no pressure.

    Who Can Apply?

    Just like with any loan, there are a few basic requirements you’ll need to meet before you can get approved for a payday loan. Most people qualify without much difficulty. Here’s what lenders typically look for:

    • You need to be a U.S. citizen or permanent resident
    • You must be at least 18 years old
    • You should have a reliable source of income
    • A bank account to deposit the funds into
    • And a phone number or email so the lender can contact you

    Because these requirements are so straightforward, payday loans tend to have a high approval rate. Most people, even with bad credit, find that they meet all the criteria without needing to jump through hoops, making it a quick and accessible option when money is tight.

    Why Borrowers with Bad Credit Face Challenges While Getting Loans

    Borrowers with poor credit often encounter difficulties when seeking loans due to several important factors:

    Increased Lending Risk

    Credit scores serve as a tool for lenders to assess the likelihood that a borrower will repay a loan. A low credit score indicates past financial struggles, such as missed payments or high debt, making lenders hesitant to lend money.

    Costlier Loan Terms

    Because these borrowers are considered riskier, lenders typically offset this by charging higher interest rates and additional fees. This increases the overall cost of borrowing and can make loans less affordable.

    Fewer Lending Opportunities

    Traditional financial institutions usually set minimum credit standards. Borrowers with bad credit may find themselves rejected or limited to only a small selection of loan products.

    Tougher Conditions

    Loans approved for those with poor credit often come with stricter conditions, such as shorter repayment terms, higher fees, or the need for collateral, which can be difficult to provide.

    Discouragement and Hesitation

    Experiencing loan denials or steep borrowing conditions can reduce a borrower’s confidence, causing some to avoid applying for loans altogether.

    Risk of Predatory Lending

    In their search for financing, some borrowers with bad credit may turn to high-risk lenders offering loans with exorbitant interest rates and unfair terms, potentially trapping them in a cycle of debt.

    CHECK OUT NO CREDIT CHECK PAYDAY LOAN OPTIONS

    What Makes 1F Cash Advance Stand Out?

    In 2025, more people are looking for fast, no-hassle loan options, especially those who don’t qualify with traditional banks. That’s where 1F Cash Advance comes in. Here’s what sets it apart:

    • Guaranteed approval for most applicants, regardless of credit score
    • No hard credit checks during the application process
    • Loan amounts from $100 to $1,000
    • 1-hour payday loans available
    • Same-day or next-business-day funding
    • Simple and secure online form that takes 5 minutes to complete

    This service is ideal for anyone facing unexpected expenses, such as car repairs, medical bills, or rent, and doesn’t want to deal with paperwork, rejections, or long waits.

    Smarter Ways to Handle Financial Emergencies

    Here are some smarter, more manageable ways to handle those money problems:

    1. Figure Out What You’re Dealing With

    Before you jump into problem-solving mode, take a moment to consider details. Ask yourself:

    • How much money do I need?
    • Is this urgent, or do I have a little time?
    • Can I split this cost up or delay part of it?

    Getting clear on what’s going on can help you avoid rash decisions and unnecessary stress.

    2. Use Your Emergency Savings (If You’ve Got It)

    If you’ve managed to stash away even a little emergency fund, now’s the time to dip into it. That money is there for a reason, to help you stay out of deeper debt when life throws you a financial punch.

    3. Consider a Short-Term Loan from a Trusted Source

    If savings won’t cover it, borrowing might make sense, but not from just anywhere. That’s where 1F Cash Advance can help:

    • No credit check is required to explore available options.
    • Applications are reviewed quickly, often in minutes.
    • Funds can be available as soon as the same day or by the next business day.
    • Rates, terms, and fees are clearly presented upfront—no hidden surprises.


    4. Reach Out Before Things Spiral

    If the emergency involves rent, bills, or services, contact the relevant parties. Contact your landlord to see if you can split the rent. Ask your utility company about payment options. Check out local organizations that help with food, transportation, or temporary expenses. You might be surprised at how many options are available, especially if you ask early.

    5. Be Careful with Payday Loans

    The trick is knowing which ones are fair and which ones are traps. Avoid lenders who charge crazy interest rates or try to keep you stuck in a cycle of borrowing. Take time to read reviews and compare offers side by side — these extra steps can protect you from shady deals.

    6. Plan for Next Time

    Once the emergency is handled, take a moment to regroup. Setting aside $5 or $10 a week helps build a small buffer for the next unexpected expense. It doesn’t have to be big, just consistent.

    How Are Payday Loans Different from Traditional Loans?

    Payday loans and conventional (or traditional) loans both offer ways to borrow money, but they’re designed for very different situations and come with some key differences. Here’s how they stack up:

    1. Loan Amounts. Payday loans are meant for smaller, short-term needs, typically ranging from $100 to $1,000. Conventional loans can be significantly larger, sometimes reaching tens or even hundreds of thousands of dollars, depending on their intended use (such as buying a home or car).
    2. Repayment Terms. With a payday loan, you’re expected to repay the full amount, plus interest and fees, by your next paycheck—usually within a couple of weeks. Traditional loans give you much more time to repay. Payments are spread out over several months or even years, depending on the type of loan.
    3. Interest and Fees. Payday loans typically carry higher interest rates and fees. Since they’re short-term and don’t rely heavily on credit history, lenders take on more risk and charge accordingly. Conventional loans generally offer lower interest rates, especially if you have good credit.
    4. Credit Requirements. Most payday lenders either skip credit checks or perform a soft pull, meaning your credit score won’t be affected. Traditional lenders, like banks or credit unions, typically require a full credit check, and your approval depends heavily on your credit score, credit history, and sometimes even collateral.
    5. Approval Speed. Payday loans are focused on speed. Many are approved and funded within hours. Conventional loans often take several days or even weeks due to paperwork, underwriting, and approval processes.
    6. Eligibility Criteria. Payday loans are designed for people who may not have a perfect credit history or any credit history at all. They’re more accessible if you’re working with limited financial options. Traditional loans are more likely to be extended to borrowers with strong credit profiles, stable income, and a solid financial history.


    What They’re Used For

    People usually turn to payday loans when they need quick cash for:

    • Medical bills or prescription expenses
    • Emergency car or home repairs
    • Utility bills to avoid service shut-offs
    • Rent payments to avoid eviction
    • Unexpected travel expenses
    • Everyday necessities when short on funds
    • Covering gaps between paychecks

    Payday loans can be an option not only for those with jobs but also for students, retirees, single parents, or even unemployed individuals. The key requirement is having proof of a stable income source—this could be wages, benefits, pensions, or regular assistance payments.

    Conventional loans, on the other hand, are typically used for bigger financial needs, such as:

    • Buying a home
    • Financing a vehicle
    • Covering education expenses
    • Consolidating debts
    • Starting or expanding a business

    To wrap up, payday loans are fast, simple, and accessible, but they’re also more expensive. Conventional loans take longer to process and require stronger credit profiles, but usually come with better terms. The right choice depends on your FICO score, how urgently you need the money, and what you plan to use it for.

    The Pros and Cons of Payday Loans

    Payday loans can offer a quick financial fix when you’re in a pinch, but they also come with serious risks. Before applying, it’s essential to weigh both sides. Here’s a clear look at the upsides and downsides of payday loans:

    Upsides of Payday Loans

    1. Fast Access to Cash. One of the biggest perks of payday loans is speed. Many lenders offer same-day or next-day funding, which can be a lifesaver if you’re facing an urgent bill or emergency expense.
    2. No Credit Check Required. If your credit score isn’t great or you don’t have a credit history at all, payday lenders are often more forgiving. Most don’t require a hard credit check, which makes these loans accessible to a wider range of borrowers.
    3. Simple Qualifications. You don’t need perfect financials to qualify. Typically, the required documentation includes proof of income, a valid ID, a bank account, and a means of contact (such as a phone number or email address).
    4. Convenient Application Process. You can apply online or in person, and most applications take only a few minutes to complete. If you’d rather avoid the hassle of going to a bank, this is a flexible and convenient option.


    Downsides of Payday Loans

    1. The Debt Trap Risk. Because payday loans come with high fees and short repayment terms, many borrowers struggle to pay them back on time. This can lead to a dangerous cycle where you take out another loan just to cover the first, and the debt continues to grow.
    2. Extremely High Interest Rates. Payday loans are among the most expensive forms of borrowing, with APR rates typically ranging from 300% to 400%. Even a small loan can become very costly if you can’t repay it quickly.


    FAQs

    Can I Still Get a Payday Loan with Bad Credit?

    Yes, you can. Many payday lenders don’t even check your credit the traditional way. So, having bad credit or no credit at all usually won’t stop you from getting approved. Instead, they’ll look at your income and ability to repay the loan.

    What Happens If I Can’t Repay a Payday Loan?

    If you miss your repayment, things can get complicated. Lenders may charge late fees or other penalties, and in some cases, this could harm your credit score, especially if the loan is sent to collections. That can make it harder to borrow in the future. Some lenders may also attempt alternative methods to recover the money, such as multiple attempts to withdraw funds from your bank account. Contact your lender immediately if you anticipate difficulty repaying. They can offer options.

    Will Applying for a Payday Loan Hurt My Credit Score?

    Not when you apply through 1F Cash Advance. We only perform a soft credit check, which means it won’t show up on your credit report or affect your FICO score. Your credit score is only at risk if you default on the loan and it goes to collections.

    How Fast Can I Get a Payday Loan?

    Very fast! Most payday lenders aim to provide you with the money on the same day or by the next business day. You can often apply online in just a few minutes, and if approved, funds could be deposited into your bank account within hours.

    Media Contact Info

    Mailing Address

    1F Cash Advance, LLC

    1942 Broadway St., STE 314C Boulder, CO 80302

    Main Office Location

    2770 Canyon Blvd, Boulder, CO 80302

    Website: https://1firstcashadvance.org

    E-mail: info@1firstcashadvance.org

    Phone: (720) 428-2247

    Social Media:

    Disclaimer & Affiliate Disclosure

    This article is intended for informational and commercial purposes only. It’s not financial advice, legal guidance, or an official endorsement of any specific loan provider. While we strive to keep information accurate and up to date, we can’t guarantee its completeness or reliability. Please conduct your own research and, if necessary, consult with a licensed financial advisor or legal expert before making any financial decisions.

    The loan products mentioned here, including payday loans and other financial services, may not be suitable for everyone. Terms, rates, and eligibility vary by lender and location. Approval is never guaranteed, and every lender has its own criteria, including income verification, ID checks, and compliance with state or federal regulations.

    Some links in this content may be affiliate links. That means if you click and take action (such as applying for a loan), we may earn a small commission at no additional cost to you. These commissions help support our content, but they don’t affect our editorial integrity or influence what we write. We aim to provide honest, helpful, and unbiased information at all times.

    By reading or using this content, you agree that we, including the publisher, content creator, partners, and affiliates, aren’t liable for any losses, inaccuracies, or problems that may arise from the information provided here. This includes issues such as loan denials, outdated terms, or disputes with lenders.

    Mentions of companies like “1F Cash Advance” are for informational comparison only. We do not have a formal relationship or endorsement agreement with any specific company unless stated otherwise. For questions about a specific service or offer, please contact the company directly.

    All trademarks and company names belong to their respective owners.

    Photos accompanying this announcement are available at

    https://www.globenewswire.com/NewsRoom/AttachmentNg/679bdf0b-cc82-4b57-80b4-72f1e4722a20

    https://www.globenewswire.com/NewsRoom/AttachmentNg/542fe772-e81a-47a9-85dd-48d5ee5e48f5

    The MIL Network

  • MIL-OSI: Is polite driving in the rearview? PNW drivers say rudeness is on the rise

    Source: GlobeNewswire (MIL-OSI)

    SEATTLE, July 22, 2025 (GLOBE NEWSWIRE) — If you’ve felt a shift in driver behavior on Pacific Northwest roads, you’re not alone. PEMCO’s poll of Washington and Oregon residents found that rudeness on the road may be more than a feeling; it’s a reality. Nearly three in four drivers (73%) say they have at least occasionally seen increases in traffic violations in the last five years, and of those, nearly half (47%) say they’ve often seen more drivers breaking the rules.

    Drivers admitted to a range of behaviors behind the wheel, such as driving slower to “teach someone a lesson” after they’ve tailgated you – 36% of drivers said they do it at least occasionally. Likewise, 35% of drivers admit to speeding up to block another vehicle from passing.

    Interestingly, some groups were significantly more likely to fess up to the unfriendly driving behaviors than others. Parents, in particular, were more than twice as likely as drivers without children to say they’ve acted out behind the wheel. For example, 29% of parents say they’ve often driven slower on purpose to teach someone a lesson after being tailgated, compared to just 9% of drivers without kids. Similarly, 24% of parents admit to often speeding up to block someone from passing, while only 8% of non-parents say the same.

    Younger drivers also stand out. Those under 35 were the age group most likely to admit to these kinds of aggressive behaviors, with 31% saying they’ve often driven slower to teach a lesson, and 23% admitting they’ve often sped up to block a pass – far higher than the rates reported among drivers 55 and older (4% and 7%, respectively).

    Despite the rise in rudeness, most drivers still say they witness polite gestures, like waving someone through or allowing others to merge. But the contrast is significant: more than half (56%) also say they often see rude or aggressive behavior from other drivers, while only 37% say they’ve witnessed other drivers being extra polite.

    “Aggressive driving may be becoming more common, but it doesn’t have to be the norm,” said Jennifer Hawton, spokesperson for PEMCO Insurance. “Safe, defensive driving helps protect everyone, and often, a small act of kindness behind the wheel can prevent a much bigger problem. It’s important to stay aware of your surroundings and help keep each other safe when driving.”

    About the PEMCO Insurance Northwest Poll

    PEMCO Mutual Insurance commissioned this independent survey, conducted by Qualtrics, to explore Washington and Oregon residents’ attitudes toward current Northwest issues. The study included 436 respondents from the Seattle metro area (King, Snohomish, and Pierce counties) and 398 respondents from the Portland metro area (Multnomah, Marion, Clackamas, and Washington counties). The results have a margin of error of ±5% at a 95% confidence level. In other words, if the survey we conducted 100 times, the findings would fall within that margin of error in 95 of those instances.

    About PEMCO Mutual Insurance

    PEMCO Mutual Insurance has been serving the Pacific Northwest for 75 years. PEMCO provides auto, home, renters, and boat coverage. We are honored to have been recognized as a Best American Insurance Company by Forbes Magazine based on customer feedback and as one of America’s Greatest Midsize Workplaces 2025 by Newsweek. We distinguish ourselves through award-winning customer service, industry expertise, and social impact programs focused on supporting youth and education; community impact programs that build a safer, stronger Pacific Northwest. To learn more, visit www.pemco.com.

