Blog

  • MIL-OSI USA: AFSCME’s Saunders: The Senate’s distorted priorities will leave working people footing the bill

    Source: American Federation of State, County and Municipal Employees Union

    WASHINGTON – AFSCME President Lee Saunders released the following statement after the Senate passed its version of the budget reconciliation bill, which would bring even deeper cuts to Medicaid while also slashing food assistance and public services nationwide:

    “We are deeply disappointed by the Senate’s decision to pass a dangerous budget that tears health care away from over 20 million people, leaves millions without food assistance, and saddles working families with higher costs. From the caregivers who rely on Medicaid to keep their loved ones at home, to the hardworking parents struggling to afford groceries, to the nurses worried about their patients losing care, everyday people will foot the bill for a budget that hands more tax cuts to billionaires at the expense of our communities.

    “For months, AFSCME members have urged Congress to reject this morally bankrupt budget and put working families ahead of debt-exploding tax cuts for the ultra-wealthy. Instead, a narrow majority in the United States Senate sold out their own constituents by gutting the health care, food assistance and public services our communities count on. Their distorted priorities will not only increase costs for working people but also ignite a fiscal catastrophe that will force states, counties, cities and towns to slash funding for local schools, hospitals, nursing homes, emergency response centers, colleges and other basic services or shut them down entirely.

    “This budget bill is deeply unpopular for a reason: It is the largest transfer of wealth from working families to billionaires and big corporations in American history, and it will cost lives and jobs. But this fight is not yet over. As this budget bill moves back to the House for final passage, AFSCME members will be getting organized and fighting tooth and nail to protect our communities.”

    MIL OSI USA News

  • MIL-OSI Security: Fugitive Cindy Rodriguez Singh, Wanted for Capital Murder in Everman, Texas, Added to the FBI’s List of Ten Most Wanted Fugitives

    Source: US FBI

    On October 31, 2023, Cindy Rodriguez Singh was charged with capital murder in the District Court of Tarrant County, Fort Worth, Texas. On November 2, 2023, a federal arrest warrant was issued for Rodriguez Singh in the U.S. District Court, Northern District of Texas, Fort Worth, Texas, for Unlawful Flight to Avoid Prosecution. On August 29, 2024, the FBI announced a reward of up to $25,000 for information leading to her arrest and conviction. Today, the FBI is increasing that amount and now offering up to a $250,000 reward.

    “The disappearance and suspected death of Noel Alvarez is still fresh in the minds of everyone in Everman as well as throughout North Texas. The addition of Cindy Rodriguez Singh to the FBI’s Ten Most Wanted Fugitives List is an opportunity to bring this case to the eyes and ears of citizens across the country and around the world,” said FBI Dallas Special Agent in Charge R. Joseph Rothrock. “We are confident that this publicity will culminate in her arrest and that she will be returned to the United States to answer for her alleged crimes.”

    “The addition of Cindy Rodriguez Singh to the FBI’s Ten Most Wanted Fugitives list marks a powerful moment in our unrelenting pursuit of justice for Noel. This is a promise we made to him and to this community, that we would never stop until those responsible are held accountable,” said Craig Spencer, former chief of police and current city manager and emergency management coordinator for the city of Everman. “This designation amplifies our reach and renews our focus. We urge anyone, anywhere, with information to come forward now. Noel deserves that much. We are so incredibly thankful to the FBI for their continued effort and support on this incredibly important case.”

    “I deeply appreciate the unwavering dedication of our law enforcement agencies throughout this investigation,” Tarrant County District Attorney Phil Sorrells said. “We are hopeful that Cindy Rodriguez Singh will be apprehended and returned to Tarrant County. My office is committed to delivering justice for Noel.”

    Rodriguez Singh’s last confirmed sighting was on March 22, 2023, as she, her husband, and six juvenile children, boarded an international flight to India. She was born in Dallas, Texas, in 1985, and is 40 years old. The fugitive is 5’1” to 5’3” tall, weighs 120 to 140 pounds, has a medium complexion, and has tattoos on her back, both legs, right arm, right hand, and right calf. She has brown eyes and brown hair.

    Rodriguez Singh is believed to have ties to India and Mexico. Additional information and wanted posters in English, Spanish, and Hindi, can be found at this link: https://www.fbi.gov/wanted/topten.

    The FBI’s Ten Most Wanted Fugitives list was established in March 1950. Since its inception, 537 fugitives have appeared on the list and 497 have been apprehended or located—many due to tips from citizens. Since its inception, there have been eight fugitives wanted from the North Texas region placed on the list. In addition, five fugitives that have been placed on the list were arrested in the North Texas region.

    The FBI is offering a reward of up to $250,000 for information leading to the arrest of Cindy Rodriguez Singh. Anyone with information concerning Rodriguez Singh should immediately contact the nearest FBI office or local law enforcement agency.

    Calls can be directed to 1-800-CALL-FBI (1-800-225-5324) or the FBI’s Dallas Field Office at 972-559-5000. Individuals from outside of the United States should contact the nearest U.S. Embassy or Consulate. Tips can also be submitted digitally at tips.fbi.gov. All information can remain anonymous, and confidentiality is guaranteed.

    This fugitive investigation is being conducted by the FBI’s Fort Worth Resident Agency, Everman Police Department, Northeast Tarrant County Child Abduction Response Team, Tarrant County District Attorney’s Office, and Texas Rangers.

    Media Contact:

    Public Affairs Officer, Melinda Urbina Garcia, murbina@fbi.gov

    MIL Security OSI

  • MIL-OSI Security: Justice Department Charges Two Individuals with Acting as Agents of the PRC Government

    Source: United States Attorneys General 7

    Arrests Disrupted Clandestine PRC Ministry of State Security Intelligence Network Operating in the United States

    Two nationals of the People’s Republic of China (PRC) made their initial appearances in federal court in Portland, Oregon, and Houston, Texas, yesterday to face charges issued out of the Northern District of California for acting as agents of the Government of the PRC without prior notification to the Attorney General. The defendants, Yuance Chen, 38, a PRC national and legal permanent resident who resides in Happy Valley, Oregon, and Liren “Ryan” Lai, 39, a PRC national who traveled from the PRC to Houston, Texas, on a tourist visa in April 2025, were arrested Friday on a criminal complaint charging them with overseeing and carrying out various clandestine intelligence taskings in the United States on behalf of the PRC Government’s principal foreign intelligence service, the Ministry of State Security (MSS). These activities included facilitating a “dead drop” payment of cash for information relating to the national security of the United States previously provided to the MSS, gathering intelligence about U.S. Navy service members and bases, and assisting with efforts to recruit other individuals from within the U.S. military as potential MSS assets.

    Chen and Lai were arrested on June 27, 2025, by the FBI in Happy Valley, Oregon, and Houston Texas, as part of a coordinated counterintelligence and law enforcement operation across multiple states.

    “This case underscores the Chinese government’s sustained and aggressive effort to infiltrate our military and undermine our national security from within,” said Attorney General Pamela Bondi. “The Justice Department will not stand by while hostile nations embed spies in our country – we will expose foreign operatives, hold their agents to account, and protect the American people from covert threats to our national security.”

    “The FBI arrested two Chinese nationals who were allegedly attempting to recruit U.S. military service members on behalf of the PRC,” said FBI Director Kash Patel. “The Chinese Communist Party thought they were getting away with their scheme to operate on U.S. soil, utilizing spy craft, like dead drops, to pay their sources. This case was a complex, coordinated effort and is an example of outstanding counterintelligence work done by FBI San Francisco, Portland, Houston, San Diego, and the Counterintelligence Division. The FBI will continue to vigilantly defend the homeland from China’s pervasive attempts to infiltrate our borders.”

    “Adverse foreign intelligence services like the PRC’s Ministry of State Security dedicate years to recruiting individuals and cultivating them as intelligence assets to do their bidding within the United States,” said Assistant Attorney General for National Security John A. Eisenberg. “Under my leadership, the National Security Division will continue to defend our nation and neutralize our adversaries’ clandestine spy networks.”

    “These charges reflect the breadth of the efforts by our foreign adversaries to target the United States — this time by conducting illegal intelligence-gathering operations aimed at our national security information and military service members,” said U.S. Attorney Craig H. Missakian for the Northern District of California. “My office and the FBI remain ever vigilant in guarding against these threats to the United States. We will continue to undertake counterespionage investigations and prosecutions, no matter how complex and sensitive, to disrupt attempts to weaken our national security.”