    The MIL Network

  • MIL-OSI Africa: Livestock and lions make uneasy neighbours: how a fence upgrade helped protect domestic and wild animals in Tanzania

    Source: The Conversation – Africa – By Jonathan Salerno, Associate Professor, Colorado State University, Colorado State University

    Protecting livestock in areas where large carnivores (like lions) live is increasingly important as human land use expands, wildlife habitat shrinks, and climatic changes reshape the ways in which humans and wildlife interact. Protecting the carnivores from livestock owners is important too. Intact carnivore populations support more resilient food webs and the ecosystem services they provide.

    It’s not easy for people, livestock, and carnivores to live together without conflict, though. One of the best ways to reduce conflict is to protect livestock like cattle and sheep from being attacked by predators.

    There are various methods to do this, like guarding livestock or erecting fences. That’s all very well for the livestock inside the fences, but do predators simply turn to the nearest unprotected livestock for their meal instead? Are the neighbours’ cattle, sheep, and goats at greater risk? This question hasn’t been explored much by researchers.

    We’re a group of conservation practitioners and scientists who have studied the interactions of carnivores, livestock, and people in Tanzania and elsewhere for decades to try and find solutions to conflict problems.

    Our study area is next to a national park which protects important populations of lion, leopard, hyena, African wild dog, and cheetah. The people who live here have traditionally kept their livestock overnight in enclosures made of acacia-thorn branches. More recently, some of them have built pens, or corrals, from tall chain link fencing. We knew from years working with communities and from previous research that these fortified corrals were effective at keeping livestock safe from predators.

    Our next step was to find out whether this made other nearby livestock less safe.


    Read more: What’s behind the conflict between people and animals in Tanzania


    The results were intriguing. We found that the new enclosures made predation less likely in the nearby traditional enclosures too.

    This type of beneficial spillover effect had yet to be documented in other systems where interventions aim to protect livestock from large carnivores.

    Our results show that in conservation, it’s important to look closely at complex local dynamics. The findings may help explain why there’s so much uncertainty about the effectiveness of various human–wildlife conflict mitigation strategies.

    Beneficial spillover effects

    People who keep livestock in east Africa have long had strategies to keep their animals safe from large carnivores. Sometimes acacia-thorn night enclosures (known locally as bomas), intensive herding practices, and guarding dogs work well.

    Other times, and especially in communities within and adjacent to large, protected carnivore populations, traditional strategies fall short.

    This is the case in Tanzania’s Ruaha-Rungwa Landscape. In our study area adjacent to Ruaha National Park, any pastoralist or agropastoralist (herding and crop farming) household has about a 30% chance of losing one or more animals to predation each year. This is a serious economic loss on top of important cultural and emotional costs.


    Read more: Losing a calf to wolves in Sweden hurts. But if lions take one in Uganda, a farming family’s income is gone


    Lion Landscapes, an organisation that some of us have been running for over a decade, works to support human-carnivore coexistence. Adjacent to Ruaha, we have been partnering with households to build 1.8-metre chain-link corrals. We subsidise them. Households contribute 25% of the cost and some of the labour for construction.

    We analysed about 25,000 monthly reports of livestock predation in fenced and traditional enclosures, using statistical models. There were 846 predation events over nearly four years. Unexpectedly, while we did detect spillover effects, these appeared to be beneficial. Rather than displacing conflicts, fortified enclosures actually conferred protective effects on their traditional-enclosure neighbours.

    For example, households within 50 metres (the minimum observed distance) of a fortified enclosure were half as likely to experience predation compared with distant households 2 kilometres away. And these beneficial effects increased with the number of fortified enclosures in a neighbourhood. Finally, the effects appeared to be durable over time.

    The fortified enclosures were extremely effective. We showed that households could break even after paying for the fence in just a few years through avoided livestock losses. And we know that when domestic animals aren’t being killed, their owners are more tolerant of predators. We didn’t record carnivore killings in this study but it has happened fairly frequently in the area in the past.

    In a few of the world’s human-wildlife conflict systems, where data exist to assess spillover effects, there is evidence that detrimental spillovers do occur. For instance, beehive deterrents may redirect elephants to nearby crop fields, or lethal removal of individual wolves may redirect the surviving pack to prey on adjacent ranches. Nevertheless, these are very under-studied interactions.

    Livestock management and carnivore coexistence

    In systems where humans, livestock, and wildlife overlap and sometimes come into conflict, management strategies too often focus on wildlife. Another option is to reduce whatever attracts wildlife. In the case of large carnivores, this means managing livestock.


    Read more: Livestock are threatened by predators – but old-fashioned shepherding may be an effective solution


    Our results support this approach by demonstrating that management and protection of livestock is fundamental for reducing conflict, and can benefit not only livestock owners but landscape-level coexistence.

    Conservationists and policy-makers need to encourage these practices that benefit people, carnivores, and livestock in shared landscapes.

    – Livestock and lions make uneasy neighbours: how a fence upgrade helped protect domestic and wild animals in Tanzania
    – https://theconversation.com/livestock-and-lions-make-uneasy-neighbours-how-a-fence-upgrade-helped-protect-domestic-and-wild-animals-in-tanzania-258113

    MIL OSI Africa

  • MIL-OSI Africa: Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach

    Source: The Conversation – Africa – By Paa Kwesi Wolseley Prah, Postdoctoral Fellow, Dublin City University

    Ghana stands out in west Africa as a nation that has not experienced terrorist attacks, even though it’s geographically close to countries that have. In Burkina Faso, Mali and Nigeria, extremist groups such as Boko Haram and Islamic State in West Africa (ISWAP) have wreaked havoc.

    This resilience is not accidental. It is the result of deliberate counter-terrorism strategies employed by Ghana’s security institutions.

    Ghana’s counter-terrorism framework was set out in 2020. It has four pillars: prevent, pre-empt, protect, and respond. The idea is to coordinate multiple agencies, including the Ghana Police Service, Ghana Immigration Service, Ghana Armed Forces and the National Intelligence Bureau.

    These pillars guide strategies to address both immediate threats and underlying vulnerabilities. Poverty, religious radicalism and porous borders are common drivers of terrorism in west Africa.

    I am an international security and global governance researcher. My co-author is a government and international studies scholar.

    Four years ago we wrote a paper examining Ghana’s resilience against terrorist attacks. Our findings are still relevant given the increasing activities of terror groups in the west African region.


    Read more: West Africa terror: why attacks on military bases are rising – and four ways to respond


    We wanted to identify what works as a potential model for other countries.

    Using a qualitative methodology, we interviewed stakeholders — including police officers, members of the armed forces, Muslim community leaders, and immigration officials. We also analysed the national framework for preventing and countering violent extremism and terrorism.

    Our findings showed that Ghana’s success is traceable to an approach that integrates community engagement with advanced border technology, inter-agency training, media collaboration and intelligence operations. And it addresses both immediate and underlying threats.

    We argue that Ghana’s ability to balance prevention with security offers solutions for stability in a geopolitically volatile region.


    Read more: Ghana’s new president faces tough regional security problems: why he’s well-placed to tackle them


    Community engagement

    One of the standout strategies is community engagement. This serves multiple purposes, from guiding people away from extremism to gathering intelligence.

    The Ghana Police Service, for instance, engages Muslim-dominated communities, known as “Zongos”, to counter radical Islamic ideologies that could be exploited by terrorist groups.

    By collaborating with local religious leaders, police make communities aware of the dangers of radicalisation. They foster trust and encourage residents to report suspicious activities. This approach also works in tackling illegal arms circulation.

    Ghana has an estimated 2.3 million small arms in circulation – 1.1 million of them illegally possessed. The availability of so many weapons fuels terrorist activities across west Africa.

    Community based de-radicalisation aligns with global best practices. In Norway, for instance, it was used to disengage youth from extremist groups.

    Technology at borders

    Ghana’s border control management is another part of its counter-terrorism strategy. Ghana Immigration Service uses advanced security software and integrated systems like the “Immigration 360” system, designed to fully automate passenger processing and data management.

    The system manages records of fingerprints and other data to improve reporting and intelligence sharing between Ghana Immigration and other security agencies.

    The technology makes it possible to quickly identity individuals on terrorist watchlists and detects concealed goods. This helps prevent illegal cross-border movements.

    There are gaps in Ghana’s defences, however. The influx of migrants fleeing extremist violence in Burkina Faso, Mali and Niger in 2024 highlights the urgency of scaling up investments in the technology.


    Read more: West Africa could soon have a jihadist state – here’s why


    Training for preparedness

    Ghana combats new and varying forms of terrorism by uncovering trends and training personnel to deal with them.

    A notable example was the six-day joint training in 2022 involving the Ghana Immigration Service, Police Service, Customs, Economic and Organised Crime Office, and the National Intelligence Bureau.

    The country also works with regional neighbours like Burkina Faso, Togo and Benin, and partners such as the United States, through initiatives like “Operation Epic Guardian”.

    Media as a strategic partner

    Terrorists rely on media to amplify fear and publicise their causes. Ghana’s security agencies counter this tactic by actively engaging media houses to report accurately.

    The Ghana Armed Forces, for instance, works with media to debunk false reports, which can cause public panic and inadvertently aid terrorists.

    The Ghana Police Service emphasises regular dialogue with media to ensure sensitive information is verified before publication, reducing the risk of tipping off suspects. However, media competition for viewers poses a challenge.

    Surveillance and intelligence gathering

    Surveillance and intelligence gathering is critical. Plainclothes armed forces and immigration personnel blend into communities to monitor potential threats. The approach has worked but is constrained by resources.

    It can also risk human rights violations, such as wrongful profiling, and is less effective against multiple targets compared to technological solutions like facial recognition or CCTV.


    Read more: Funding terror: how west Africa’s deadly jihadists get the money they need to survive


    Challenges and regional implications

    Despite its successes, Ghana’s counter-terrorism framework faces challenges that could undermine its long-term efficacy:

    • logistical and financial constraints

    • the influx of migrants fleeing regional violence

    • a lack of harmonised security cultures within the regional body, Ecowas.

    In all, Ghana’s strategies offer lessons for west Africa, where terrorism is a growing threat.

    Its community engagement model could be followed in Nigeria, Burkina Faso, Mali and Niger to counter radicalisation and arms proliferation, provided it avoids religious stereotyping.

    – Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach
    – https://theconversation.com/ghanas-security-strategy-has-kept-terror-attacks-at-bay-what-other-countries-can-learn-from-its-approach-260333

    MIL OSI Africa

  • MIL-OSI United Kingdom: First report on babies born following pioneering licensed IVF technique to reduce the risk of mitochondrial diseases

    Source: United Kingdom – Executive Government & Departments

    The first published research findings from the Newcastle team on the children born following pioneering licensed IVF technique to reduce the risk of mitochondrial diseases.

    The research papers, published in New England Journal of Medicine (NEJM) by the team based at Newcastle University and the Newcastle Fertility Centre at Newcastle Hospitals NHS Foundation Trust describe the reproductive and clinical outcomes of pronuclear transfer treatments performed to date.

    In the absence of a cure for mitochondrial DNA diseases, attention has focussed on IVF-based technologies to reduce the risk of disease by limiting transmission of disease-causing mitochondrial DNA mutations from mother to child.

    The UK was the first country to approve laws to allow the use of the ground-breaking IVF-based mitochondrial donation technology, pronuclear transfer, in 2015. The technique is designed to reduce the risk of mitochondrial DNA disease in children born to women who carry high levels of disease-causing mitochondrial DNA mutations.

    Journalists came to this press briefing to hear from clinicians, scientists and embryologists caring for the mothers affected by mitochondrial disease about the first babies, the science, the methods and the data, and to ask their questions. 

    Speakers included:

    Professor Sir Doug Turnbull, Emeritus Professor of Neurology, Newcastle University

    Professor Mary Herbert, Professor of Reproductive Biology, Newcastle University and Monash University

    Professor Bobby McFarland, Director of the NHS Highly Specialised Service for Rare Mitochondrial Disorders (Newcastle Hospitals NHS Foundation Trust) and Professor of Paediatric Mitochondrial Medicine at Newcastle University

    Dr Louise Hyslop, Consultant Embryologist, Newcastle Fertility Centre, Newcastle Hospitals NHS Foundation Trust

    This Briefing was accompanied by an SMC Roundup of comments. 

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Genome engineering for species conservation

    Source: United Kingdom – Executive Government & Departments

    Much has been made of the potential of genome engineering to bring back extinct species.  But what about its potential for biodiversity and conservation of existing threatened species?

    Traditional conservation techniques such as captive breeding and habitat protection can be successful in boosting population numbers but this can leave species populations with low genetic diversity, leaving them more vulnerable to future threats like new diseases or climate change.

    In a new Perspectives article in Nature Reviews Biodiversity, a team of scientists examines the potential for CRISPR-based editing to complement existing conservation in the following ways:

    1. Restoring lost variation – bringing back genetic diversity that has been lost from the gene pool of the modern populations of threatened species, using DNA from samples of the species collected decades or even centuries ago, which are stored in natural history museums all over the world
    2. Facilitated adaptation – introducing genes from related, better-adapted species to confer traits like heat tolerance or pathogen resistance, equipping threatened species to adapt to rapid environmental change
    3. Reducing genetic load – populations that have previously crashed in numbers often carry harmful mutations that have become fixed by chance, so targeted gene edits could replace these mutations with the healthy variant from before the population crash – with the potential to improve fertility, survival rates, and overall health.

    Is this what the future of conservation looks like?  What potential does it have and what are the risks scientists need to avoid?

    Journalists came to this briefing to hear from three of the authors and put their questions to them.

    Speakers included:

    Prof Cock van Oosterhout, Professor of Evolutionary Genetics at the University of East Anglia 

    Dr Anna Keyte, Species Director at Colossal Biosciences

    Prof Jim Groombridge, Professor of Biodiversity Conservation, Durrell Institute of Conservation and Ecology, University of Kent

    This Briefing was accompanied by an SMC Roundup of comments. 

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: expert reaction to study looking at estimates of brain ageing and the Covid pandemic

    Source: United Kingdom – Executive Government & Departments

    A study published in Nature Communications looks at brain ageing during the Covid-19 pandemic. 