    As alleged in the criminal complaint unsealed yesterday, the PRC Government conducts intelligence activities against the United States through multiple arms, including the MSS. The MSS handles civilian intelligence collection for the PRC and is responsible for counterintelligence and foreign intelligence, as well as political security. The MSS and its bureaus seek to obtain information on political, economic, and security policies that might affect the PRC, along with military, scientific, and technical information of value to the PRC. The MSS and its bureaus are tasked with conducting clandestine and covert human source operations, of which the United States is a principal target.

    As alleged in the criminal complaint, Lai recruited Chen to work on behalf of the MSS in or about 2021. While in Guangzhou, China, in January 2022, Lai and Chen worked together to facilitate a dead-drop payment of at least $10,000 on behalf of the MSS, working with other individuals located in the United States to leave a backpack with the cash at a day-use locker at a recreational facility located in Livermore, California.

    Following the January 2022 dead drop, Lai and Chen continued to work on behalf of the MSS, including to help identify potential assets for MSS recruitment within the ranks of the U.S. Navy. For example, beginning in 2022, Chen was tasked by Lai and other agents of the MSS to contact a Navy employee over social media, and then later, in 2025, arranged for a tour with the employee of the USS Abraham Lincoln and provided information about the employee to the MSS. In 2022 and 2023, Chen was tasked to visit a U.S. Naval installation in Washington State and a U.S. Navy recruitment center in San Gabriel, California. While in the recruitment center, Chen obtained photographs of a bulletin board containing the names, programs, and hometowns of recent Navy recruits, the majority of whom listed their hometown as “China,” which he appears to have transmitted to an MSS intelligence officer in China. The complaint also alleges that Chen received instruction from the MSS on what to say to potential recruits regarding potential payment that could be made by the MSS, preferred Naval job assignments for potential recruits, and methods for minimizing Chen’s risk of exposure. The complaint alleges that in 2023, Lai flew to the United States from the PRC and provided Chen with a cellphone that Chen then used to communicate with the MSS. The complaint also alleges that Chen traveled to Guangzhou and met with MSS intelligence officers in April 2024 and March 2025 in order to discuss compensation and specific taskings.

    The complaint also alleges that Lai traveled to Houston, Texas, in April 2025, claiming that the purpose of his visit was related to his business as an online retail seller, and that he would be staying in the Houston area for two weeks. However, on May 9, 2025 – more than four weeks after his arrival in the United States – Lai traveled by car with a companion from Houston to Southern California, via New Mexico and Tucson, Arizona, before returning to Texas, on May 15, 2025.

    Chen and Lai are charged with violating Title 18, United States Code, Section 951, which makes it a crime for a person to operate or agree to operate within the United States as an agent of a foreign government without notification to the Attorney General of the United States. If convicted, the defendants face a fine of up to $250,000 and a term of imprisonment of up to 10 years.

    The FBI San Francisco Field Office is leading the investigation, with valuable assistance provided by the FBI Portland, Houston, and San Diego Field Offices. The Naval Criminal Investigative Service (NCIS) also provided valuable assistance during the operation. 

    The National Security and Special Prosecutions Section of the U.S. Attorney’s Office for the Northern District of California and the National Security Division’s Counterintelligence and Export Control Section are in charge of the prosecution. Significant operational support and assistance is also being provided by the District of Oregon, the Southern District of Texas, and the Southern District of California.

    A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI: No Credit Check Loans Guaranteed Approval No credit Check- Radcred Launches New Features To Offer Instant Loans For US Borrowers In Need

    Source: GlobeNewswire (MIL-OSI)

    Glendale, California, July 01, 2025 (GLOBE NEWSWIRE) — RadCred, a leading innovator in financial technology, has launched a new platform designed to provide no credit check loans with guaranteed approval for U.S. consumers with bad credit. Unlike traditional banks, which often deny loans based on FICO scores, RadCred’s platform evaluates borrowers based on their income and repayment ability, ensuring that even those with low credit scores can access the funds they need.

    With same day funding and no hard credit checks, RadCred provides fast financial relief for urgent needs like medical bills, car repairs, or rent payments. RadCred’s platform guarantees approval for bad credit personal loans for eligible applicants, offering loans up to $5,000, making it an ideal solution for those who might otherwise be rejected by traditional lenders. Whether you’re seeking quick loans for bad credit or an emergency loan for bad credit with guaranteed approval, RadCred ensures you can get the funds you need when you need them most.

    What are No Credit Check Loans?

    No credit check loans are a type of personal loan for bad credit where the lender does not perform a hard credit inquiry, which can negatively impact a borrower’s credit score. Instead, these no credit check loans focus on a borrower’s income and ability to repay. RadCred’s no credit check loans guaranteed approval provide immediate access to cash without the usual barriers imposed by traditional lenders.

    Unlike traditional loans, which rely heavily on a borrower’s credit history, RadCred’s no credit check loans allow individuals with bad credit to access fast funding. RadCred uses a soft credit check to evaluate applications, meaning your credit score remains unaffected by the loan application process. This makes RadCred’s no credit check payday loans and bad credit personal loans guaranteed approval $5,000 ideal for people with low credit scores looking for fast financial relief.

    How RadCred Solves the Problem

    Many individuals with bad credit face barriers when seeking financial help. Traditional banks often reject loan applications from borrowers with a low credit score, leaving them without options in times of need. RadCred’s no credit check loans address this gap by focusing on income verification rather than credit history, making it easier for individuals to obtain loans for bad credit even with a credit score below 600.

    RadCred’s process is simple, transparent, and fast. Borrowers can apply for no credit check payday loans from the comfort of their home and get same day payday loans. By evaluating applicants based on income, RadCred ensures more inclusive access to bad credit personal loans guaranteed approval $5,000, making it one of the most reliable lenders for bad credit borrowers.

    Key Features of RadCred’s No Credit Check Loans:

    • Guaranteed Approval: Guaranteed approval for eligible applicants based on income, not FICO score. Borrowers with bad credit have a high chance of approval.
    • No Hard Credit Check: RadCred uses a soft credit inquiry, ensuring your credit score is not impacted by the loan application.
    • Same-Day Funding: Funds are typically deposited directly into your bank account the same day, providing fast access to cash.
    • Flexible Loan Terms: RadCred offers flexible repayment plans, allowing borrowers to choose a term length that suits their financial situation.
    • Transparent Terms: RadCred discloses APR, fees, and repayment schedules upfront, ensuring no hidden charges.

    How to Get Guaranteed Approval for No Credit Check Loans

    Applying for no credit check loans with guaranteed approval is easy with RadCred’s streamlined online process:

    1. Apply Online: Complete a short application form with basic personal and financial information.
    2. Soft Credit Check: RadCred uses a soft credit check, so your credit score is not affected by the application.
    3. Receive Multiple Offers: RadCred’s system matches you with lenders based on your income and requested loan amount, giving you options to compare.
    4. Choose Your Offer: Select the loan offer that best fits your needs.
    5. Receive Funds: After approval, funds are typically transferred to your bank account within hours.

    Eligibility for No Credit Check Loans

    To apply for no credit check loans through RadCred, borrowers must meet the following criteria:

    • Must be at least 18 years old.
    • Must be a U.S. resident with a valid U.S. address.
    • Must have stable income (e.g., employment, benefits).
    • Must have an active bank account for loan disbursement.
    • No credit score requirement, though income and repayment ability are key factors.

    Why RadCred is the Ideal Choice for Bad Credit Borrowers

    RadCred stands out as a reliable solution for individuals seeking no credit check loans with guaranteed approval, especially those with bad credit. Here are some key advantages of choosing RadCred:

    • Same-Day Funding: RadCred offers fast access to funds, ensuring you get the money you need when emergencies arise.
    • No Hidden Fees: The platform provides transparent APRs and terms, ensuring borrowers won’t face unexpected charges or surprises.
    • Flexible Terms: You can select a loan amount and repayment plan that best fits your financial situation, offering more control over your loan.
    • Trustworthy Network: RadCred partners exclusively with licensed lenders who adhere to ethical lending practices, ensuring a safe borrowing experience.
    • Safe and Secure: With advanced encryption, RadCred protects your personal and financial data, giving you peace of mind throughout the process.

    RadCred’s no credit check loans provide a transparent, secure, and flexible way for bad credit borrowers to access urgent financial relief.

    RadCred Offers Various No Credit Check Loan Options for Borrowers with Bad Credit

    RadCred’s platform is designed to help individuals facing financial difficulties, especially those with bad credit, by providing a range of no credit check loan options. With a focus on income and repayment ability, RadCred ensures a quick and seamless loan process, making it a reliable choice for borrowers who may have been turned down by traditional banks.