    Dr Eugene Duff, Advanced Research Fellow in Informatics, Department of Brain Sciences, Imperial College London, said:

    “Mohammadi-Nejad and colleagues present a unique analysis of MRI data from the UK Biobank study to identify evidence for the impact of the COVID-19 pandemic period – independent of the infection itself – on brain health and aging.  They were able to show that, even in the absence of COVID-19 infection, living through the pandemic was associated with accelerated aging of the brain, and could point to a variety of factors potentially contributing to this acceleration, such as sex and socio-demographic background.  With this approach, the authors were able to quantify more extensive brain health associations of the pandemic period than studies focusing purely on effects of the virus itself.  However, as an observational study it is not possible to fully exclude that factors unrelated to the pandemic could contribute to the observed acceleration. While the events of the pandemic were exceptional, this work demonstrates the stark effects that the conditions of an individual’s life may have on brain and cognitive health, and the value of careful dissection of the myriad of local and global factors contributing to these conditions.”

    Prof Masud Husain, Professor of Neurology & Cognitive Neuroscience, University of Oxford, said:

    “While this is a very carefully conducted analysis, we have to be cautious with interpretation.

    “The brain age difference between the two groups (as indexed by brain scanning) was on average only 5 months, and difference in cognitive performance between groups was only on the total time taken to complete one of the tests.  Is this really going to make a significant difference in everyday life?

    “Furthermore, the time between scans was much shorter in the people scanned before and after the pandemic, compared to those who had both scans before the pandemic. We therefore don’t know if brain aging would have recovered if more time elapsed.”

    Dr Maxime Taquet, Associate Professor in the Department of Psychiatry, University of Oxford, said:

    “This landmark brain imaging study suggests that the COVID-19 pandemic may have accelerated brain ageing in some people.  By comparing scans taken more than two years apart, researchers found that the average person’s brain appeared to age an extra 5.5 months for every year lived during the pandemic.  It is important to note that the majority of people showed brain ageing at the expected rate.  However, a higher-than-usual proportion showed striking increases in brain age of an extra 15 to 20 months per year.

    “Among those infected with COVID-19, the increased brain age correlated with lower scores in a test of thinking skills like attention and problem-solving.  This might help explain why some people who had COVID-19 have impaired cognition.

    “The findings raise important questions about the long-term neurological impact of the pandemic, whether due to infection itself or the broader psychological and social stress it caused.  The authors suggest that the observed brain ageing may reflect a biopsychosocial effect combining the impact of COVID-19 infection with the psychological and social stresses of the pandemic.  However, it is also possible that the observed association is primarily biological, driven largely by undetected infections.  An analysis by the Institute for Health Metrics and Evaluation estimated that over 90% of the UK population may have been infected by the end of 2022, meaning that many participants classified as ‘uninfected’ might have had asymptomatic or undocumented cases.  This raises the possibility that viral exposure played a more central role in the study findings than assumed.

    “Another possibility is that the findings do not reflect a causal relationship and are due to a form of selection bias.  For instance, if individuals whose brains were ageing more slowly happened to be scanned sooner, and therefore before the pandemic, this could have contributed to the observed association despite the study’s efforts to rule out such confounding.

    “The study was well-designed and based on unique UK Biobank data with repeated brain scans.  The researchers also acknowledge limitations.  The sample excludes people with chronic illnesses such as diabetes and depression and the UK Biobank underrepresents the most socioeconomically deprived groups, the very populations in which the association between the pandemic and brain ageing was largest. This means the association in the general population could be even more pronounced.”

    ‘Accelerated brain ageing during the COVID19 pandemic’ by Ali-Reza Mohammadi-Nejad et al. was published in Nature Communications at 16:00 UK time on Tuesday 22 July 2025. 

    DOI: 10.1038/s41467-025-61033-4

    Declared interests

    Dr Eugene Duff: “I have no conflicts of interest.”

    Prof Masud Husain: “I don’t have any conflict of interest.”

    Dr Maxime Taquet: “I do not have a conflict of interest.”

    MIL OSI United Kingdom

  • MIL-OSI Russia: Russia expands grain export geography — Russian Minister of Agriculture

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    Moscow, July 22 (Xinhua) — In 2024, Russia for the first time supplied grain crops to 11 countries, and also resumed exports to seven countries, Russian Agriculture Minister Oksana Lut said on Tuesday, as cited by the Russian government’s press service.

    Currently, Russia exports grain crops to 108 countries, and 70 countries purchase wheat from Russia. Russia has been the leader in wheat supplies to the world market since 2016 and intends to maintain this status in the current agricultural season. By the end of 2024, the country became the world leader in barley exports for the first time.

    Prime Minister Mikhail Mishustin said that Russia plans to increase agricultural exports by 1.5 times by 2030 compared to 2021 figures. Various government support measures are provided for the development of the grain industry, including subsidies, preferential lending, and reduced tariffs for rail transportation. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI USA: New IAM Union Merch Now Available on Updated IAM Online Store!

    Source: US GOIAM Union

    The IAM Union’s refreshed branding has been a hit with our membership and beyond!

    Now, we have a way for every IAM Union member and supporter to get our brand new merch shipped directly to them.

    Visit our revamped iamuniongear.org online store to order today!

    We have the following IAM Union swag ready for purchase, with more on the way:

    • T-Shirts
    • Polos
    • Hats
    • Magnets
    • Lapel pins
    • Pencils
    • Lanyards
    • Ties and pocket squares/scarves

    In addition, our heritage IAM gear is available at bargain prices, so visit iamuniongear.org today!

    As always, IAM Union merch also remains available for purchase at IAM Headquarters and the Winpisinger Center.

    The post New IAM Union Merch Now Available on Updated IAM Online Store! appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI Security: U.S. Marshals Lone Star Fugitive Task Force Commemorates 20 Years Investigating, Apprehending West Texas Fugitives

    Source: US Marshals Service

    San Antonio, TX – The U.S. Marshals Service (USMS) is commemorating the Lone Star Fugitive Task Force’s 20 years of service as part of the Western District of Texas.

    The Lone Star Fugitive Task Force (LSFTF) is a multi-agency task force focused on the reduction of violence within the Western District of Texas through the identification, investigation, and apprehension of fugitives wanted for egregious crimes against the community. Since its inception in March 2005, the task force has investigated and apprehended over 58,991 fugitives, including 1,795 wanted for murder.  

    The Western District of Texas consists of 93,000 square miles, 68 counties, 809 miles of border with Mexico, with eight divisions located in Austin, Alpine, Del Rio, El Paso, Midland, Pecos, San Antonio and Waco.

    Notable historical cases, arrests, and awards in the Western District of Texas include: 

    In April 2017, the Austin division was presented the Outstanding Team Award at the 34th Annual 100 Club of Central Texas Awards Banquet. 

    June 2022, the Austin division conducted a fugitive investigation that led to the arrest of Kaitlin Armstrong, sought for the May 2022 murder of professional cyclist Moriah “Mo” Wilson. Armstrong was apprehended at a hostel in Costa Rica following a 43-day fugitive investigation with assistance from the U.S. Marshals Office of International Operations, Homeland Security Investigations, and the Department of State Diplomatic Security Service.

    February 2024, the Alpine division investigated the whereabouts of Ivan Ramos-Hernandez, who fled from Presidio Police, engaging them in a high-speed pursuit and firing gunshots. Ramos-Hernandez fled to Ojinaga, Mexico, where he was apprehended by Mexican authorities following a multi-agency collaboration with assistance provided from Homeland Security Investigations, Custom Border Protection, U.S. Probation, Texas Department of Public Safety Criminal Investigation Division, Presidio Police and Mexican officials. Ramos-Hernandez attempted a violent escape one last time during transport that was halted by authorities. 

    January 2022, the Del Rio division was contacted by the Gulf Coast Violent Offenders Fugitive Task Force to locate and apprehend Oscar Rosales, who was wanted for capital murder, when he shot and killed Corporal Charles Galloway with the Harris County Constables Office during a traffic stop. Rosales fired multiple rounds from an assault rifle and fled from the scene. Rosales was added to the Texas10 Most Wanted Fugitive list and was believed to have fled to Mexico. Investigators in the Del Rio division worked directly with Mexican authorities and coordinated his apprehension in Acuna, Mexico. 

    August 2017, the El Paso division initiated a fugitive investigation to apprehend Javier Gonzalez and Manual Gallegos, members of the Kinfolk Outlaw Motorcycle Gang sought for multiple counts of engaging in organized criminal activity and aggravated assault with a deadly weapon. Gonzales and Gallegos were arrested in two separate incidents within a 10-day span with additional assistance from El Paso Police Department’s SWAT team.

    April 2025, the Midland division adopted the apprehension of Noah Gilbert Olgin, who was wanted for aggravated assault with a deadly weapon, injury to a child, deadly conduct and a federal supervised release violation for possession of a firearm, following an incident where he was involved in a drive-by-shooting in Odessa, that resulted in a serious injury to a child.  Olgin was arrested in Midland with assistance from the Midland SWAT team. 

    November 2022, the Pecos division arrested Jose Hernandez, a Texas 10 Most Wanted Fugitive apprehended in Monterey, Nuevo Leon, Mexico, through a coordinated effort with the Gulf Coast Violent Offenders Fugitive Task Force and Mexican authorities. Hernandez was sought on a bond violation for two counts of aggravated sexual assault of a child. 

    January 2024, the San Antonio division joined efforts to apprehend Romeo Nance, who was wanted in connection with a mass shooting in Joliet, Illinois, that killed eight people and wounded one other person. The Great Lakes Regional Fugitive Task Force, Joliet Police Department, and the Will County Sheriff’s Department requested immediate assistance from the LSFTF who located and observed Nance at a gas station in Natalia, Texas. As members of the LSFTF attempted to contain Nance in his vehicle, he fled on foot, taking his own life with a self-inflicted gunshot wound. 

    June 2020, the Waco division was contacted by the U.S. Army Criminal Investigation Division to locate 20-year-old Pfc. Class Vanessa Guillen, a Fort Hood soldier who had been reported missing under unusual circumstances in April 2020. Joining CID’s investigation, task force members determined Guillen had been murdered by another soldier. Less than 24 hours after Guillen’s remains were located in a shallow grave near a river, the LSFTF identified Spc. Aaron David Robinson and his girlfriend Cecily Aguilar as primary suspects in her murder. As task force members attempted to take Robinson into custody, he fatally shot himself. Aguilar pleaded guilty in federal court and was sentenced to 30 years of incarceration. In 2021, the Waco Division received the Distinguished Group Award for District Task Forces at the 40th United States Marshals Service Director’s Honorary Awards in recognition of locating Guillen’s remains and identifying those responsible for her death. In July of 2022, personnel in the Waco Division were recognized for their outstanding service, selfless pursuit of justice, and assisting in bringing closure for Guillen’s family and friends by being granted the 69th Attorney General’s Award for Distinguished Service.   

    On June 2, the Waco Division received the Distinguished Group Award for the District Task Forces at the 43rd United States Marshals Service Director’s Honorary Awards for a two-year-old cold case from Leon County, involving a missing child, and possible homicide of the child’s mother. The division conducted an intensive investigation that resulted in the recovery of the mother’s decomposed remains found buried in a field and completed a multifaceted arrest operation that resulted in the arrest of the suspect and safe recovery of the missing child. During the conclusion of the arrest, multiple firearms, ammunition, body armor, and narcotics were seized, and the suspect was indicted on capital murder.

    “I am immensely proud of the Deputy U.S. Marshals and the numerous task force officers of the Lone Star Fugitive Task Force, men and women who are fully devoted to making their communities safer for their fellow citizens by apprehending offenders wanted for the most serious crimes such as murder and child abuse, while ensuring the equal application of justice for all,” said Marshal Susan Pamerleau, U.S. Marshal of the Western District of Texas.  

    U.S. Marshals task forces combine the efforts of federal, state, and local law enforcement agencies to locate and arrest the most dangerous fugitives. Fifty-eight local task forces are dedicated to reducing violent crime by locating and apprehending wanted criminals. They also serve as the central point for agencies to share information on fugitive matters.  Task force officers are state and local police officers who receive special deputations with the U.S. Marshals. While on a task force, these officers can exercise U.S. Marshals authorities, such as crossing jurisdictional lines.

    Members of the Lone Star Fugitive Task Force across the Western District of TexasSAN ANTONIO – The U.S. Marshals Service is commemorating the Lone Star Fugitive Task Force’s 20 years of service as part of the Western District of Texas.

    The Lone Star Fugitive Task Force (LSFTF) is a multi-agency task force focused on the reduction of violence within the Western District of Texas through the identification, investigation, and apprehension of fugitives wanted for egregious crimes against the community. Since its inception in March 2005, the task force has investigated and apprehended over 58,991 fugitives, including 1,795 wanted for murder.  

    The Western District of Texas consists of 93,000 square miles, 68 counties, 809 miles of border with Mexico, with eight divisions located in Austin, Alpine, Del Rio, El Paso, Midland, Pecos, San Antonio and Waco.