    Types of No Credit Check Loans Provided by RadCred

    1. Payday Loans Online (Same Day):
      RadCred connects borrowers with lenders who offer payday loans online with same-day funding. These short-term loans are ideal for those who need urgent financial assistance before their next paycheck.
    2. Bad Credit Payday Loans:
      Tailored for individuals with poor credit scores, RadCred’s bad credit payday loans provide quick access to funds with guaranteed approval based on income verification, rather than credit history.
    3. Installment Loans No Credit Check:
      For larger expenses, RadCred offers installment loans with flexible repayment terms. These loans are ideal for those who need more time to repay their borrowed amount.
    4. Emergency Loans Without Credit Checks:
      RadCred provides emergency loans to cover unexpected expenses such as medical bills or urgent home repairs. The process is fast and efficient, ensuring that funds are available when needed most.
    5. 1-Hour Payday Loans:
      For immediate financial needs, RadCred offers 1-hour payday loans, providing quick funding for those in urgent need of cash.

    These loan types offer flexibility and quick access to cash, all while ensuring that borrowers do not face the traditional barriers imposed by credit score checks.

    How RadCred’s No Credit Check Loans Compare to Traditional Loans

    Traditional Loans:

    • Strict credit score requirements: Traditional lenders, such as banks and credit unions, heavily rely on credit scores to determine eligibility. Individuals with bad credit or a low credit score often face difficulty in securing loans. If your score is below 600, the chances of qualifying for a traditional loan are significantly reduced.
    • Longer approval processes: The approval process for traditional loans is often lengthy and involves numerous steps. Applicants typically need to submit extensive paperwork, including proof of income and assets. The long waiting time is a major disadvantage for those needing immediate access to funds for emergencies.
    • Higher risk of rejection for bad credit borrowers: Traditional loans are usually not accessible to individuals with bad credit. The rejection rate is high for bad credit borrowers because traditional lenders focus primarily on the applicant’s credit history. As a result, those with poor credit scores or limited credit history are often denied financial assistance.

    RadCred No Credit Check Loans:

    • Focus on income and repayment ability: Unlike traditional lenders, RadCred evaluates applicants based on their income and repayment ability, rather than credit scores. This provides an opportunity for borrowers with bad credit to qualify for loans.
    • Guaranteed approval for eligible applicants: RadCred offers guaranteed approval to borrowers who meet the basic eligibility criteria, ensuring that more individuals can secure funds.
    • Fast, same-day funding with no hard credit checks: RadCred’s platform offers same day funding and does not perform hard credit checks, which means applying will not impact your credit score. This makes it an ideal choice for those needing immediate funds for emergencies.

    In comparison to traditional loans, RadCred is a faster, more inclusive, and accessible lending solution, especially for individuals with bad credit.

    Frequently Asked Questions (FAQs)

    Q1: What is the maximum loan amount for no credit check loans?
    RadCred offers loans up to $5,000 for eligible applicants, depending on income and other factors. Some lenders in RadCred’s network may even offer amounts up to $10,000 based on your financial profile.

    Q2: How fast will I receive the money?
    Once approved, RadCred typically transfers funds to your bank account the same day. The exact timing can depend on your bank’s processing times.

    Q3: Will applying for a loan affect my credit score?
    No, RadCred uses a soft credit check, which will not impact your credit score. This ensures you can apply for loans with confidence, even with a low credit score.

    Q4: Are there any hidden fees?
    No, RadCred is committed to transparency. All fees, APR, and repayment terms are disclosed upfront, so you won’t face any unexpected charges.

    Final Thoughts on RadCred’s No Credit Check Loans

    RadCred’s no credit check loans offer a flexible, accessible solution for individuals who need bad credit loans. With guaranteed approval based on income and a no credit check approach, RadCred makes it easier for U.S. residents to access funds when they need them most. Whether you need emergency loans for bad credit or are simply looking for a way to manage unexpected expenses, RadCred offers a fast, secure, and reliable platform for financial relief.

    Disclaimer:

    RadCred’s loan offers are subject to meeting lender requirements and state-specific regulations. While RadCred provides high approval rates for bad credit applicants, no loan is truly guaranteed for everyone. Borrowers must meet basic eligibility criteria. RadCred uses a soft credit check, so your credit score won’t be affected by applying. Loan terms and amounts vary based on lender and borrower profile. Funds are typically deposited the same day, though exact timing may differ.

    The MIL Network

  • MIL-OSI: Paritii Joins Google.org’s 2025 Generative AI Accelerator to Transform Student Support with AI-Driven Workflows

    Source: GlobeNewswire (MIL-OSI)

    Paritii, creator of Swyft, is now backed by Google.org as part of the 2025 Generative AI Accelerator. Swyft utilizes generative AI to automate higher education workflows, offering personalized student support 24/7 and enabling staff to focus on high-value tasks, targeting 2 million students.

    Photo Courtesy of Paritii

    LONDON, July 01, 2025 (GLOBE NEWSWIRE) — Paritii, an EdTech leader in generative AI for higher education, has joined the 2025 Google.org Generative AI Accelerator. This recognition highlights Paritii’s work transforming student experience through its AI-powered Swyft platform, automating administrative processes, and delivering on-demand student support.

    Our commitment to social impact is recognized and trusted by our community. Based on that trust, we are honored to receive this backing from Google.org as we continue this vital work,” said Dr. Shmona Simpson, CEO of Paritii.

    Administrative burdens at underfunded colleges reduce retention, satisfaction, and graduation rates due to inefficient systems and overwhelmed advisors, especially for students with historically poor outcomes.

    Paritii’s Swyft platform automates high-volume administrative tasks, allowing staff to focus on impactful student interactions. Leveraging a proprietary frontend API and a retrieval-augmented generation (RAG) enabled large language model (LLM), Swyft processes millions of data points to streamline document workflows and support requests.

    Swyft combines generative AI with a tailored backend to deliver precision, speed, and personalized support. Students access a 24/7 AI-powered workspace to manage tasks, get guidance, and generate documents.

    The solution is poised to reach over 2 million students in the next two years, transforming how institutions serve learners at scale.

    According to Paritii, Swyft has already demonstrated transformative potential with quantifiable impact and outcomes.

    • 85% reduction in administrative processing times across partner institutions.
    • Serve 200,000 students by the end of the accelerator and 2M students in two years
    • 90% student satisfaction and a 60% reduction in document-related queries.
    • 15% increase in student retention rates through faster, more equitable support.

    This opportunity helps to affirm Paritii’s bold approach to using generative AI for systemic change, spotlighting Swyft as a model for equitable innovation and empowering the team to reimagine student support across the higher education landscape.

    The Google.org Generative AI Accelerator offers over $30 million in funding and support, plus access to Google’s AI experts and Cloud tools. This partnership will help Paritii expand Swyft’s capabilities and advance its mission to improve student outcomes across higher education at scale.

    About Paritii

    Paritii is an innovation firm at the forefront of ethical AI, specializing in inclusive technology solutions for education, medicine, and public systems. Since 2020, Paritii has partnered with over 50 institutions to design tools that are as responsible as they are effective. Flagship platforms like Swyft and SwyftRFP reflect Paritii’s mission: to expand access, reduce disparities, and make systems work better for the people they serve. From streamlining student support to reimagining procurement, Paritii is building a future where technology works for everyone.

    Contact Information:

    Contact Person’s Name: Griselle Colon
    Organization / Company: Paritii
    Company website: www.paritii.com
    Contact Email Address: griselle@paritii.com
    City, State / Province, Country: Spokane, Washington, USA

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/3def36a2-90a0-4d8d-801f-860aacae112d

    The MIL Network

  • MIL-OSI Global: Why frequent nightmares may shorten your life by years

    Source: The Conversation – UK – By Timothy Hearn, Senior Lecturer in Bioinformatics, Anglia Ruskin University

    Lightfield Studios/Shutterstock.com

    Waking up from a nightmare can leave your heart pounding, but the effects may reach far beyond a restless night. Adults who suffer bad dreams every week were almost three times more likely to die before age 75 than people who rarely have them.

    This alarming conclusion – which is yet to be peer reviewed – comes from researchers who combined data from four large long-term studies in the US, following more than 4,000 people between the ages of 26 and 74. At the beginning, participants reported how often nightmares disrupted their sleep. Over the next 18 years, the researchers kept track of how many participants died prematurely – 227 in total.

    Even after considering common risk factors like age, sex, mental health, smoking and weight, people who had nightmares every week were still found to be nearly three times more likely to die prematurely – about the same risk as heavy smoking.

    The team also examined “epigenetic clocks” – chemical marks on DNA that act as biological mileage counters. People haunted by frequent nightmares were biologically older than their birth certificates suggested, across all three clocks used (DunedinPACE, GrimAge and PhenoAge).

    The science behind the silent scream

    Faster ageing accounted for about 39% of the link between nightmares and early death, implying that whatever is driving the bad dreams is simultaneously driving the body’s cells towards the finish line.

    How might a scream you never utter leave a mark on your genome? Nightmares happen during so-called rapid-eye-movement sleep when the brain is highly active but muscles are paralysed. The sudden surge of adrenaline, cortisol and other fight-or-flight chemicals can be as strong as anything experienced while awake. If that alarm bell rings night after night, the stress response may stay partially switched on throughout the day.

    Continuous stress takes its toll on the body. It triggers inflammation, raises blood pressure and speeds up the ageing process by wearing down the protective tips of our chromosomes.

    On top of that, being jolted awake by nightmares disrupts deep sleep, the crucial time when the body repairs itself and clears out waste at the cellular level. Together, these two effects – constant stress and poor sleep – may be the main reasons the body seems to age faster.

    Your brain clears out waste when you sleep.
    Teeradej/Shutterstock.com

    The idea that disturbing dreams foreshadow poor health is not entirely new. Earlier studies have shown that adults tormented by weekly nightmares are more likely to develop dementia and Parkinson’s disease, years before any daytime symptoms appear.

    Growing evidence suggests that the brain areas involved in dreaming are also those affected by brain diseases, so frequent nightmares might be an early warning sign of neurological problems.

    Nightmares are also surprisingly common. Roughly 5% of adults report at least one each week and another 12.5% experience them monthly.

    Because they are both frequent and treatable, the new findings elevate bad dreams from a spooky nuisance to a potential public health target. Cognitive behavioural therapy for insomnia, imagery-rehearsal therapy – where sufferers rewrite the ending of a recurrent nightmare while awake – and simple steps such as keeping bedrooms cool, dark and screen free have all been shown to curb nightmare frequency.

    Before jumping to conclusions, there are a few important things to keep in mind. The study used people’s own reports of their dreams, which can make it hard to tell the difference between a typical bad dream and a true nightmare. Also, most of the people in the study were white Americans, so the findings might not apply to everyone.

    And biological age was measured only once, so we cannot yet say whether treating nightmares slows the clock. Crucially, the work was presented as a conference abstract and has not yet navigated the gauntlet of peer review.

    Despite these limitations, the study has important strengths that make it worth taking seriously. The researchers used multiple groups of participants, followed them for many years and relied on official death records rather than self-reported data. This means we can’t simply dismiss the findings as a statistical fluke.

    If other research teams can replicate these results, doctors might start asking patients about their nightmares during routine check-ups – alongside taking blood pressure and checking cholesterol levels.

    Therapies that tame frightening dreams are inexpensive, non-invasive and already available. Scaling them could offer a rare chance to add years to life while improving the quality of the hours we spend asleep.

    Timothy Hearn does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Why frequent nightmares may shorten your life by years – https://theconversation.com/why-frequent-nightmares-may-shorten-your-life-by-years-260008

    MIL OSI – Global Reports

  • MIL-OSI Global: Where does the UK most need more public EV chargers?

    Source: The Conversation – UK – By Labib Azzouz, Research Associate in Transport and Energy Innovation, University of Oxford

    Electric vehicle chargers at a motorway service station in Grantham, England. Angus Reid/Shutterstock

    The automotive and EV industry has repeatedly insisted that the UK needs more electric vehicle (EV) chargers to help motorists make the switch from conventional fossil-fuel burning cars.

    The Labour government has announced £400 million to install EV chargers, mainly on streets in poorer residential neighbourhoods, in place of the Conservative’s £950 million rapid charging fund that was directed at installing chargers in motorway service stations.

    Does it matter where these chargers are – and who pays to build them?

    The short answer is yes, it does matter. Our research conducted at motorway and local EV charging stations across England – including those located in residential areas, high streets and community centres – indicates that these two types of infrastructure serve distinct groups of users and fulfil different purposes.

    Suggesting that one can substitute for the other risks sending mixed signals to both the industry and the driving public.

    We found that motorway charging stations tend to cater to wealthier men, who are more likely to own premium EVs with long-range batteries and better performance. Many of these drivers have access to home chargers, so their use of public chargers is only for occasional, long-distance travel for business, leisure, or holidays – trips that require chargers along motorways.

    Convenience and charging speed are often more important than the price of public charging, particularly when the travel costs of these drivers are covered by their employers.

    Local public charging stations, on the other hand, serve more diverse groups. These include drivers from lower-income households who are more likely to own older and smaller EVs with shorter ranges. Access to home charging is often limited, especially for people living in flats or urban areas without driveways, garages or off-street parking.

    Not everyone can plug in at home.
    Andersen EV/Shutterstock

    Local chargers are also vital for taxi and delivery drivers who depend on their vehicles for work and make frequent short trips throughout the day. There are many professional drivers without access to workplace charging stations who need alternative local provision – something the Conservative government recognised in its 2022 EV charging strategy.

    Ultimately, the transition to EVs should take a balanced approach that carefully considers social equity, economic viability and environmental impact.

    Different locations serve different drivers

    Motorway charging stations are commercially attractive to private investors, such as energy companies, specialist charging providers and car manufacturers, despite their higher upfront costs and complex requirements.

    This is because service stations offer greater short-term revenue due to their ability to set premium prices. This is a result of there being limited alternatives and high demand for rapid charging, especially among long-distance travellers, and the willingness of EV drivers to pay for speed and convenience – unlike in more price-sensitive neighbourhood settings.

    Unsurprisingly, the government found that the rapid deployment of motorway chargers in recent years has been largely driven by the private sector. Our research highlighted that these revenues could be enhanced by a broader range of retail, dining and relaxation amenities, turning the time waiting for a car to charge into a more productive and pleasurable experience.

    Residential charging stations may not offer high profits per charge, but they typically require lower capital investment and benefit from consistent and predictable use. They are also suited to measures for reducing strain on the grid and balancing energy supply and demand.

    These measures include tariffs that make it cheaper to charge EVs during off-peak hours, or technology that allows cars to feed electricity stored in batteries back into the grid. These features make them appropriate for public funding, where return on investment is measured not just in profit but in value for the public.

    Considering that local EV charging serves those who do not have access to home charging and who drive for a living, the case for public funding is even stronger. These sorts of chargers make switching to an EV easier for different groups.

    For example, safe and carefully placed public chargers could help more women switch to EVs – although our research suggests that, while “careful placement” might refer to residential areas, it doesn’t necessarily mean on streets. Well-lit car parks and community destinations are sometimes considered safer options.

    Charging points outside a community centre in the Outer Hebrides, Scotland.
    AlanMorris/Shutterstock

    By helping EV drivers make frequent short trips, local chargers can also significantly reduce urban air pollution, emissions and noise, contributing to more liveable, healthier cities.

    That said, motorway charging stations and those near key transport corridors still play a crucial role in a comprehensive national network, and public funding may be required in more peripheral and rural areas of the UK where installations lag and commercial interest is limited.

    While long-distance trips are less frequent than short ones, they account for a disproportionately large share of energy use and emissions. Switching such trips to electric will be essential to reaching net zero goals.

    It seems reasonable to prioritise public investment in local EV charging infrastructure to support a fairer EV transition, but this should not be limited to on-street chargers. Investment is needed in residential and non-residential areas, public car parks, community centres and workplaces.

    Different types of EV charging are not interchangeable – all are needed to support the switch.


    Don’t have time to read about climate change as much as you’d like?

    Get a weekly roundup in your inbox instead. Every Wednesday, The Conversation’s environment editor writes Imagine, a short email that goes a little deeper into just one climate issue. Join the 45,000+ readers who’ve subscribed so far.


    Labib Azzouz has received funding from the UK Research and Innovation via the UK Energy Research Centre and Innovate UK as part of the Energy Superhub Oxford (ESO) project.

    Hannah Budnitz receives government funding from UK Research and Innovation grants via the Economic and Social Research Council and the Engineering and Physical Sciences Research Council. She has also previously received funding from Innovate UK and the Department for Transport.

    ref. Where does the UK most need more public EV chargers? – https://theconversation.com/where-does-the-uk-most-need-more-public-ev-chargers-259623

    MIL OSI – Global Reports

  • MIL-OSI Global: The Bear season 4: this meaty restaurant drama is still an enticing bingeable prospect

    Source: The Conversation – UK – By Jane Steventon, Course Leader, BA (Hons) Screenwriting; Deputy Course Leader & Senior Lecturer, BA (Hons) Film Production, University of Portsmouth

    Take a soupçon of identity crisis, a pinch of perfectionism, a scoop of burnout and mix thoroughly with a large measure of fraternal grief and sear over a hot grill and voilà! You have The Bear, a perfectly blended drama about a chef on the edge, driven by relentless ambition and exacting standards as he turns his family’s humble sandwich shop into a fine-dining restaurant.