    Notable historical cases, arrests, and awards in the Western District of Texas include: 
    In April 2017, the Austin division was presented the Outstanding Team Award at the 34th Annual 100 Club of Central Texas Awards Banquet. 
    June 2022, the Austin division conducted a fugitive investigation that led to the arrest of Kaitlin Armstrong, sought for the May 2022 murder of professional cyclist Moriah “Mo” Wilson. Armstrong was apprehended at a hostel in Costa Rica following a 43-day fugitive investigation with assistance from the U.S. Marshals Office of International Operations, Homeland Security Investigations, and the Department of State Diplomatic Security Service.
    February 2024, the Alpine division investigated the whereabouts of Ivan Ramos-Hernandez, who fled from Presidio Police, engaging them in a high-speed pursuit and firing gunshots. Ramos-Hernandez fled to Ojinaga, Mexico, where he was apprehended by Mexican authorities following a multi-agency collaboration with assistance provided from Homeland Security Investigations, Custom Border Protection, U.S. Probation, Texas Department of Public Safety Criminal Investigation Division, Presidio Police and Mexican officials. Ramos-Hernandez attempted a violent escape one last time during transport that was halted by authorities. 
    January 2022, the Del Rio division was contacted by the Gulf Coast Violent Offenders Fugitive Task Force to locate and apprehend Oscar Rosales, who was wanted for capital murder, when he shot and killed Corporal Charles Galloway with the Harris County Constables Office during a traffic stop. Rosales fired multiple rounds from an assault rifle and fled from the scene. Rosales was added to the Texas10 Most Wanted Fugitive list and was believed to have fled to Mexico. Investigators in the Del Rio division worked directly with Mexican authorities and coordinated his apprehension in Acuna, Mexico. 
    August 2017, the El Paso division initiated a fugitive investigation to apprehend Javier Gonzalez and Manual Gallegos, members of the Kinfolk Outlaw Motorcycle Gang sought for multiple counts of engaging in organized criminal activity and aggravated assault with a deadly weapon. Gonzales and Gallegos were arrested in two separate incidents within a 10-day span with additional assistance from El Paso Police Department’s SWAT team.
    April 2025, the Midland division adopted the apprehension of Noah Gilbert Olgin, who was wanted for aggravated assault with a deadly weapon, injury to a child, deadly conduct and a federal supervised release violation for possession of a firearm, following an incident where he was involved in a drive-by-shooting in Odessa, that resulted in a serious injury to a child.  Olgin was arrested in Midland with assistance from the Midland SWAT team. 
    November 2022, the Pecos division arrested Jose Hernandez, a Texas 10 Most Wanted Fugitive apprehended in Monterey, Nuevo Leon, Mexico, through a coordinated effort with the Gulf Coast Violent Offenders Fugitive Task Force and Mexican authorities. Hernandez was sought on a bond violation for two counts of aggravated sexual assault of a child. 
    January 2024, the San Antonio division joined efforts to apprehend Romeo Nance, who was wanted in connection with a mass shooting in Joliet, Illinois, that killed eight people and wounded one other person. The Great Lakes Regional Fugitive Task Force, Joliet Police Department, and the Will County Sheriff’s Department requested immediate assistance from the LSFTF who located and observed Nance at a gas station in Natalia, Texas. As members of the LSFTF attempted to contain Nance in his vehicle, he fled on foot, taking his own life with a self-inflicted gunshot wound. 
    June 2020, the Waco division was contacted by the U.S. Army Criminal Investigation Division to locate 20-year-old Pfc. Class Vanessa Guillen, a Fort Hood soldier who had been reported missing under unusual circumstances in April 2020. Joining CID’s investigation, task force members determined Guillen had been murdered by another soldier. Less than 24 hours after Guillen’s remains were located in a shallow grave near a river, the LSFTF identified Spc. Aaron David Robinson and his girlfriend Cecily Aguilar as primary suspects in her murder. As task force members attempted to take Robinson into custody, he fatally shot himself. Aguilar pleaded guilty in federal court and was sentenced to 30 years of incarceration. In 2021, the Waco Division received the Distinguished Group Award for District Task Forces at the 40th United States Marshals Service Director’s Honorary Awards in recognition of locating Guillen’s remains and identifying those responsible for her death. In July of 2022, personnel in the Waco Division were recognized for their outstanding service, selfless pursuit of justice, and assisting in bringing closure for Guillen’s family and friends by being granted the 69th Attorney General’s Award for Distinguished Service.   
    On June 2, the Waco Division received the Distinguished Group Award for the District Task Forces at the 43rd United States Marshals Service Director’s Honorary Awards for a two-year-old cold case from Leon County, involving a missing child, and possible homicide of the child’s mother. The division conducted an intensive investigation that resulted in the recovery of the mother’s decomposed remains found buried in a field and completed a multifaceted arrest operation that resulted in the arrest of the suspect and safe recovery of the missing child. During the conclusion of the arrest, multiple firearms, ammunition, body armor, and narcotics were seized, and the suspect was indicted on capital murder.

    “I am immensely proud of the Deputy U.S. Marshals and the numerous task force officers of the Lone Star Fugitive Task Force, men and women who are fully devoted to making their communities safer for their fellow citizens by apprehending offenders wanted for the most serious crimes such as murder and child abuse, while ensuring the equal application of justice for all,” said Marshal Susan Pamerleau, U.S. Marshal of the Western District of Texas.  

    U.S. Marshals task forces combine the efforts of federal, state, and local law enforcement agencies to locate and arrest the most dangerous fugitives. Fifty-eight local task forces are dedicated to reducing violent crime by locating and apprehending wanted criminals. They also serve as the central point for agencies to share information on fugitive matters.  Task force officers are state and local police officers who receive special deputations with the U.S. Marshals. While on a task force, these officers can exercise U.S. Marshals authorities, such as crossing jurisdictional lines.

    Members of the Lone Star Fugitive Task Force across the Western District of Texas:

    • Austin Police Department-Tactical Intelligence Unit
    • Police Departments:  Anthony, Buffalo, Crystal City, Del Rio, Eagle Pass, El Paso, Georgetown, Killeen, New Braunfels, Nolanville, Round Rock, San Marcos, Uvalde, and Waco, Texas.
    • Sheriff’s Offices:  Bexar County, Coryell County, Dimmett County, Ector County, Hays County, McLennan County, Maverick County, Midland County, New Braunfels, Real County, Travis County, Val Verde County, Williamson County, and Zavala County.
    • District Attorney’s Offices: Bexar County, and Val Verde County.
    • Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF)
    • Midland Fire Marshals Office
    • Naval Criminal Investigative Service (NCIS)
    • Texas Attorney General’s Office
    • Texas Board of Criminal Justice (TBCJ) – Office of the Inspector General (OIG)
    • Texas Department of Public Safety
    • Texas Parks and Wildlife Division
    • Texas National Guard Joint Counterdrug Task Force
    • U.S. Immigration & Customs Enforcement
    • U.S. DHS/Homeland Security Investigations

    MIL Security OSI

  • MIL-OSI Analysis: I research rip currents where ‘Cosby Show’ star Malcolm-Jamal Warner drowned. Here’s why they’re so deadly

    Source: The Conversation – Canada – By Chris Houser, Professor in Department of Earth and Environmental Science, and Dean of Science, University of Waterloo

    Malcolm-Jamal Warner, the actor who played Theo Huxtable on The Cosby Show, has drowned on Costa Rica’s Caribbean coast.

    It is reported that he was swimming at Playa Cocles in Limon province when a current pulled him offshore. This is a beach popular among surfers and one that’s known to have large waves and strong currents.

    It’s also a beach that I have taken students to in order to study the formation of rip currents and to better understand what beach users know about the hazard.

    What exactly are rip currents?

    Rip currents — commonly referred to as rips or colloquially as rip tides — are found on ocean beaches and some large lakes around the world.




    Read more:
    The Great Lakes are powerful. Learning about ‘rip currents’ can help prevent drowning


    The rips at Playa Cocles and along a large part of the Costa Rican Caribbean coast are known as channel or bathymetric rips that form as the nearshore sand bar moves toward the land through the summer. The water thrown towards the land by the breaking waves returns offshore as a concentrated and fast flowing current at gaps in the nearshore sand bar.

    During storm conditions, we have measured the rip currents at Playa Cocles at over two metres per second. These rips are known to increase rapidly (or pulse) in strength due to changes in wave breaking, leading to unsuspecting swimmers being taken far offshore and exiting beyond the zone of breaking waves.

    Rip current at Playa Cocles showing change in size and strength with surfers for scale. (Chris Houser)

    While it can be difficult to spot a rip from shore, they can be identified by an area of relatively calm water between breaking waves, a patch of darker water or the offshore flow of water, sediment and debris.

    Caught in a rip current

    A person caught in a rip is transported away from shore into deeper waters, but they aren’t pulled under the water. If they are a weak swimmer or try to fight the current, they may panic and fail to find a way out of the rip and back to shore. Survivor stories highlight panic, anxiety, distress and fear, a tendency to fight the current and an inability to make a decision on how to escape the rip.

    While it is possible to “break the grip of the rip” by swimming parallel to the beach or toward breaking waves at an angle to the beach, there is no single escape strategy due to the unique rip circulation pattern.

    It’s possible to escape a rip by flipping onto your back, floating to keep your head above the water and following the current until you’re returned to the shore by the current or able to swim safely toward the shore. If you are taken beyond where the waves break, or you’re unable to swim back to shore, continue to float and signal for help.

    Rip currents account for more than 50 deaths a year in Costa Rica; approximately 19 drownings a year involve foreign tourists from the United States, Nicaragua, Canada and Germany. While most drownings in the country occur on Pacific coast beaches that are a short distance to the city of San José, more than five drownings occur each year along the Caribbean coast.

    Playa Cocles was the site of five drownings that occurred over eight days in 2004, an event that prompted tourism-dependent business owners to establish a lifeguard station on the beach.

    Costa Rican drownings

    On average, each drowning in Costa Rica costs more than US$2 million (USD). This includes the direct costs of search and rescue, the costs of repatriation and the long-term economic burden of a lost life. This is in addition to the great personal loss experienced by family and friends.

    A survey at Playa Cocles and other beaches in Costa Rica revealed that a majority of beach users did not observe warning signs and that many were unable to interpret the warning and did not change their behaviour.

    The majority of foreign drowning victims in Costa Rica had limited knowledge of rips and were unable to avoid the times and locations that were most hazardous.

    In general, visitors to a beach often use simple visual cues when deciding to take risks. Recent studies suggest that tourists think beach access points and resorts are located adjacent to safe swimming areas, particularly when visual cues such as manicured paths and promotional posters that promote swimming at those locations.

    Visitors are a high-risk group for drownings. They’re generally unfamiliar with the beach and its safety measures and often have poor knowledge of beach hazards, such as rip currents and breaking waves. This lack of knowledge can be exacerbated by language barriers, an overconfidence in swimming ability and peer pressure.

    Rip current and beach users at Playa Cocles. The red flag was placed by lifeguards to mark the location of the rip for beach users. (Chris Houser)

    Playa Cocles is a beautiful beach, but it’s known to have dangerous rips depending on the size of the breaking waves and the position of the sand bar.

    When visiting any beach — from the Caribbean to the Great Lakes — it’s important to remember that there may be rip currents and to take serious precautions.

    Chris Houser receives funding from NSERC.

    ref. I research rip currents where ‘Cosby Show’ star Malcolm-Jamal Warner drowned. Here’s why they’re so deadly – https://theconversation.com/i-research-rip-currents-where-cosby-show-star-malcolm-jamal-warner-drowned-heres-why-theyre-so-deadly-261653

    MIL OSI Analysis

  • MIL-OSI Analysis: Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach

    Source: The Conversation – Africa (2) – By Paa Kwesi Wolseley Prah, Postdoctoral Fellow, Dublin City University

    Ghana stands out in west Africa as a nation that has not experienced terrorist attacks, even though it’s geographically close to countries that have. In Burkina Faso, Mali and Nigeria, extremist groups such as Boko Haram and Islamic State in West Africa (ISWAP) have wreaked havoc.

    This resilience is not accidental. It is the result of deliberate counter-terrorism strategies employed by Ghana’s security institutions.

    Ghana’s counter-terrorism framework was set out in 2020. It has four pillars: prevent, pre-empt, protect, and respond. The idea is to coordinate multiple agencies, including the Ghana Police Service, Ghana Immigration Service, Ghana Armed Forces and the National Intelligence Bureau.

    These pillars guide strategies to address both immediate threats and underlying vulnerabilities. Poverty, religious radicalism and porous borders are common drivers of terrorism in west Africa.

    I am an international security and global governance researcher. My co-author is a government and international studies scholar.

    Four years ago we wrote a paper examining Ghana’s resilience against terrorist attacks. Our findings are still relevant given the increasing activities of terror groups in the west African region.




    Read more:
    West Africa terror: why attacks on military bases are rising – and four ways to respond


    We wanted to identify what works as a potential model for other countries.

    Using a qualitative methodology, we interviewed stakeholders — including police officers, members of the armed forces, Muslim community leaders, and immigration officials. We also analysed the national framework for preventing and countering violent extremism and terrorism.

    Our findings showed that Ghana’s success is traceable to an approach that integrates community engagement with advanced border technology, inter-agency training, media collaboration and intelligence operations. And it addresses both immediate and underlying threats.

    We argue that Ghana’s ability to balance prevention with security offers solutions for stability in a geopolitically volatile region.




    Read more:
    Ghana’s new president faces tough regional security problems: why he’s well-placed to tackle them


    Community engagement

    One of the standout strategies is community engagement. This serves multiple purposes, from guiding people away from extremism to gathering intelligence.

    The Ghana Police Service, for instance, engages Muslim-dominated communities, known as “Zongos”, to counter radical Islamic ideologies that could be exploited by terrorist groups.

    By collaborating with local religious leaders, police make communities aware of the dangers of radicalisation. They foster trust and encourage residents to report suspicious activities. This approach also works in tackling illegal arms circulation.

    Ghana has an estimated 2.3 million small arms in circulation – 1.1 million of them illegally possessed. The availability of so many weapons fuels terrorist activities across west Africa.

    Community based de-radicalisation aligns with global best practices. In Norway, for instance, it was used to disengage youth from extremist groups.

    Technology at borders

    Ghana’s border control management is another part of its counter-terrorism strategy. Ghana Immigration Service uses advanced security software and integrated systems like the “Immigration 360” system, designed to fully automate passenger processing and data management.

    The system manages records of fingerprints and other data to improve reporting and intelligence sharing between Ghana Immigration and other security agencies.

    The technology makes it possible to quickly identity individuals on terrorist watchlists and detects concealed goods. This helps prevent illegal cross-border movements.

    There are gaps in Ghana’s defences, however. The influx of migrants fleeing extremist violence in Burkina Faso, Mali and Niger in 2024 highlights the urgency of scaling up investments in the technology.




    Read more:
    West Africa could soon have a jihadist state – here’s why


    Training for preparedness

    Ghana combats new and varying forms of terrorism by uncovering trends and training personnel to deal with them.

    A notable example was the six-day joint training in 2022 involving the Ghana Immigration Service, Police Service, Customs, Economic and Organised Crime Office, and the National Intelligence Bureau.

    The country also works with regional neighbours like Burkina Faso, Togo and Benin, and partners such as the United States, through initiatives like “Operation Epic Guardian”.

    Media as a strategic partner

    Terrorists rely on media to amplify fear and publicise their causes. Ghana’s security agencies counter this tactic by actively engaging media houses to report accurately.

    The Ghana Armed Forces, for instance, works with media to debunk false reports, which can cause public panic and inadvertently aid terrorists.

    The Ghana Police Service emphasises regular dialogue with media to ensure sensitive information is verified before publication, reducing the risk of tipping off suspects. However, media competition for viewers poses a challenge.

    Surveillance and intelligence gathering

    Surveillance and intelligence gathering is critical. Plainclothes armed forces and immigration personnel blend into communities to monitor potential threats. The approach has worked but is constrained by resources.

    It can also risk human rights violations, such as wrongful profiling, and is less effective against multiple targets compared to technological solutions like facial recognition or CCTV.




    Read more:
    Funding terror: how west Africa’s deadly jihadists get the money they need to survive


    Challenges and regional implications

    Despite its successes, Ghana’s counter-terrorism framework faces challenges that could undermine its long-term efficacy:

    • logistical and financial constraints

    • the influx of migrants fleeing regional violence

    • a lack of harmonised security cultures within the regional body, Ecowas.