    This intoxicating family drama was eaten up by critics and audiences alike in 2022, its first season garnering a rare perfect 100% score on Rotten Tomatoes, the subsequent two reaching scores of 99% and 89% respectively. It’s certainly a hard act to follow for season four.

    The first ten minutes of The Bear’s pilot episode thrillingly defined what was to come in high-octane style and scene-setting detail. The first season delivered a clever mix of authentic dialogue and setting, relatable family dysfunction and dynamic production style.

    Showstopping scenes of stressful kitchen heat were served up alongside a delectable range of new and established talent in the form of Jeremy Allen White (Carmy), Ebon Moss-Bachrach (Richie), Ayo Edebiri (Sydney) and Oliver Platt (Cicero/Uncle Jimmy).


    Looking for something good? Cut through the noise with a carefully curated selection of the latest releases, live events and exhibitions, straight to your inbox every fortnight, on Fridays. Sign up here.


    In charge is showrunner Christopher Storer, who came up with the concept after being inspired by his friend’s father Chris Zucchero, the owner of Chicago sandwich joint Mr Beef.

    With his professional chef sister also serving as a consultant, Storer succeeded in creating a deliciously authentic and intensely real drama. Buoyed along the way by 21 Emmys and five Golden Globes, Storer also watched his cast ascend, the tortured-soul performance of White garnering particular praise.

    Testing the parameters of a long-running show, Storer focused in on the entire cast of characters and their backstories, a successful tactic used by shows such as Orange is the New Black to keep the drama – largely confined to a kitchen set – fresh.

    Pulling in Hollywood die-hards Oliver Platt and Jamie Lee Curtis for familial tough-love roles further enriched the mix, often using a non-chronological timeframe to go back to moments of family turbulence and tension. This made for three-dimensional characters and enabled evolution around difficult themes such as the aftermath of suicide and generational trauma.

    The Bear has come a long way in three seasons, starting with a spit and sawdust establishment serving up the lunchtime beef sandwiches for its working customers.

    Carmy’s experience and longing for the high-end restaurant of his dreams hurtled forward in season two, as he sent his core crew off in different directions to hone their skills and help form his vision. A restaurant trying to win success but plagued with challenges, there were exhausting familial tensions embedded in every episode of season three.

    Several themes play out in The Bear: love, family, loyalty, community and purpose. The relationship between Carmy and cousin Richie (not a real cousin, but a term of endearment) is key to linking past and future. Richie provides some of the highlights of comedy and pathos as he spits truth bombs, most frequently at talented sous-chef Syd.

    It is Syd who follows Carmy’s aspirations for gastronomic perfection but can’t abide the lack of order or the intense highs and lows that inevitably go hand in hand with his talent. And this is one central question to consider for the latest series: just how long will the audience remain loyal to Carmy and his endless quest for artistry in a high-failure rate industry?

    It’s all in the sauce

    Storer begins season four with a ghost. Carmy and his dead brother Mikey (Jon Berthal) banter in a seven-minute scene, with Carmy ultimately confiding the dream of a restaurant as Mikey watches him make tomato sauce (“too much garlic”). The tomatoes resonate: Mikey left behind money hidden in tomato cans that ended up saving Carmy’s sanity and his dream of a proper restaurant.

    Just as oranges represent death to Frances Ford Coppola, Storer uses tomatoes to underscore themes; here they symbolise familial loyalty and history, a solid base to a meal, a core ingredient. Mikey was one of the core ingredients in Carmy’s life, and now he’s gone.

    Carmy awakens to a rerun of Groundhog Day on late-night TV and fittingly, we too are back – same dish, now more seasoned and enriched with its core ingredients and ready to serve up a big bowlful of family, love, ambition, strife and grief.

    The episode furthers the theme of loyalty as the restaurant receives The Tribune’s review – the cliffhanger of the season three finale. Naturally, Storer doesn’t let up – the food critic highlights “dissonance” and Carmy is back in emotional chaos, with Syd urging him to lighten up and lose the misery.

    In truth, this series could do with adding some more humour in the mix; the teasing and frivolous banter of season one has got somewhat lost in the seasons that followed.

    Storer ramps up the tension, setting several ticking clocks in place: chiefly Uncle Jimmy’s notice period for the business to turn a profit is literally installed on a digital clock in the kitchen. Then Syd’s headhunter calls, offering her desired autonomy and an exit strategy from the chaos.

    And Carmy raises the stakes with an intention to gain a Michelin star. Thus a heroic journey is set in place for the whole cast, with future battles both internal and external laid out.

    There’s too much going on at this feast and the feeling of being stuffed full of story is tangible by the end of the first episode. Still, with a season lining up more emotional turbulence steered by White, more celebrity cameos (Brie Larson and Rob Reiner are lined up) and the excellent cinematography and performances that we have come to expect, Storer stirs his secret sauce.

    The Bear still offers an entertaining and enticing proposition, bingeable and mostly satisfying.

    Jane Steventon does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. The Bear season 4: this meaty restaurant drama is still an enticing bingeable prospect – https://theconversation.com/the-bear-season-4-this-meaty-restaurant-drama-is-still-an-enticing-bingeable-prospect-260143

    MIL OSI – Global Reports

  • MIL-OSI Global: Five ways to avoid illness like the Lionesses

    Source: The Conversation – UK – By Samantha Abbott, Doctoral Researcher, Department of Sport Science, Nottingham Trent University

    England’s Beth Mead cheering on podium after win v Germany in the Women European Championship Final 2022 photographyjp/Shutterstock

    Think back to the last time you had a cold or the flu. Now imagine stepping onto the pitch for a European Cup final, while battling through those symptoms. For elite athletes, illness can strike at the worst possible time – and it could hit women harder.

    Research suggests that female athletes are more susceptible to cold and flu-like illnesses than their male counterparts. For England women’s national football team, the Lionesses, this risk only increases before a major tournament like the Euros.

    Close contact, shared kit, disrupted sleep and travel all add up to a perfect storm for infection. But targeted nutritional strategies, alongside good sleep and hand hygiene, can offer a crucial line of defence.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    1. Fuel first: energy matters for immunity

    Before anything else, players need to eat enough. Energy supports both performance and immune function. In fact, female athletes who didn’t meet their energy needs in the run-up to the 2016 Olympics were four times more likely to report cold or flu symptoms.

    This is especially relevant in women’s football, where low energy and carbohydrate intake has been documented among professional players and recreational players too. Regular meals and snacks that include carbohydrate-rich foods like oats, bread and pasta, especially around training, are essential to meet energy demands and support immune health.

    2. Eat the rainbow

    Athletes are often encouraged to go beyond the public’s five-a-day fruit and veg target, aiming instead for eight to ten portions daily. Why? Because colourful plant foods are packed with vitamins, minerals, antioxidants and anti-inflammatory compounds: all vital for immunity.




    Read more:
    We’re told to ‘eat a rainbow’ of fruit and vegetables. Here’s what each colour does in our body


    Each colour offers unique benefits. For instance, red fruits and vegetables, such as tomatoes, contain lycopene, a powerful antioxidant. Orange produce like carrots get their colour from beta-carotene, which is converted by the body into vitamin A – a key vitamin for immune health.

    Eating a rainbow of colours means getting a wide range of nutrients.

    3. Vitamin C: powerful but timing matters

    Vitamin C has long been linked with reducing the risk and severity of cold and flu symptoms. One Cochrane review found that regular vitamin C intake halved the risk of illness in physically active people.

    However, more isn’t always better. Long-term use of high-dose vitamin C supplements could blunt training adaptations – the structural and functional changes the body undergoes in response to repeated exercise – because of its anti-inflammatory effects. That’s why vitamin C is most effective when used strategically, such as during high-risk periods like travel or intense competition. Good food sources include oranges, kiwis, blackcurrants, red and yellow peppers, broccoli and even potatoes.

    4. Gut health supports immune health

    Around 70% of the immune system is located in the gut, making gut health a key player in illness prevention. This is where probiotics (live bacteria) and prebiotics (which feed those bacteria) come in.

    Probiotics, found in fermented foods like kefir and kimchi or in supplement form, have been shown to reduce the duration and severity of respiratory illnesses in athletes. Prebiotics have similarly shown promise. In one study, a 24-week prebiotic intervention in elite rugby players reduced the duration of cold and flu symptoms by over two days.




    Read more:
    Gut microbiome: meet Lactobacillus acidophilus – the gut health superhero


    In the build-up to the Euros, including probiotic-rich foods in their diet or taking a daily prebiotic and probiotic supplement may help players stay healthy and return to training faster if they do get ill.