    In all, Ghana’s strategies offer lessons for west Africa, where terrorism is a growing threat.

    Its community engagement model could be followed in Nigeria, Burkina Faso, Mali and Niger to counter radicalisation and arms proliferation, provided it avoids religious stereotyping.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Ghana’s security strategy has kept terror attacks at bay: what other countries can learn from its approach – https://theconversation.com/ghanas-security-strategy-has-kept-terror-attacks-at-bay-what-other-countries-can-learn-from-its-approach-260333

    MIL OSI Analysis

  • MIL-OSI Analysis: Livestock and lions make uneasy neighbours: how a fence upgrade helped protect domestic and wild animals in Tanzania

    Source: The Conversation – Africa (2) – By Jonathan Salerno, Associate Professor, Colorado State University, Colorado State University

    Protecting livestock in areas where large carnivores (like lions) live is increasingly important as human land use expands, wildlife habitat shrinks, and climatic changes reshape the ways in which humans and wildlife interact. Protecting the carnivores from livestock owners is important too. Intact carnivore populations support more resilient food webs and the ecosystem services they provide.

    It’s not easy for people, livestock, and carnivores to live together without conflict, though. One of the best ways to reduce conflict is to protect livestock like cattle and sheep from being attacked by predators.

    There are various methods to do this, like guarding livestock or erecting fences. That’s all very well for the livestock inside the fences, but do predators simply turn to the nearest unprotected livestock for their meal instead? Are the neighbours’ cattle, sheep, and goats at greater risk? This question hasn’t been explored much by researchers.

    We’re a group of conservation practitioners and scientists who have studied the interactions of carnivores, livestock, and people in Tanzania and elsewhere for decades to try and find solutions to conflict problems.

    Our study area is next to a national park which protects important populations of lion, leopard, hyena, African wild dog, and cheetah. The people who live here have traditionally kept their livestock overnight in enclosures made of acacia-thorn branches. More recently, some of them have built pens, or corrals, from tall chain link fencing. We knew from years working with communities and from previous research that these fortified corrals were effective at keeping livestock safe from predators.

    Our next step was to find out whether this made other nearby livestock less safe.




    Read more:
    What’s behind the conflict between people and animals in Tanzania


    The results were intriguing. We found that the new enclosures made predation less likely in the nearby traditional enclosures too.

    This type of beneficial spillover effect had yet to be documented in other systems where interventions aim to protect livestock from large carnivores.

    Our results show that in conservation, it’s important to look closely at complex local dynamics. The findings may help explain why there’s so much uncertainty about the effectiveness of various human–wildlife conflict mitigation strategies.

    Beneficial spillover effects

    People who keep livestock in east Africa have long had strategies to keep their animals safe from large carnivores. Sometimes acacia-thorn night enclosures (known locally as bomas), intensive herding practices, and guarding dogs work well.

    Other times, and especially in communities within and adjacent to large, protected carnivore populations, traditional strategies fall short.

    This is the case in Tanzania’s Ruaha-Rungwa Landscape. In our study area adjacent to Ruaha National Park, any pastoralist or agropastoralist (herding and crop farming) household has about a 30% chance of losing one or more animals to predation each year. This is a serious economic loss on top of important cultural and emotional costs.




    Read more:
    Losing a calf to wolves in Sweden hurts. But if lions take one in Uganda, a farming family’s income is gone


    Lion Landscapes, an organisation that some of us have been running for over a decade, works to support human-carnivore coexistence. Adjacent to Ruaha, we have been partnering with households to build 1.8-metre chain-link corrals. We subsidise them. Households contribute 25% of the cost and some of the labour for construction.

    We analysed about 25,000 monthly reports of livestock predation in fenced and traditional enclosures, using statistical models. There were 846 predation events over nearly four years. Unexpectedly, while we did detect spillover effects, these appeared to be beneficial. Rather than displacing conflicts, fortified enclosures actually conferred protective effects on their traditional-enclosure neighbours.

    For example, households within 50 metres (the minimum observed distance) of a fortified enclosure were half as likely to experience predation compared with distant households 2 kilometres away. And these beneficial effects increased with the number of fortified enclosures in a neighbourhood. Finally, the effects appeared to be durable over time.

    The fortified enclosures were extremely effective. We showed that households could break even after paying for the fence in just a few years through avoided livestock losses. And we know that when domestic animals aren’t being killed, their owners are more tolerant of predators. We didn’t record carnivore killings in this study but it has happened fairly frequently in the area in the past.

    In a few of the world’s human-wildlife conflict systems, where data exist to assess spillover effects, there is evidence that detrimental spillovers do occur. For instance, beehive deterrents may redirect elephants to nearby crop fields, or lethal removal of individual wolves may redirect the surviving pack to prey on adjacent ranches. Nevertheless, these are very under-studied interactions.

    Livestock management and carnivore coexistence

    In systems where humans, livestock, and wildlife overlap and sometimes come into conflict, management strategies too often focus on wildlife. Another option is to reduce whatever attracts wildlife. In the case of large carnivores, this means managing livestock.




    Read more:
    Livestock are threatened by predators – but old-fashioned shepherding may be an effective solution


    Our results support this approach by demonstrating that management and protection of livestock is fundamental for reducing conflict, and can benefit not only livestock owners but landscape-level coexistence.

    Conservationists and policy-makers need to encourage these practices that benefit people, carnivores, and livestock in shared landscapes.

    Amy Dickman works for Lion Landscapes as the Joint CEO

    Jonathan Salerno, Kevin Crooks, Rekha Warrier, and Stewart Breck do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Livestock and lions make uneasy neighbours: how a fence upgrade helped protect domestic and wild animals in Tanzania – https://theconversation.com/livestock-and-lions-make-uneasy-neighbours-how-a-fence-upgrade-helped-protect-domestic-and-wild-animals-in-tanzania-258113

    MIL OSI Analysis

  • MIL-OSI United Kingdom: Community efforts lead to Green Flags for Perth park’s gardens

    Source: Scotland – City of Perth

    In the run up to the national Love Parks Week (26 July to 3 August 2025) which highlights the vital role green spaces play in boosting the health and wellbeing of residents and communities, local ‘in bloom’ charity Beautiful Perth and Perth and Kinross Council will be marking the achievement of two Green Flag Community Awards* from Keep Scotland Beautiful (KSB) for the Heather Garden and Compassionate Friends Garden, both in Bellwood Riverside Park on the banks of the River Tay in Perth.  

    The Heather Garden has been a real partnership project between Beautiful Perth and the Council, with discussions beginning in 2011 and work getting underway on site in 2012 to transform and refresh a previously overgrown and less appealing area of the park. The garden now comprises 15 beds containing 600 varieties and over 16,000 heather plants, all maintained and managed by Beautiful Perth, providing year-round colour for visitors and a haven for insect pollinators. The charity was also in 2022 awarded the National Collection of Erica carnea heathers by Plant Heritage.  This follows on from the unique achievement of Riverside Park winning Best Park in the UK in the RHS Britain in Bloom Awards in both 2018 and 2019.  

    The Compassionate Friends Garden was developed to create a picturesque, peaceful garden for reflection and contemplation following a request from the Compassionate Friends UK, a charity that supports bereaved parents, siblings and grandparents. In 2012 remedial work done by the Council and Beautiful Perth uncovered a small round turreted stone building dating back to the 1800’s on site. The building forms the focal point of the garden, with further work uncovering a waterway and wells. The space was then transformed with sustainable pollinator plants for all year colour and interest by Beautiful Perth volunteers as well as the planting of rowan and snakeskin maple trees with marker stones and a sculpture of a robin. In 2018, Compassionate Friends held their annual gathering in Perth and unveiled a new bench for visitors and at the entrance to the garden, a beautiful carved commemorative stone.  

    Vice-Convener of Climate Change and Sustainability, Councillor Liz Barrett said: “As we head towards Love Parks Week, the fantastic achievement of Green Flag Awards for these two very different but equally beautiful gardens reflects how vital parks and open spaces are for our health and wellbeing as places to relax, exercise, appreciate the outdoors and nature and much more. 

    “I’d like to thank Beautiful Perth, and volunteer groups in other parts of Perth and Kinross, for their key role in maintaining and developing green spaces that benefit us all and contribute to improving our environment and biodiversity. Everyone can help, whether by volunteering locally or simply taking a few minutes to feedback to our Community Greenspace team about biodiversity in your local park.” 

    Chair of Beautiful Perth, Gordon Lindsay commented: “Our volunteers over many years have taken a genuine pride in cultivating and maintaining the Compassionate Friends and Heather Gardens to a high standard.  

    “Both gardens exhibit a unique horticultural skill level appreciated by the many visitors and tourists to Riverside Park and importantly provide an ideal haven for bees, butterflies and other wildlife. 

    “The Green Flag Awards are the “icing on the cake” for the ‘Beautiful Perth’ volunteers acknowledging their tireless work and efforts in a special corner of Perth.  We would also like to acknowledge and thank our supporters, Perth and Kinross Council, The Gannochy Trust, the Heather Society and Kilmac.” 

    Jamie Ormiston, Training and Accreditation Coordinator at Keep Scotland Beautiful, said: “Parks across Scotland are vital spaces for people of all ages to reconnect with nature and I’m delighted we once again have Green Flag Award winners all over the country – including plenty of new areas – for people to enjoy during the summer months. 

    “The Heather Garden and Compassionate Friends Garden are two of our new Community Award winners and their awards show the dedication, care and commitment of all involved in maintaining and improving Riverside Park. 

    “Our stalwart winners have a brilliant history of commitment to environmental excellence and a desire to offer visitors a safe and enjoyable place to visit.  

    “Our new winners have shown a similar desire and their journey is only just beginning but I look forward to many more wins in the future.” 

    *The Green Flag Awards are awarded to parks and green spaces that can demonstrate excellent management and environmental standards. Further information on the Awards can be found at Keep Scotland Beautiful’s website.

    MIL OSI United Kingdom

  • MIL-OSI United Nations: UN’s Guterres declares fossil fuel era fading; presses nations for new climate plans before COP30 summit

    Source: United Nations 2

    In a special address at UN Headquarters in New York, Mr. Guterres cited surging clean energy investment and plunging solar and wind costs that now outcompete fossil fuels.

    The energy transition is unstoppable, but the transition is not yet fast enough or fair enough,” he said.

    The speech, A Moment of Opportunity: Supercharging the Clean Energy Age – a follow‑up to last year’s Moment of Truth – was delivered alongside a new UN technical report drawing on global energy and finance bodies.

    “Just follow the money,” Mr. Guterres said, noting that $2 trillion flowed into clean energy last year, $800 billion more than fossil fuels and up almost 70 per cent in a decade.

    Key points from the address

    • Point of no return – The world has irreversibly shifted towards renewables, with fossil fuels entering their decline
    • Clean energy surge – $2 trillion invested in clean energy last year, $800 billion more than fossil fuels
    • Cost revolution – Solar now 41 per cent cheaper and offshore wind 53 per cent cheaper than fossil fuel alternatives.
    • Global challenge – Calls on G20 nations to align new national climate plans with the 1.5°C target of the Paris Agreement
    • Energy security – Renewables ensure “real energy sovereignty”
    • Six opportunity areas – Climate plan ambition, modern grids, sustainable demand, just transition, trade reform, and finance for emerging markets.

    A shift in possibility

    He noted new data from the International Renewable Energy Agency (IRENA) showing solar, once four times costlier, is now 41 per cent cheaper than fossil fuels.

    Similarly, offshore wind is 53 per cent cheaper, with more than 90 per cent of new renewables worldwide beating the cheapest new fossil alternative.

    This is not just a shift in power. It is a shift in possibility,” he said.

    Renewables nearly match fossil fuels in global installed power capacity, and “almost all the new power capacity built” last year came from renewables, he said, noting that every continent added more clean power than fossil fuels.

    Clean energy is unstoppable

    Mr. Guterres underscored that a clean energy future “is no longer a promise, it is a fact”. No government, no industry and no special interest can stop it.

    Of course, the fossil fuel lobby will try, and we know the lengths to which they will go. But, I have never been more confident that they will fail because we have passed the point of no return.

    He urged countries to lock ambition into the next round of national climate plans, or NDCs, due within months. Mr. Guterres called on the G20 countries, which are responsible for 80 per cent of emissions, to submit new plans aligned with the 1.5°C limit and present them at a high‑level event in September.

    Targets, he added, must “double energy efficiency and triple renewables capacity by 2030” while accelerating “the transition away from fossil fuels”.

    Real energy sovereignty

    The Secretary-General also highlighted the geopolitical risks of fossil fuel dependence.

    “The greatest threat to energy security today is fossil fuels,” he said, citing price shocks after Russia’s invasion of Ukraine.

    There are no price spikes for sunlight, no embargoes on wind. Renewables mean real energy security, real energy sovereignty and real freedom from fossil-fuel volatility.

    Six opportunity areas

    Mr. Guterres mapped six “opportunity areas” to speed the transition: ambitious NDCs, modern grids and storage, meeting soaring demand sustainably, a just transition for workers and communities, trade reforms to broaden clean‑tech supply chains, and mobilising finance to emerging markets.

    Financing, however, is the choke point. Africa, home to 60 per cent of the world’s best solar resources, received just 2 per cent of global clean energy investment last year, he said.

    Only one in five clean energy dollars over the past decade went to emerging and developing economies outside China. Flows must rise more than five-fold by 2030 to keep the 1.5-degree limit alive and deliver universal access.

    Mr. Guterres urged reform of global finance, stronger multilateral development banks and debt relief, including debt‑for‑climate swaps.

    The fossil fuel age is flailing and failing. We are in the dawn of a new energy era,” he said in closing.

    That world is within reach, but it won’t happen on its own. Not fast enough. Not fair enough. It is up to us. This is our moment of opportunity.

    MIL OSI United Nations News

  • MIL-OSI Canada: CBSA seizes 187.5 kg of cocaine at the Ambassador Bridge leading to criminal charges by the RCMP

    Source: Government of Canada News (2)

    July 22, 2025    Windsor, Ontario    Canada Border Services Agency 

    On May 23, 2025, Canada Border Services Agency (CBSA) border services officers at the Ambassador Bridge port of entry intercepted 187.5 kg of suspected cocaine concealed in the trailer of a commercial truck coming into Canada from the United States. 

    During a secondary examination of the trailer, CBSA officers discovered 2 suitcases and 5 garbage bags containing 161 bricks of suspected cocaine. The approximate value of the cocaine is $23.4 million.  

    CBSA officers seized the drugs and arrested the driver, Kambiz Karandish, 55, of Richmond Hill, Ontario, and transferred him and the suspected cocaine to the custody of the Royal Canadian Mounted Police (RCMP). Karandish has been charged by the RCMP with Importation of Cocaine, and Possession of Cocaine for the Purpose of Trafficking under the Controlled Drugs and Substances Act.

    The CBSA and the RCMP are committed to protecting our communities from harmful contraband and organized crime. 

    The investigation is ongoing. 

    MIL OSI Canada News

  • MIL-OSI Canada: Saskatchewan, Ontario and Alberta to Advance Pipelines, Critical Minerals and Energy Export Infrastructure

    Source: Government of Canada regional news

    Released on July 22, 2025

    Provinces sign agreement to secure markets, support investment and strengthen supply chains.

    Today, Saskatchewan Premier Scott Moe, Ontario Premier Doug Ford and Alberta Premier Danielle Smith signed a Memorandum of Understanding (MOU) to coordinate the safe transportation and export of Western Canadian oil, natural gas and critical minerals to refineries, seaports and storage facilities across Canada and beyond.  

    “We are sending a clear signal that Canada’s energy future will be built by Canadians, for Canadians,” Moe said. “This agreement commits our provinces to work together to unlock new markets, shore up our supply chains from mine to port and advocate for the federal reforms our industry needs. By advancing pipelines, rail connections and critical-mineral processing capacity, we are safeguarding thousands of jobs, strengthening our energy security and fostering sustainable growth.”

    The MOU establishes a collaborative framework to explore multiple pipeline and rail corridors, and expansion of processing hubs for critical minerals. All of this will create new and critical avenues to reach domestic and international markets.

    “As the world grapples with President Trump’s unfair tariffs, it is more important than ever to build a resilient and self-reliant economy here at home,” Ford said. “This agreement sends a clear message: Ontario, Alberta and Saskatchewan are ready to get shovels in the ground and move forward on projects that will secure our long-term prosperity.”  

    The agreement will help strengthen interprovincial trade by linking Saskatchewan, Ontario and Alberta through shared infrastructure development and coordinated market strategies.  

    “We are taking action to grow our economy, build real infrastructure and get major projects moving,” Smith said. “Alberta is proud to lead the way in uniting with provinces that share a vision for responsible development, economic freedom and common sense. We are standing up for our oil and gas sector and making sure our world-class resources reach the markets that need them. Together, Alberta, Ontario and Saskatchewan are showing what is possible when provinces step up. This agreement is about building a stronger, more connected Canada, one project at a time.”

    The Government of Saskatchewan is proud to be a leader and advocate for free and fair trade. Last week, Saskatchewan called on all provinces and territories to join Canada’s largest barrier-free interprovincial market, the New West Partnership Trade Agreement. This economic region of over 11 million Canadians has a combined GDP exceeding $818 billion.

    The province also continues to take part in the Committee on Internal Trade (CIT), which includes enhancing the Canadian Free Trade Agreement (CFTA), reducing regulatory and administrative burdens to interprovincial trade, and facilitating labour mobility.

    On July 8, CIT announced significant progress, including:

    • Reducing party-specific exceptions under the CFTA by a further 30 per cent.
    • Concluding negotiations of the financial services chapter.
    • Advancing mutual recognition through a pilot project in the trucking sector and negotiating towards a mutual recognition agreement on the sale of goods.  
    • Cross-Canada commitment to a 30-day service standard for processing labour mobility applications.
    • A Memorandum of Understanding on direct-to-consumer alcohol sales, co-led by Saskatchewan and Ontario, involving ten jurisdictions across Canada to support consumers being able to order their favourite Canadian wine, spirit, beer or other alcoholic beverage, directly from the producer, for personal consumption.

    -30-

    For more information, contact:

    MIL OSI Canada News

  • MIL-OSI Europe: Eurojust helps catch alleged author of threatening emails to schools in Czechia, Slovakia and Latvia

    Source: European Union 2

    Eurojust has assisted the authorities in the Czech Republic, Slovakia and Latvia with the apprehension of the alleged perpetrator who was responsible for sending thousands of emails in September last year threatening schools with explosions. The mass threats, which were also sent to other educational institutions and leisure centres, caused major public concern and led to the suspension of classes at the beginning of the school year.

    Eurojust supported the national authorities involved by setting up a joint investigation team (JIT) dedicated to the case, as well as providing additional cross-border judicial support.

    The alleged perpetrator also used the social network Telegram to spread his threats. He was apprehended in the Ukrainian city of Dnipro last week but was released pending potential further steps to be taken by the authorities.

    © Dnipropetrovsk Regional Prosecutor’s Office

    Given the mass scale of the threats at the same time across three countries, the police authorities involved coordinated their investigations, assisted by the setting up of the JIT. The joint investigative efforts, using the cybercrime expertise of the police, led to the identification of an alleged perpetrator, operating from the Ukrainian city of Dnipro.

    With the participation of Czech and Slovak police officers, a joint action took place in Dnipro last week, during which the alleged perpetrator was apprehended and one individual was questioned. Furthermore, two locations were searched, which led to the seizure of computer equipment.

    Thanks to the good and close cooperation of all the authorities concerned, the operation was successfully carried out under extremely difficult circumstances, very close to the frontline of the war in Ukraine, with Ukrainian, Czech and Slovak officers exposed to heavy risks.

    Eurojust offered support not only through the establishment of the JIT but also by organising a coordination meeting to prepare for the joint action day in Ukraine. The operation was carried out at the request of and by the following authorities:

    • Czech Republic: High Public Prosecutor’s Office in Prague; National Counterterrorism, Extremism and Cybercrime Agency (NCTEKK)
    • Latvia: Rīga Pārdaugava Prosecution Office; 1st Unit of Cybercrime Enforcement Department of the Central Criminal Police Department of the State Police
    • Slovakia: General Prosecutor´s Office of the Slovak Republic; Police Department West, Anti-Crime Unit, Bureau for Combating Organized Crime of the Presidium of the Police Corps (Police ACU); Counter Terrorism Centre, Presidium of the Police Corps
    • Ukraine: Dnipropetrovsk regional Prosecutor’s Office; Main Department of National Police in Dnipropetrovsk region; Division for Combating Cybercrime in Dnipropetrovsk region of the Cyber Police Department of National Police of Ukraine

    MIL OSI Europe News

  • MIL-OSI Europe: Galileo launches first worldwide authentication service

    Source: European Union 2

    EUSPA today announced the forthcoming official launch of the Galileo Open Service – Navigation Message Authentication (OSNMA), a new authentication mechanism that lets OS users verify the authenticity of the data used for the GNSS positioning and timing on 24 July.

    Coming at a time when attacks on GNSS signals, such as spoofing, are on the rise, OSNMA provides a critical layer of protection. Spoofing involves the transmission of counterfeit satellite signals that deceive GNSS receivers, potentially resulting in false and unreliable positioning. These events can affect critical applications in transportation, finance, telecommunications, information technology, energy, utilities, manufacturing, health services, emergency services and law enforcement, in which GNSS, and in particular Galileo, is used. In sectors such as aviation or maritime, this can lead to serious safety risks.

    The Galileo OSNMA mitigates these threats by allowing users to confirm that the data they receive is genuinely from Galileo and has not been tampered with. It works by embedding cryptographic data, or a digital signature, into the navigation message (I/NAV) broadcast on the E1-B signal.
    Because the OSNMA is transmitted in the Galileo Open Service signal, which is already used in most devices, receivers only need to implement the protocol and download the certified public keys from the European GNSS Service Centre (GSC) website. OSNMA service relies as well on the implementation of dedicated logic on the receiver side to guarantee the end-to-end authentication process. The service does not require the storage and management of secret keys on the user side, which facilitates the adoption in different communities. Importantly, the OSNMA mechanism does not alter Galileo’s existing signal structure, ensuring that Open Service navigation performance remains unaffected.

    While OSNMA does not prevent spoofing or jamming, it makes spoofing significantly harder by authenticating the data and making the Galileo signal unpredictable and harder to replicate. It also enhances the system’s resilience, giving users an important tool in detecting and responding to threats.

    “Stakeholders have clearly articulated a need for more robust GNSS services. The Galileo OSNMA delivers this robustness and, in doing so, provides enhanced security in positioning and timing solutions.“ Rodrigo DA COSTA, EUSPA Executive Director

    “The OSNMA Initial Service declaration has been authorised by the EU Space SAB following independent security checks and cooperation with the Programme to define risk mitigation measures. The cooperation between the SAB, the Commission and EUSPA was instrumental to getting through this very important milestone.” Philippe BERTRAND, EU Space Security Accreditation Chair

    The launch of Galileo OSNMA marks another milestone in the EU’s commitment to secure and reliable space-based services.

    The OSNMA declaration of service follows an extensive testing phase in which GNSS manufacturers, integrators, and application developers assessed the service across diverse scenarios using the Signal in Space (SiS). With this launch, Galileo becomes the first GNSS in the world to offer authentication globally as part of its Open Service — a major step in reinforcing Europe’s leadership in secure satellite navigation.

    The OSNMA is provided by EUSPA, the operational service provider for Galileo.

    MIL OSI Europe News

  • MIL-OSI United Kingdom: Schools in Westminster to receive up to £8K to boost pupils’ health and wellbeing | Westminster City Council

    Source: City of Westminster

    Twenty-five schools in Westminster have received up to £8,000 in grant funding to improve pupils’ health and wellbeing.

    The school health and wellbeing survey, a Westminster City Council initiative administered by the Schools Health Education Unit (SHEU), was implemented in 25 schools across the city in 2024. The survey, covering topics such as emotional health and wellbeing, safety, food and diet and physical activity, collected responses from 1,357 pupils.

    The survey results have helped the council understand what children need to improve their health and wellbeing and it has given schools a valuable insight into their pupils’ lives. 

    Following the survey, each school has received their confidential report and a grant to act on the findings relevant to their pupils – £5,000 for primaries and £8,000 for secondaries and special schools.

    Gabby Woolf, Vice Principal of King Solomon Academy, said:

    “King Solomon Academy is very grateful to have received a grant from Westminster after participating in the school health and wellbeing survey, which is especially crucial in these times of scarcity. Our findings have shown supporting pupils’ emotional health and wellbeing is important for their health and education. The grant has allowed us to better fund our therapeutic counselling provision, which is run by Place 2 Be and has been a huge support for pupils’ emotional wellbeing and mental health.”

    Cllr Nafsika Butler-Thalassis, Cabinet Member for Adult Social Care, Public Health and Voluntary Sector, said:

    “The voices of children and young people are crucial for designing comprehensive health and wellbeing programmes that answer to their needs. This survey and funding will give schools the knowledge and resources needed to act on the issues that matter most to their pupils, whether that is online safety, mental wellbeing or physical health. It reflects our continued commitment to building a healthier and fairer community for our children in Westminster.”

    The council currently leads on a range of health and wellbeing services and initiatives for children and young people:

    • The School Health Service has been enhanced with a wider emotional and mental health offer. It has been delivering asthma training (as part of the Asthma Friendly School initiative) and developing school partnership agreements.
    • The funding for the Mental Health Youth Worker service has been extended for two years to support the emotional wellbeing and mental health of children and young people attending Youth Hubs in Westminster.
    • The Edward Wilson Primary School Superzone has been created to help school children play safely, breathe clean air, be active, enjoy a healthy diet and thrive.

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: A new chapter for young adults with learning disabilities in Portsmouth

    Source: City of Portsmouth

    Portsmouth City Council secured funding to purchase a vacant building and transform it into a home for seven young people with complex support needs, some of whom have been living out of area for their education.

    The project was born from a shared ambition: to bring these young people back to Portsmouth for their move into adulthood, closer to their families and communities, and to provide them with a safe, supportive environment where they can live independently.

    The home features six ensuite rooms with communal living spaces and one self-contained flat. The new tenants will benefit from 24-hour support provided by a registered care provider, with the council acting as landlord.

    The young adults will also have access to a wide range of local health and social care services, including day opportunities and sporting activities tailored to adults with learning disabilities.

    Their new home was opened with a celebration to mark the occasion, thanking the many teams and individuals who have made this vision a reality and, importantly, to give the new tenants and their families the chance to look around their new home ahead of their move.

    Michelle (pictured with the Lord Mayor and Lady Mayoress), is the Mum of one of the new tenants, and is delighted with her son’s new home. She said:

    “For me, this is going to have a positive impact in terms of feeling there is a future for my son – and we haven’t had to make a choice under pressure or take something we weren’t 100% comfortable with. I love the setting – it doesn’t feel like a residential care facility; it feels like a student house. I love the fact that he’s going to be with people of similar age and needs. He has a lot of energy, so he’ll adore the garden, looking out onto trees – it’ll be amazing for him.”

    Cllr Steve Pitt, Leader of the Council with responsibility for Culture, Regeneration & Economic Development said:

    “This project shows the dedication and commitment of multiple teams across the council – showcasing “one council” working.

    From identifying the building and overseeing its refurbishment, to coordinating care and support services, every step has been guided by a shared vision and provides a place for these young adults to live independently.”

    From left to right: Leila Ferguson (Portsmouth Lady Mayoress), Michelle (Mum of new tenant) and Cllr Gerald Vernon-Jackson (Portsmouth Lord Mayor) at an open morning for the new accommodation.

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: UK Carrier Strike Group contributes to Exercise Talisman Sabre

    Source: United Kingdom – Executive Government & Departments 3

    News story

    UK Carrier Strike Group contributes to Exercise Talisman Sabre

    The UK Carrier Strike Group has led a major British contribution to the large multinational exercise in Australia.

    Crown copyright

    More than 3,000 British forces are taking part in the largest military exercise Australia has ever hosted, as the UK’s Carrier Strike Group (CSG25) demonstrates Britain’s unwavering commitment to Indo-Pacific security. 

    The Carrier Strike Group is in Australia as part of Operation Highmast, the major global deployment that demonstrates Britain’s strategic commitment to the Indo-Pacific. 

    From British Gurkhas to US Marines to Australian Defence Force amphibious specialists, Exercise Talisman Sabre 25 serves as one of the deployment’s key moments, bringing together multinational forces to strengthen and test how nations can work together to safeguard global trade routes and maintain regional stability. 

    Spanning across a vast area in Western Australia, the Northern Territory, Queensland, and New South Wales, the Australian-US led biennial exercise is bigger than ever, involving over 35,000 military personnel from 19 nations – making Talisman Sabre the largest exercise of the CSG’s deployment and one of the largest military exercises in the world this year. For the first time, offshore activities will also be conducted in Papua New Guinea.    