    5. Zinc lozenges: first aid for a sore throat

    If cold-like symptoms do appear, zinc lozenges can offer fast-acting relief. Zinc has antiviral, antioxidant and anti-inflammatory properties. When zinc is delivered as a lozenge, it acts directly in the throat, where many infections begin. Taken within 24 hours of symptoms starting, zinc lozenges could shorten illness duration by a third.

    But caution is key. Long-term use of high-dose zinc supplements can actually suppress immune function. Zinc lozenges should only be used short-term at symptom onset, not as a daily supplement.

    Staying match-ready during major tournaments means more than just tactical drills and fitness. Nutrition is a powerful ally in illness prevention, especially for women’s teams like the Lionesses. From fuelling adequately to supporting gut health and knowing when to supplement, these nutritional strategies can make the difference between sitting on the bench and bringing a trophy home.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Five ways to avoid illness like the Lionesses – https://theconversation.com/five-ways-to-avoid-illness-like-the-lionesses-259302

    MIL OSI – Global Reports

  • MIL-OSI Global: Why is Islamophobia so hard to define?

    Source: The Conversation – UK – By Julian Hargreaves, Lecturer, Department of Sociology and Criminology, City St George’s, University of London

    The UK government wants a new definition of Islamophobia and has created a working group of politicians, academics and independent experts to provide one. It aims to settle long-running political debates over the term.

    The concept of Islamophobia describes anti-Muslim and anti-Islamic prejudices and their impact on Muslim communities. The term became familiar in the UK following publication of the Runnymede Trust report, Islamophobia: A Challenge for Us All, in 1997.

    The concept is now used to discuss negative public opinion towards Muslims and Islam, biased media reporting, verbal and physical assaults and online attacks. It is also used when discussing social and economic inequalities, discrimination within various institutional settings and unfair treatment from the police and security services.

    Previous definitions have been controversial, failing to unite politicians, academics and British Muslims, and leading to charged debates over free speech.

    Some academics have argued that the word “Islamophobia” – which suggests a phobia or fear of Islam – is an inaccurate label for a prejudice which often targets skin colour, ethnicity and culture.

    Many Muslim-led organisations accept that the term is imperfect and interchangeable with others such as “anti-Muslim hatred”. However, they maintain the term “Islamophobia” is needed to focus attention on a growing problem.

    Definitions and controversy

    The 1997 Runnymede Trust report defined Islamophobia as an “unfounded hostility towards Islam”, “the practical consequences of such hostility in unfair discrimination against Muslim individuals and communities” and “the exclusion of Muslims from mainstream political and social affairs”.

    The Runnymede Trust revised its definition in a follow-up report published in 2017. The report defines Islamophobia in two ways.

    The first is “anti-Muslim racism”. A longer, second version amends the United Nation’s 1965 definition of “racial discrimination”. These revised definitions are important because they re-framed Islamophobia as a product of racist thinking rather than religious prejudices.

    Other attempts to define Islamophobia include British academic Chris Allen’s 200-word definition. Allen defined it as an ideology like racism that spreads negative views of Muslims and Islam, influencing social attitudes and leading to discrimination and violence. US political scientist Erik Bleich defined it more succinctly as “indiscriminate negative attitudes or emotions directed at Islam or Muslims”.

    In 2018, the all-party parliamentary group on British Muslims published another definition linking Islamophobia to racism. According to the APPG, “Islamophobia is rooted in racism and is a type of racism that targets expressions of Muslimness or perceived Muslimness.” The APPG called for its definition to be legally binding.

    The APPG definition was adopted by various organisations including local authorities, UK universities and the Labour party while in opposition. But it was rejected by the then Conservative government and later by the current Labour government, which argued it was seeking “a more integrated and cohesive approach”.

    This lack of consensus over previous definitions led Angela Rayner, the deputy prime minister, to announce the working group in March 2025. The group’s aim is to provide a new definition of “anti-Muslim hatred and Islamophobia” which is “reflective of a wide range of perspectives and priorities for British Muslims”.

    Former Conservative MP and attorney general Dominic Grieve was appointed to chair the group, evidence of Labour’s ambition to build consensus.

    A march in London against Islamophobia, racism and anti-migrant views.
    Shutterstock

    Some are concerned that use of the term “Islamophobia”, and particularly the APPG definition, stifles legitimate criticism of Islam. Free speech campaigners have argued that it is “blasphemy via the back door”.

    The centre-right thinktank Policy Exchange published a report claiming that the term is used in bad faith to divert attention away from serious social problems within some Muslim communities – specifically, discussion of the grooming gangs scandal.

    These debates bear resemblance to those surrounding the term “antisemitism” and the adoption of a definition proposed by the International Holocaust Memorial Alliance. The term is widely accepted, although critics have argued this specific definition stifles legitimate criticism of the Israeli state.

    A new approach

    A new definition of “Islamophobia” must balance the protection of Muslim communities and freedoms of religion, expression and assembly for all Muslims and non-Muslims in the UK. It must be clear enough for everyday use, specific enough for academic and policy research, and capable of generating support across the UK’s diverse Muslim population.

    A proposed definition by an emerging thought leader on British Islam addresses these challenges. Mamnun Khan is a writer whose work explores the social integration of Muslims in contemporary British society. Khan is associated with Equi, a thinktank which describes its work as “drawing on Muslim insight”. Other members of Equi are members of the government’s working group.

    Khan sets out three tests that a definition must pass, based on Islamic law, moral teachings within Islam and other more universal values. First, a definition must serve the public interest. Second, it must be just and balanced and preserve freedom of expression. Third, it must uphold the dignity of Muslim communities.

    For Khan, “Islamophobia, also known as anti-Muslim hatred, is an irrational fear, hostility, or prejudice toward Muslims that leads to discrimination, unequal treatment, exclusion, social and political marginalisation, or violence.”

    Khan’s definition has many good qualities. It brings together stronger elements of previous definitions – for, example, the separation of negative attitudes and outcomes – without being weakened by jargon or strong political ideology. On the other hand, some social scientists may question whether defining something as “irrational” is a matter of preference rather than academic research.

    The working group also needs to decide whether Islamophobia and anti-Muslim hatred are closely related or exactly the same. Failure to do so will cause confusion and inconsistency among those wishing to apply the term precisely. Regardless, Khan’s example is a strong step in the right direction. A better definition of Islamophobia is needed, and now within reach.

    Julian Hargreaves is an Affiliated Researcher at the Prince Alwaleed bin Talal Centre of Islamic Studies, University of Cambridge.

    ref. Why is Islamophobia so hard to define? – https://theconversation.com/why-is-islamophobia-so-hard-to-define-258522

    MIL OSI – Global Reports

  • MIL-OSI Video: DOJ/FTC Host Listening Session on Lowering Americans’ Drug Prices Through Competition

    Source: United States Department of Justice (video statements)

    DOJ/FTC Host Listening Sessions on Lowering Americans’ Drug Prices Through Competition: Anticompetitive Conduct by Pharmaceutical Companies Impeding Generic or Biosimilar Competition

    https://www.youtube.com/watch?v=vqdA4j0P5bA

    MIL OSI Video

  • MIL-OSI USA: Welch Votes No on Republicans’ Disastrous Tax Bill 

    US Senate News:

    Source: United States Senator Peter Welch (D-Vermont)

    WASHINGTON, D.C. — U.S. Senator Peter Welch (D-Vt.), a member of the Senate Finance and Judiciary Committees, and Ranking Member of the Senate Agriculture Subcommittee on Rural Development, Energy, and Credit, released the following statement after voting in strong opposition against Senate Republicans’ disastrous tax bill:   
    “We have an obligation to put the constituents and hardworking families we represent first. Instead of helping everyday people, Republicans’ tax bill capitulates to President Trump and harms communities large and small. This cruel bill will take us back decades by exacerbating income inequality, ripping away health care, and rolling back progress on climate change. It will also raise costs and weaken the economy. All of this pain has been caused to help pay for tax cuts for the very wealthy—a top priority of President Trump. I am grateful to the few Republicans—Senators Tillis, Paul, and Collins—who voted against this terrible bill,” said Senator Welch. “The irony is all these hardships will be faced by citizens in red and blue states—the pain is bipartisan. It’s outrageous that families will now face untold hardships because of the Trump Administration’s cuts. I voted no on this bill and will fight to reverse these policies in any way I can.”  
    Republicans’ reckless tax and spending bill will block access to health care for 17 million people, rip away vital food assistance for millions, cut clean energy incentives and add a tax to wind and solar energy, raise utility bills and grocery prices, and tank the economy—all to pay for tax cuts for the very wealthy.    
    Senator Welch filed amendments and changes to Republicans’ One Big Beautiful Bill Act to strengthen the economy, protect access to health care and nutrition programs, and provide more stability for families and rural communities, including provisions to: 
    Protect Access to Health Care and Support Rural Hospitals:  

    Welch proposed requiring the Finance Committee to rewrite the bill to prevent harm to rural health care and the fiscal wellbeing of rural hospitals;  

    Welch proposed requiring the Finance Committee to exempt managed care programs operated by state governments like Vermont from any changes proposed to state directed payments.  