    Defence Secretary John Healey said:  

    The historic bonds between Britain and Australia run deep, and through AUKUS and exercises like Talisman Sabre we are strengthening these ties for the challenges of tomorrow.  

    Our commitment to the Indo-Pacific is unwavering, as this huge military exercise demonstrates. The unprecedented scale showcases the growing importance of cooperation in addressing shared challenges. We will continue to work alongside our closest allies to maintain the security and stability that underpins global prosperity. 

    Commodore James Blackmore said:  

    This is a real demonstration of the UK and our partners’ warfighting capabilities.   

    As the first UK-led multinational Carrier Strike Group to Talisman Sabre this is a powerful demonstration of our commitment to the Indo-Pacific region.  

    Exercise Talisman Sabre is also an opportunity for the UK to develop new levels of integration between systems and capabilities with the US, Australia, and other partners, enhancing our interoperability even further and to unprecedented levels.

     All three branches of the UK Armed Forces are engaged, with the Royal Marines playing a central role throughout the exercise alongside a Ranger Battalion from the Army and RAF Voyager aircraft. 

    The exercise strengthens operational cooperation with international partners, ensuring our collective ability to maintain the rules-based international order that underpins global trade and security.  

    The Royal Navy, alongside its AUKUS partners, is testing cutting-edge sub-sea and seabed warfare capabilities, showcasing interoperability across our navies. Additionally, for the first time, AUKUS nations will demonstrate the ability to remotely control Extra Large Uncrewed Underwater Vehicles (XL-UUVs) from a remote operating centre. 

    Through DSTL via the Resilience Autonomy and AI Technology collaboration, nations tested autonomy-enabled systems able to find and strike an advancing adversary. This experimentation provided a realistic combat environment for AUKUS to operate as an AI-enabled, integrated force, exploiting cutting-edge technology to ensure strategic advantage against a range of simulated adversaries. 
     
    The CSG25 deployment reinforces the government’s Plan for Change by strengthening international partnerships that underpin economic growth and national security, keeping Britain secure at home and strong abroad. Operation Highmast occurs against the backdrop of the government’s landmark commitment to increasing defence spending to 2.6% of GDP. 

    This historic investment underpins the government’s mission-led approach to securing Britain’s future, providing the economic stability necessary for growth whilst ensuring the UK maintains cutting-edge capabilities such as the Carrier Strike Group to meet emerging global threats.

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: New Forensic Science Regulator appointed for England and Wales

    Source: United Kingdom – Government Statements

    News story

    New Forensic Science Regulator appointed for England and Wales

    The regulator ensures that the highest standards in forensic science are met across the criminal justice system.

    Dr Marc Bailey has been appointed as the Forensic Science Regulator for England and Wales.

    Dr Bailey is a scientist who has significant regulatory experience. He has held multiple roles within the Medicines and Healthcare products Regulatory Agency (MHRA) and led international research in quality systems and standardisation, including whilst working at the National Physical Laboratory.

    The Forensic Science Regulator is responsible for ensuring that the provision of forensic science services across England and Wales meet the highest standards of quality and integrity. This includes assessing compliance, providing advice to ministers, setting quality standards and ensuring that all forensic science providers adhere to these standards.

    Dr Bailey will work closely with the police, forensic science providers and the legal profession to ensure that forensic science in England and Wales remains at the forefront of innovation and reliability.

    Dr Bailey will officially assume his duties after Gary Pugh’s term concludes on 25 July 2025.

    Crime and Policing Minister Dame Diana Johnson said:

    Dr Bailey is going to bring a wealth of experience and expertise as the new Forensic Science Regulator.

    This pivotal role is essential in ensuring the highest standards of forensic science are upheld.

    By setting rigorous standards and providing robust oversight, the Forensic Science Regulator will continue to ensure that forensic science supports the work of the police, allowing them to investigate crimes and bring justice for victims.

    I’d like to thank Gary Pugh for his previous work in this role.

    Dr Bailey said:

    I am delighted to be appointed to the post of Forensic Science Regulator.

    I look forward to enacting and developing the regulation of Forensic Science and working with the team that support my role to ensure that the criminal justice system has full confidence in forensic science evidence.

    Updates to this page

    Published 22 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Nations: Secretary-General’s remarks to the Security Council – on Multilateralism and Peaceful Settlement of Disputes [bilingual as delivered; scroll down for all-English and all-French versions]

    Source: United Nations secretary general

    Mr. President, Excellencies,                                                       

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.

    The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.

    The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate… when unresolved disputes fuel the flames of conflict…and when states lose trust in each other.

    The Charter lays out a number of important tools to forge peace.

    Article 2.3 of the UN Charter is clear:

    “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice.”

    Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.

    This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law, and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts. 

    And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.

    Malnourishment is soaring.  Starvation is knocking on every door. 

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.

    That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.

    With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation. 

    I am appalled that UN premises have been struck – among them facilities of the UN Office for Project Services and the World Health Organization, including WHO’s main warehouse.

    This is despite all parties having been informed of the locations of these UN facilities.

    These premises are inviolable and must be protected under international humanitarian law – without exception.  

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.

    And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.  

    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.

    But it still holds the power to stop them.

    Mr. President,

    Peace is a choice.

    And the world expects the UN Security Council to help countries make this choice.   

    This Council is at the centre of the global architecture for peace and security.  

    Its creation reflected a central truth.

    Competition between states is a geopolitical reality.  

    But cooperation — anchored in shared interests and the greater good — is the sustainable pathway to peace.

    Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year. 

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.

    Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.

    The majority of situations on the Security Council’s agenda are complex and resist quick fixes.
    But even in the darkest days of the Cold War, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.

    One that successfully deployed a range of peacekeeping missions.

    One that opened the door for vital humanitarian aid to flow to people in need.

    And one that helped prevent a Third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.

    This Council should be made more representative of today’s geopolitical realities.

    And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.

    I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.

    The landmark adoption of Security Council Resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and re-build regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    Troisièmement, les États Membres doivent honorer leurs obligations en vertu du droit international, y compris la Charte des Nations Unies, le droit international des droits humains et le droit international humanitaire.

    Le Pacte pour l’avenir appelle tous les États Membres à respecter leurs engagements envers la Charte, ainsi que les principes de respect de la souveraineté, de l’intégrité territoriale et de l’indépendance politique des États.

    Tous ces principes sont ancrés dans le droit international et reposent sur l’engagement de donner la priorité à la prévention des conflits et au règlement pacifique des différends par le dialogue et la diplomatie.

    Le Pacte reconnaît également la contribution essentielle de la Cour internationale de Justice, qui fêtera son 80ème anniversaire l’année prochaine.

    Monsieur le Président,

    À l’occasion du 80ème anniversaire de notre Organisation et de la Charte qui lui a donné vie et forme, nous devons renouveler notre engagement envers l’esprit multilatéral de la paix par la diplomatie.

    Je me réjouis de travailler avec vous en ce sens, afin de parvenir à la paix et la sécurité internationales que les peuples du monde entier espèrent et méritent.

    Je vous remercie.

    [all-English]

    Mr. President, Excellencies,                                                       

    I want to thank Deputy Prime Minister and Foreign Minister Ishaq Dar and Pakistan for convening today’s open debate.

    The topic of today’s debate shines a light on the clear connection between international peace and multilateralism.

    Eighty years ago, the United Nations was founded with a primary purpose — to safeguard humanity from the scourge of war.

    The architects of the United Nations Charter recognized that the peaceful resolution of disputes is the lifeline when geopolitical tensions escalate… when unresolved disputes fuel the flames of conflict…and when states lose trust in each other.

    The Charter lays out a number of important tools to forge peace.

    Article 2.3 of the UN Charter is clear:

    “All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.”

    Chapter VI of the Charter is equally clear on the specific responsibilities of this Council to help ensure the pacific settlement of disputes “by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice.”

    Action 16 of the Pact of the Future calls on Member States to recommit to all the mechanisms of preventive diplomacy and the peaceful settlement of disputes.

    I commend Pakistan for utilizing its presidency to put forward a resolution urging all Member States to make full use of these tools in our collective pursuit of global peace.

    This is needed now more than ever.

    Around the world, we see an utter disregard for — if not outright violations of — international law — including international human rights law, international refugee law, international humanitarian law, and the UN Charter itself, without any accountability.

    These failures to uphold international obligations are coming at a time of widening geopolitical divides and conflicts. 

    And the cost is staggering — measured in human lives, shattered communities, and lost futures.

    We need look no further than the horror show in Gaza — with a level of death and destruction without parallel in recent times.

    Malnourishment is soaring.  Starvation is knocking on every door. 

    And now we are seeing the last gasp of a humanitarian system built on humanitarian principles.

    That system is being denied the conditions to function.  Denied the space to deliver.  Denied the safety to save lives.

    With Israeli military operations intensifying and new displacement orders issued in Deir al-Balah, devastation is being layered upon devastation.

    I am appalled that UN premises have been struck – among them facilities of the UN Office for Project Services and the World Health Organization, including WHO’s main warehouse.

    This is despite all parties having been informed of the locations of these UN facilities.

    These premises are inviolable and must be protected under international humanitarian law – without exception.    

    From Gaza to Ukraine, from the Sahel to Sudan, Haiti and Myanmar, and many other parts of the world, conflict is raging, international law is being trampled, and hunger and displacement are at record levels.

    And terrorism, violent extremism and transnational crime remain persistent scourges pushing security further out of reach.  
    Diplomacy may not have always succeeded in preventing conflicts, violence and instability.

    But it still holds the power to stop them.

    Mr. President,

    Peace is a choice.

    And the world expects the UN Security Council to help countries make this choice.   

    This Council is at the centre of the global architecture for peace and security.  

    Its creation reflected a central truth.
    Competition between states is a geopolitical reality.  

    But cooperation — anchored in shared interests and the greater good — is the  sustainable pathway to peace.

    Too often, we see divisions, entrenched positions and escalatory discourse blocking solutions and the effectiveness of the Council.

    But we have also seen some inspiring examples of finding common ground and forging solutions to global problems.

    For example, today marks three years since the signing of the Black Sea Initiative and the Memorandum of Understanding with the Russian Federation — efforts that show what we can achieve through mediation and the good offices of the United Nations, even during the most challenging moments.

    And we’ve seen many other recent examples.

    From the Sevilla Conference on Financing for Development, to the Oceans Conference in Nice, to the Agreement on Marine Biological Diversity of Areas Beyond National Jurisdiction and the Cybercrime Treaty, to the Pact for the Future adopted last year. 

    The Pact, in particular, demonstrates a clear re-commitment by the world to strengthen the United Nations collective security system.

    Drawing from the New Agenda for Peace, it prioritizes preventive diplomacy and mediation — all areas where this Council can play a vital role.

    As we look to the theme of today’s debate, I see three areas where we can live up to the Pact’s call to renew our commitment to — and the world’s faith in — the multilateral problem-solving architecture.

    First — this Council’s members, in particular its permanent members, must continue working to overcome divisions.

    The majority of situations on the Security Council’s agenda are complex and resist quick fixes.

    But even in the darkest days of the Cold War, the collective dialogue and decision-making in this Council underpinned a common and effective system of global security.

    One that successfully deployed a range of peacekeeping missions.

    One that opened the door for vital humanitarian aid to flow to people in need.

    And one that helped prevent a Third World War.

    I urge you to summon this same spirit by keeping channels open, continuing to listen in good faith, and working to overcome differences and building consensus.

    We must also work to ensure that this Council reflects the world of today, not the world of 80 years ago.

    This Council should be made more representative of today’s geopolitical realities.

    And we must continue improving the working methods of this Council to make it more inclusive, transparent, efficient and accountable.

    I urge you to continue building consensus to move the intergovernmental negotiations forward.

    Second — this Council must continue strengthening cooperation with regional and subregional partners.

    The landmark adoption of Security Council Resolution 2719 supporting African Union-led peace support operations through assessed contributions is a good example of how we can join efforts with regional organizations to support more effective responses.

    I also commend this Council’s steps to strengthen and re-build regional security frameworks to encourage dialogue and advance the peaceful settlement of disputes.

    And third — Member States must honour their obligations under international law, including the UN Charter, international human rights law and international humanitarian law.

    The Pact for the Future calls on all Member States to live up to their commitments in the UN Charter, and the principles of respect for sovereignty, territorial integrity and the political independence of states.

    All grounded in international law, and a commitment to prioritizing prevention of conflict and the peaceful settlement of disputes through dialogue and diplomacy.

    The Pact also recognized the critical contribution of the International Court of Justice, which celebrates its 80th anniversary next year.

    Mr. President,    

    As we mark the 80th anniversary of our organization and the Charter that gave it life and shape, we need to renew our commitment to the multilateral spirit of peace through diplomacy.

    I look forward to working with you in this important effort, to achieve the international peace and security the people of the world need and deserve.

    Thank you.

    [all-French]

    Monsieur le Président, Excellences,

    Je tiens à remercier le Vice-Premier Ministre et Ministre des affaires étrangères Ishaq Dar et le Pakistan d’avoir organisé le débat public de ce jour.

    Le thème de ce débat met en lumière le lien évident qui existe entre la paix internationale et le multilatéralisme.

    Il y a 80 ans, l’Organisation des Nations Unies a été fondée dans le but premier de préserver l’humanité du fléau de la guerre.

    Les architectes de la Charte des Nations Unies ont considéré que le règlement pacifique des différends était la seule issue possible lorsque les tensions géopolitiques s’intensifiaient, lorsque des différends non résolus attisaient les conflits et lorsque les États perdaient confiance les uns dans les autres.

    La Charte renferme un certain nombre d’outils majeurs destinés à forger la paix.

    Son Article 2.3 est clair :

    « Les Membres de l’Organisation règlent leurs différends internationaux par des moyens pacifiques, de telle manière que la paix et la sécurité internationales ainsi que la justice ne soient pas mises en danger ».

    Son Chapitre VI est tout aussi clair en ce qui concerne les responsabilités confiées au Conseil de sécurité, qui doit contribuer à assurer le règlement pacifique des différends « par voie de négociation, d’enquête, de médiation, de conciliation, d’arbitrage, de règlement judiciaire, de recours aux organismes ou accords régionaux, ou par d’autres moyens pacifiques » du choix des parties.

    La mesure 16 du Pacte pour l’avenir appelle les États Membres à démontrer leur attachement à la diplomatie préventive et au règlement pacifique des différends en recourant davantage à tous les mécanismes existants en la matière.