    Welch proposed requiring the Finance Committee to strike any changes to provider taxes, including changes that would impact states like Vermont with Medicaid expansion;  

    Welch proposed requiring the Health, Education, Labor and Pensions (HELP) Committee to make it easier to verify eligibility for the Affordable Care Act’s premium tax credits and expand special enrollment periods under certain circumstances. 

    Defend Food Assistance Programs:  

    Welch proposed requiring the Agriculture Committee to strike any cost-shifts of administering SNAP to states, which would kick American families off the food assistance they need and strain state budgets;  

    Welch proposed an amendment to strike administrative cost-shifts for SNAP;  

    Welch proposed an amendment to adjust the Thrifty Food Plan for cities, counties, and regions where the price of food is 10% higher than the national average;  

    Welch proposed an amendment that places a floor on SNAP allotments to households instead of a ceiling;  

    Welch proposed an amendment preserving the standard utility deduction, which cuts administrative red tape and boosts benefits by providing a more accurate portrayal of a household’s available resources for food when determining SNAP eligibility; 

    Welch proposed requiring the Agriculture Committee to rewrite the bill to allow volunteer work to qualify under SNAP’s work requirements.   

    Protect Programs and Government Services:  

    Welch proposed requiring the Finance Committee to rewrite the bill to maintain the energy efficient home improvement tax credit at current levels through 2028;  

    Welch proposed an amendment to strike the repeal of several home energy efficiency tax credits, including credits for home energy, rooftop solar, energy efficient homes for homebuilders, and more;  

    Welch proposed striking language in the bill that would rescind funding for state-based contractor training grants, as required in Welch’s HOPE for HOMES Act, passed as part of the Inflation Reduction Act;  

    Welch proposed striking language in the bill that would institute taxes on international remittances.  

    Welch proposed an amendment to dedicate funding for residential reentry centers, which are needed in Vermont;  

    Welch proposed an amendment to dedicate funding for the federal public defenders program, which is currently underfunded. 

    Senator Welch has been an outspoken opponent of the President Trump’s One Big Beautiful Bill Act, which Republicans are advancing through reconciliation process without Democratic support. Late Sunday evening, Senator Welch took to the Senate floor to reveal how Republicans’ disastrous tax and spending bill will force millions of working Americans in Vermont, West Virginia, and across the country to lose their health coverage, rip away vital food assistance for more than 42 million Americans, cut clean energy incentives and add a tax to wind and solar energy, raise utility bills and grocery prices, and tank the economy—all to pay for tax cuts for the very wealthy.   
    Welch has slammed the bill for threatening access to health care and cutting food assistance, and has sounded the alarm about how this bill will add more than $4 trillion to the national debt and tank the economy.    

    MIL OSI USA News

  • President Murmu inaugurates and lays foundation stones for key projects at Mahayogi Gorakhnath University

    Source: Government of India

    Source: Government of India (4)

    President Droupadi Murmu on Tuesday inaugurated and laid the foundation stone for multiple development projects at Mahayogi Gorakhnath University in Gorakhpur. The projects include the inauguration of the University’s Auditorium, Academic Block, and Panchkarma Kendra, as well as the foundation stone-laying for a new Girls’ Hostel.

    Addressing the gathering, the President praised the University for promoting a holistic approach to medicine by integrating allopathy and Ayurveda education and healthcare services through its Medical College, Ayurveda College, and affiliated hospitals. She also acknowledged the efforts of Gorakshanath Medical College Hospital and Research Centre, which is in the process of establishing a state-of-the-art 1800-bed hospital.

    Highlighting the role of private educational institutions in nation-building, the President emphasized that those committed to philanthropy and public service would play a key role in realizing the objectives of the National Education Policy (NEP) 2020. 

    Murmu noted that Mahayogi Gorakhnath University is the first private university in Gorakhpur and has, within just four years of its establishment, emerged as a significant centre for higher and employment-oriented education in eastern Uttar Pradesh.

    The President expressed her particular delight in laying the foundation stone for the new Girls’ Hostel, calling it a vital initiative for women’s empowerment. She stressed that lack of safe residential facilities often hinders girls’ access to higher education. In this regard, the University’s step to build a dedicated hostel for female students would make higher education more accessible and secure for women.

    “Education is the most effective means of empowerment,” the President said, applauding the University’s efforts in contributing to gender equity in education.

    Murmu also said that the overall health and educational development of Purvanchal, the eastern region of Uttar Pradesh, would significantly contribute to the inclusive growth of the entire state. “When Uttar Pradesh, the most populous state in the country, progresses rapidly, India as a whole will set new benchmarks in development,” she added.

  • MIL-OSI USA: Elkton man convicted of child exploitation gets 30-year prison sentence following ICE Baltimore investigation

    Source: US Immigration and Customs Enforcement

    BALTIMORE — An investigation conducted by U.S. Immigration and Customs Enforcement led to the sentencing of Mark Rice, 38, to 30 years in prison followed by lifetime supervised release, for producing and distributing child sexual abuse material.

    “This sentencing is a powerful reminder that those who exploit and abuse children will be relentlessly pursued and held accountable,” said ICE Homeland Security Investigations Baltimore Special Agent in Charge Michael McCarthy. “There is no place in society for predators who create and distribute child sexual abuse material. These crimes shatter lives, and HSI will never waver in our mission to bring justice to victims by targeting those who commit these horrific acts. We will continue to work with our partners to ensure the strongest possible consequences under the law.”

    Rice previously pled guilty to one count of producing child sexual abuse material, one count of distributing child sexual abuse material and one count of possessing child sexual abuse material. These charges stem from Rice sexually abusing two minors in his care while using social media to distribute and solicit child sexual abuse material.

    According to his plea agreement, Rice used his position of authority to sexually abuse a minor — beginning when she was less than 3 years old — as he created photographic evidence of the abuse. He also exploited a second minor through surreptitious photography. Rice actively participated in online communities dedicated to trading child sexual abuse material. He used platforms such as Reddit, Telegram and Kik to distribute images of his victims and obtain material depicting other children.

    In April 2023, the National Center for Missing and Exploited Children received a CyberTip from Reddit regarding the transmission of child sexual abuse material. Authorities traced the tip to an IP address associated with Rice’s Elkton residence.

    During a Maryland State Police interview, Rice denied the accusation but was observed deleting photos from his phone. When Rice showed officers his phone, investigators spotted child sexual abuse material in a thumbnail image. Through a deeper search, authorities uncovered additional material in his recently deleted folder.

    Then, HSI Baltimore special agents discovered more than 600 child sexual abuse material images across Rice’s devices. Investigators also found that Rice used a public Reddit community to connect with people that he traded child sexual abuse material with using encrypted messaging platforms.

    McCarthy, U.S. Attorney for the District of Maryland Kelly O. Hayes and Maryland State Police Superintendent Roland L. Butler Jr. announced the indictment.

    Members of the public with information about criminal activity should contact the ICE Tip Line at 866-DHS-2-ICE (866-347-2423).

    Learn more about HSI Baltimore’s mission to increase public safety in our Maryland communities on X at @HSIBaltimore.

    MIL OSI USA News

  • MIL-OSI USA: Gov. Pillen Signs Emergency Regulations Guiding Implementation of Medical Cannabis

    Source: US State of Nebraska

    . Pillen Signs Emergency Regulations Guiding Implementation of Medical Cannabis

    LINCOLN, NE – Governor Jim Pillen has approved emergency regulations adopted by the Nebraska Medical Cannabis Commission during its most recent meeting on June 26. Rules are required today (July 1) for the Commission to be able to accept or deny applications for registration. The rules, presented to Gov. Pillen following the meeting, were signed on Sunday, June 29, after his review.

    Also at the June 26 meeting, the Commission entered into a memorandum of agreement (MOA) with the Governor’s Policy and Research office and the Department of Health and Human Services (DHHS) to assist with legal and administrative processes during the creation of the permanent rules, which are due Oct. 1.  Gov. Pillen said the participation of those agencies will ensure Nebraska’s new cannabis industry is properly regulated as outlined in the ballot initiatives passed by voters and signed by him into law.