    Je félicite le Pakistan d’avoir mis à profit sa présidence pour présenter une résolution exhortant tous les États Membres à utiliser pleinement les outils en question dans le cadre de notre quête collective de la paix dans le monde.

    Nous en avons besoin plus que jamais.

    Partout dans le monde, nous observons un mépris total pour le droit international – voire des violations pures et simples de ce droit, notamment du droit international des droits humains, du droit international des réfugiés, du droit international humanitaire et de la Charte des Nations Unies elle-même –, sans que la responsabilité de quiconque ne soit engagée.

    Ces manquements aux obligations internationales surviennent à un moment où les divisions et les conflits géopolitiques s’aggravent.

    Et le coût – en vies humaines, en communautés brisées et en avenirs perdus – est accablant.

    Il suffit de regarder l’horreur qui se déroule à Gaza, avec un niveau de mort et de destruction sans équivalent dans l’histoire récente.

    La malnutrition explose.  La famine frappe à toutes les portes. 

    Et maintenant, nous assistons à l’agonie d’un système humanitaire fondé sur des principes humanitaires.

    Ce système se voit refuser les conditions nécessaires à son fonctionnement.  On lui refuse l’espace nécessaire pour agir.  On lui refuse la sécurité nécessaire pour sauver des vies.

    Alors que les opérations militaires israéliennes s’intensifient et que de nouveaux ordres de déplacement sont émis à Deir al-Balah, la dévastation s’ajoute à la dévastation.

    Je suis consterné que des locaux de l’ONU aient été touchés, notamment ceux du Bureau des Nations Unies pour les services d’appui aux projets et de l’Organisation mondiale de la Santé, y compris son entrepôt principal.

    Ceci alors que toutes les parties ont été informées de l’emplacement de ces installations de l’ONU.

    Ces locaux sont inviolables et doivent être protégés par le droit international humanitaire, sans exception.

    De Gaza à l’Ukraine, du Sahel au Soudan, de Haïti au Myanmar, et dans bien d’autres régions du monde, les conflits font rage, le droit international est bafoué, et la faim et les déplacements atteignent des niveaux record.

    Et le terrorisme, l’extrémisme violent et la criminalité transnationale restent des fléaux tenaces qui rendent la sécurité encore plus inaccessible.

    La diplomatie ne permet pas toujours de prévenir les conflits, la violence et l’instabilité.

    Mais elle a toujours le pouvoir de les arrêter.

    Monsieur le Président,

    La paix est un choix.

    Et le monde attend du Conseil de sécurité de l’Organisation qu’il aide les pays à faire ce choix.

    Ce Conseil est au cœur de l’architecture mondiale pour la paix et la sécurité.

    Sa création reposait sur une vérité fondamentale.

    La rivalité entre les États est une réalité géopolitique.

    Mais la coopération – ancrée dans des intérêts partagés et le bien commun – représente la voie durable vers la paix.

    Nous observons trop fréquemment que les divisions, les positions tranchées et la surenchère verbale bloquent la mise en place de solutions et sape l’efficacité de ce Conseil.

    Mais nous avons également observé des exemples admirables de cas où il a été possible de trouver un terrain d’entente et des solutions aux problèmes mondiaux.

    Ainsi, nous marquons aujourd’hui le troisième anniversaire de la signature de l’Initiative de la mer Noire et du mémorandum d’accord avec la Fédération de Russie – des mesures qui montrent ce que nous pouvons accomplir grâce à la médiation et aux bons offices de l’ONU, y compris dans les moments les plus difficiles.

    Et plus récemment, nous avons été témoins de bien d’autres exemples.

    De la Conférence de Séville sur le financement du développement à la Conférence de Nice sur l’océan, en passant par l’Accord sur la diversité biologique marine des zones ne relevant pas de la juridiction nationale, la Convention sur la cybercriminalité et le Pacte pour l’avenir, adopté l’année dernière.

    Le Pacte, en particulier, témoigne d’une claire volonté du monde de s’engager de nouveau à renforcer le système de sécurité collective des Nations Unies.

    Inspiré du Nouvel Agenda pour la paix, il donne la priorité à la diplomatie préventive et à la médiation, autant de domaines dans lesquels le Conseil peut jouer un rôle essentiel.

    En ce qui concerne le thème du débat qui nous réunit aujourd’hui, il y a selon moi trois domaines dans lesquels nous pouvons nous montrer à la hauteur de l’appel, contenu dans le Pacte, à renouveler notre engagement – et la confiance du monde – envers l’architecture multilatérale dont nous disposons pour régler les problèmes.

    Premièrement, les membres de ce Conseil, en particulier les membres permanents, doivent continuer à s’efforcer de surmonter les dissensions.

    La majorité des situations inscrites à l’ordre du jour du Conseil de sécurité sont complexes et ne se prêtent pas à des solutions rapides.

    Mais même dans les jours les plus sombres de la guerre froide, le dialogue et la prise de décision collective au sein de ce Conseil ont permis de maintenir un système de la sécurité mondiale commun et efficace.

    Un système qui a déployé avec succès toute une série de missions de maintien de la paix.

    Un système qui a ouvert la voie à l’acheminement d’une aide humanitaire vitale aux personnes dans le besoin.

    Et un système qui a permis d’éviter une troisième guerre mondiale.

    Je vous exhorte à adopter le même état d’esprit en maintenant la communication, en continuant d’écouter de bonne foi, en vous employant à surmonter les divergences et à rechercher le consensus.

    Nous devons également veiller à ce que ce Conseil soit à l’image du monde d’aujourd’hui, et non de celui d’il y a 80 ans.

    Ce Conseil devrait être plus représentatif des réalités géopolitiques actuelles.

    Et nous devons continuer de perfectionner ses méthodes de travail afin de le rendre plus inclusif, plus transparent, plus efficace, et plus responsable.

    Je vous demande instamment de continuer d’œuvrer à la recherche du consensus pour faire avancer les négociations intergouvernementales.

    Deuxièmement, ce Conseil doit continuer de renforcer la coopération avec les partenaires régionaux et sous-régionaux.

    L’adoption historique de la résolution 2719 du Conseil de sécurité, visant à financer les opérations d’appui à la paix menées par l’Union africaine au moyen de contributions statutaires, est un bon exemple de la manière dont nous pouvons unir nos forces à celles des organisations régionales pour favoriser la mise en place de mesures plus efficaces.

    Je salue également les mesures prises par ce Conseil pour renforcer et rebâtir les cadres de sécurité régionaux afin d’encourager le dialogue et de favoriser le règlement pacifique des différends.

    Troisièmement, les États Membres doivent honorer leurs obligations en vertu du droit international, y compris la Charte des Nations Unies, le droit international des droits humains et le droit international humanitaire.

    Le Pacte pour l’avenir appelle tous les États Membres à respecter leurs engagements envers la Charte, ainsi que les principes de respect de la souveraineté, de l’intégrité territoriale et de l’indépendance politique des États.

    Tous ces principes sont ancrés dans le droit international et reposent sur l’engagement de donner la priorité à la prévention des conflits et au règlement pacifique des différends par le dialogue et la diplomatie.

    Le Pacte reconnaît également la contribution essentielle de la Cour internationale de Justice, qui fêtera son 80ème anniversaire l’année prochaine.

    Monsieur le Président,

    À l’occasion du 80ème anniversaire de notre Organisation et de la Charte qui lui a donné vie et forme, nous devons renouveler notre engagement envers l’esprit multilatéral de la paix par la diplomatie.

    Je me réjouis de travailler avec vous en ce sens, afin de parvenir à la paix et la sécurité internationales que les peuples du monde entier espèrent et méritent.

    Je vous remercie.

    MIL OSI United Nations News

  • MIL-OSI USA: Read More (Rep. Steube and Sen. Hawley Introduce Federal Tort for Pediatric Gender Clinics)

    Source: United States House of Representatives – Congressman Greg Steube (FL-17)

    July 22, 2025 | Press ReleasesWASHINGTON — U.S. Representative Greg Steube (R-Fla.) joined with Senator Josh Hawley (R-Ind.) today in introducing the Jamie Reed Protecting Our Kids from Child Abuse Act, legislation that establishes a federal tort for individuals harmed by gender-transition procedures as minors. This bill honors the Trump administration’s request for legislation providing a private right of action for damages caused by chemical and surgical mutilation on children.
    “Thousands of families have been defrauded by the Left’s gender ideology lie: that mutilation is somehow medicine,” said Rep. Steube. “Sex reassignment surgery and puberty blockers for minors are nothing more than child abuse in service to a depraved political agenda. Senator Hawley and I are committed to ensuring America’s children finally get justice for one of the worst crimes ever committed against our young people.”
    Representative Mary Miller (R-Ill.), Chair of the Congressional Family Caucus, is a cosponsor of the bill.
    “Irreversible gender-mutilation procedures have permanently harmed children across America under the false guise of health care,” said Rep. Mary Miller. “Every clinic, doctor, and institution involved in these abusive procedures must be held accountable. We will end the flow of taxpayer dollars to gender clinics, stop the medical exploitation of children, and give victims the legal power to seek justice.”
    The Jamie Reed Protecting Our Kids from Child Abuse Act is the House companion to legislation introduced by U.S. Senator Josh Hawley.
     “Our children should no longer suffer from irreversible and dangerous child mutilation procedures, which the Biden administration enabled and promoted,” said Senator Hawley. “I welcome President Trump’s strong action to reverse this child abuse and look forward to working with his administration to advance legislation that protects our kids.”
    Background: The bill establishes a private right of action against individuals and entities responsible for inflicting harm on minors via gender-transition procedures. It also bans federal funding to any hospital, university, gender clinic, or organization affiliated with a gender clinic that provides gender-transition procedures to minors. 
    Read the full bill text here.

    MIL OSI USA News

  • MIL-OSI Security: #StopRansomware: Interlock

    Source: US Department of Homeland Security

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL Security OSI

  • MIL-OSI: PureSky Energy Launches 100% LMI-Focused Clover Meadow Community Solar Project Under New York’s ESFA Program

    Source: GlobeNewswire (MIL-OSI)

    CLAVERACK, N.Y., July 22, 2025 (GLOBE NEWSWIRE) — PureSky Energy (“PureSky”) is proud to announce that its newest community solar farm, Clover Meadow Solar, located near Claverack, NY, is now fully operational and delivering clean, affordable energy exclusively to Low- to Moderate-Income (LMI) households. The 7.3 MWdc project is enrolled in New York State’s Expanded Solar for All (ESFA) program, which ensures that the benefits of renewable energy reach the communities that need them most.

    This milestone underscores PureSky’s deep commitment to energy equity, bringing the benefits of solar to income-qualified residents who often face the greatest barriers to accessing clean energy savings. Clover Meadow was developed by Eden Renewables (“Eden”), based in Troy NY, and is the seventh such project that PureSky and Eden have worked on together.

    Clover Meadow Solar Key Facts:

    • Location: Claverack, NY
    • Capacity: 7,269 kWDC
    • Solar Panels: 13,338 high-efficiency modules
    • Annual Generation: 10.3 million kWh
    • Equivalent Homes Powered: ~1,417 annually
    • Estimated Annual CO₂ Reduction: 14.9 million lbs
    • Estimated 30-Year Customer Savings: $3.4 million

    “Clover Meadow represents what community solar should be—a tool to make the clean energy transition equitable and inclusive,” said Nicholas Topping, Vice President of Community Solar at PureSky. “By enrolling the solar farm entirely under the ESFA program, we’re able to deliver immediate savings to thousands of income-eligible households while strengthening New York’s energy independence and supporting the state’s clean energy goals.”

    “Clover Meadow is another exciting milestone in our ongoing collaboration with PureSky Energy,” said Giovanni Maruca, Chief Development Officer at Eden Renewables. “At Eden, we’re committed to putting communities at the center of our projects That’s why we’re especially excited that this project will deliver clean, affordable energy to low-income households through the ESFA program.”

    This 100%-all LMI project exemplifies the growing capability of community solar to lower energy costs for households, particularly in rural and underserved areas. Households enrolled in the program will see guaranteed savings on their electricity bills—without needing to install rooftop panels or pay any upfront costs.

    Beyond household savings, the Clover Meadow Solar project brings broader benefits to the Claverack community by generating new local tax revenue and supporting clean energy jobs. The solar farm is designed to be pollinator-friendly, helping to tackle the global climate crisis, and includes Eden’s industry-leading education program as a community benefit. Projects like this help build more resilient, distributed energy systems while investing directly in local economies.

    About Expanded Solar for All (ESFA)
    New York’s ESFA program is designed to ensure that LMI households across the state can participate in and benefit from the growth of renewable energy. By connecting utility customers directly to solar projects like Clover Meadow, ESFA delivers monthly bill credits and long-term economic relief to income-qualified participants.

    PureSky Energy remains committed to developing and operating inclusive solar projects throughout New York. The company has additional anchor capacity available for future community solar projects and invites municipalities, housing authorities, and local organizations to explore partnership opportunities.

    For more information about the Clover Meadow project or PureSky Energy’s community solar offerings, please visit www.pureskyenergy.com or contact customercare@pureskyenergy.com.

    About PureSky Energy:
    PureSky Energy is a leading developer, owner, and operator of US community solar, C&I and storage projects with headquarters in Denver, Colorado. Since entering the US market in 2016, the company has rapidly expanded its scale and currently operates a portfolio with generation capacity of approximately 233MW across forty-four sites or under-construction projects expected to be completed in the short term. The company has a large pipeline of solar and battery storage projects across existing and new US markets, placing the platform in a primary position within the distributed generation market. The company’s mission is to make clean energy accessible and affordable to local communities across the United States, while shaping a brighter, more sustainable future for generations to come.

    Website: www.pureskyenergy.com

    Host A Solar Farm: https://www.pureskyenergy.com/community-host

    LinkedIn: https://www.linkedin.com/company/puresky-energy

    Media inquiries: Janet Janzen: marketing@pureskyenergy.com

    About Eden Renewables:

    Eden Renewables is an international developer of solar and energy storage projects in the US, UK, and sub-Saharan Africa. 

    Eden’s US office is based in Troy, NY, and currently has 21 pollinator-friendly community solar projects approved in the Capital Region and neighboring counties. All of Eden’s solar projects promote biodiversity and agricultural usage with excellent community and educational benefits. Subscribers to its community solar farms can benefit from savings of around 10% on their electricity bills.

    Website: https://edenrenewables.com/

    Media inquiries: sophy.fearnley-whittingstall@edenrenewables.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/ed3553da-f15c-4be8-a6a2-9f498be260fa

    The MIL Network