    Below is the link to the signed emergency regulations on the Secretary of State’s website:

     Emergency Regulations PDF

    MIL OSI USA News

  • MIL-OSI: SIMPPLE Ltd. Provides Compliance Updates with Nasdaq’s Continued Listing Requirements

    Source: GlobeNewswire (MIL-OSI)

    Singapore, July 01, 2025 (GLOBE NEWSWIRE) — SIMPPLE Ltd. (NASDAQ: SPPL) (“SIMPPLE” or “the Company”), a leading technology provider and innovator in the facilities management (FM) sector, today announced that it believes it has regained compliance with the minimum shareholders’ equity requirement under Nasdaq Listing Rule 5550(b)(1) due to strong financial performance and closing of a financing round, as well as the requirement to hold an annual meeting of shareholders under Nasdaq Listing Rule 5620(a).

    Shareholders’ Equity Compliance

    As of the date of this report, the Company believes its shareholders’ equity is above the Nasdaq $2.5 million requirement. This increase is partially attributable to the closing of a private investment in public equity (“PIPE”) offering for total gross proceeds of $2,000,001.00. The objective of this fund raise is to accelerate product development and to increase market share, especially in the Australia and New Zealand (ANZ) markets. In addition, the Company expects to continue strengthening its financial position for the full year, supported by robust operating performance for the first half of 2025. Based on these trends and internal forecasts, the Company projects that it will continue to meet and exceed shareholders’ equity requirement by year-end.

    Annual General Meeting Compliance

    Separately, the Company confirms that it has successfully concluded its Annual General Meeting of Shareholders (“AGM”), which was held at 9:00am Eastern Time, on June 30, 2025. The convening of this AGM satisfies the requirement under Nasdaq Listing Rule 5620(a) to hold an annual meeting of shareholders within the required timeframe. It is, however, also noted that the Company has announced earlier this year that it will rely on Cayman Islands home country exemption with regards to AGM requirements in the future.

    The Company will continue to monitor its ongoing compliance with all applicable Nasdaq listing standards and will provide further updates as appropriate.

    About SIMPPLE LTD.

    Headquartered in Singapore, SIMPPLE LTD. is an advanced technology solution provider in the emerging PropTech space, focused on helping facilities owners and managers manage facilities autonomously. Founded in 2016, the Company has a strong foothold in the Singapore facilities management market, serving over 60 clients in both the public and private sectors and extending out of Singapore into Australia and the Middle East. The Company has developed its proprietary SIMPPLE Ecosystem, to create an automated workforce management tool for building maintenance, surveillance and cleaning comprised of a mix of software and hardware solutions such as robotics (both cleaning and security) and Internet-of-Things (“IoT”) devices. 

    For more information on SIMPPLE, please visit: https://www.simpple.ai

    Safe Harbor Statement

    This press release contains forward-looking statements. In addition, from time to time, we or our representatives may make forward-looking statements orally or in writing. We base these forward-looking statements on our expectations and projections about future events, which we derive from the information currently available to us. Such forward-looking statements relate to future events or our future performance, including: our financial performance and projections; our growth in revenue and earnings; and our business prospects and opportunities. You can identify forward-looking statements by those that are not historical in nature, particularly those that use terminology such as “may,” “should,” “expects,” “anticipates,” “contemplates,” “estimates,” “believes,” “plans,” “projected,” “predicts,” “potential,” or “hopes” or the negative of these or similar terms. In evaluating these forward-looking statements, you should consider various factors, including: our ability to change the direction of the Company; our ability to keep pace with new technology and changing market needs; and the competitive environment of our business. These and other factors may cause our actual results to differ materially from any forward-looking statement.

    Forward-looking statements are only predictions. The forward-looking events discussed in this press release and other statements made from time to time by us or our representatives, may not occur, and actual events and results may differ materially and are subject to risks, uncertainties, and assumptions about us. We are not obligated to publicly update or revise any forward-looking statement, whether as a result of uncertainties and assumptions, the forward-looking events discussed in this press release and other statements made from time to time by us or our representatives might not occur.

    The MIL Network

  • MIL-OSI Economics: Consistent Global Pricing for Microsoft’s Commercial Cloud 

    Source: Microsoft

    Headline: Consistent Global Pricing for Microsoft’s Commercial Cloud 

    MIL OSI Economics

  • MIL-OSI Economics: We’re teaming up with the Premier League to bring one billion-plus fans closer than ever to the game they love.

    Source: Microsoft

    Headline: We’re teaming up with the Premier League to bring one billion-plus fans closer than ever to the game they love.

    The Premier League is entering a new era, powered by Microsoft. As the Official Cloud and AI Partner of the Premier League, we’re helping the world’s most-watched football league unlock new value on and off the pitch. With one intelligent platform powering everything from fan experiences to organizational productivity, this partnership is redefining what’s possible. https://msft.it/6002SFRcO

    MIL OSI Economics

  • MIL-OSI Economics: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Source: Microsoft

    Headline: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Since 2024, Microsoft Threat Intelligence has observed remote information technology (IT) workers deployed by North Korea leveraging AI to improve the scale and sophistication of their operations, steal data, and generate revenue for the Democratic People’s Republic of Korea (DPRK). Among the changes noted in the North Korean remote IT worker tactics, techniques, and procedures (TTPs) include the use of AI tools to replace images in stolen employment and identity documents and enhance North Korean IT worker photos to make them appear more professional. We’ve also observed that they’ve been utilizing voice-changing software.

    North Korea has deployed thousands of remote IT workers to assume jobs in software and web development as part of a revenue generation scheme for the North Korean government. These highly skilled workers are most often located in North Korea, China, and Russia, and use tools such as virtual private networks (VPNs) and remote monitoring and management (RMM) tools together with witting accomplices to conceal their locations and identities.

    Historically, North Korea’s fraudulent remote worker scheme has focused on targeting United States (US) companies in the technology, critical manufacturing, and transportation sectors. However, we’ve observed North Korean remote workers evolving to broaden their scope to target various industries globally that offer technology-related roles. Since 2020, the US government and cybersecurity community have identified thousands of North Korean workers infiltrating companies across various industries.

    Organizations can protect themselves from this threat by implementing stricter pre-employment vetting measures and creating policies to block unapproved IT management tools. For example, when evaluating potential employees, employers and recruiters should ensure that the candidates’ social media and professional accounts are unique and verify their contact information and digital footprint. Organizations should also be particularly cautious with staffing company employees, check for consistency in resumes, and use video calls to confirm a worker’s identity.

    Microsoft Threat Intelligence tracks North Korean IT remote worker activity as Jasper Sleet (formerly known as Storm-0287). We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet. To disrupt this activity and protect our customers, we’ve suspended 3,000 known Microsoft consumer accounts (Outlook/Hotmail) created by North Korean IT workers. We have also implemented several detections to alert our customers of this activity through Microsoft Entra ID Protection and Microsoft Defender XDR as noted at the end of this blog. As with any observed nation-state threat actor activity, Microsoft has directly notified targeted or compromised customers, providing them with important information needed to secure their environments. As we continue to observe more attempts by threat actors to leverage AI, not only do we report on them, but we also have principles in place to take action against them.

    This blog provides additional information on the North Korean remote IT worker operations we published previously, including Jasper Sleet’s usual TTPs to secure employment, such as using fraudulent identities and facilitators. We also provide recent observations regarding their use of AI tools. Finally, we share detailed guidance on how to investigate, monitor, and remediate possible North Korean remote IT worker activity, as well as detections and hunting capabilities to surface this threat.

    From North Korea to the world: The remote IT workforce

    Since at least early 2020, Microsoft has tracked a global operation conducted by North Korea in which skilled IT workers apply for remote job opportunities to generate revenue and support state interests. These workers present themselves as foreign (non-North Korean) or domestic-based teleworkers and use a variety of fraudulent means to bypass employment verification controls.

    North Korea’s fraudulent remote worker scheme has since evolved, establishing itself as a well-developed operation that has allowed North Korean remote workers to infiltrate technology-related roles across various industries. In some cases, victim organizations have even reported that remote IT workers were some of their most talented employees. Historically, this operation has focused on applying for IT, software development, and administrator positions in the technology sector. Such positions provide North Korean threat actors access to highly sensitive information to conduct information theft and extortion, among other operations.

    North Korean IT workers are a multifaceted threat because not only do they generate revenue for the North Korean regime, which violates international sanctions, they also use their access to steal sensitive intellectual property, source code, or trade secrets. In some cases, these North Korean workers even extort their employer into paying them in exchange for not publicly disclosing the company’s data.

    Between 2020 and 2022, the US government found that over 300 US companies in multiple industries, including several Fortune 500 companies, had unknowingly employed these workers, indicating the magnitude of this threat. The workers also attempted to gain access to information at two government agencies. Since then, the cybersecurity community has continued to detect thousands of North Korean workers. On January 3, 2025, the Justice Department released an indictment identifying two North Korean nationals and three facilitators responsible for conducting fraudulent work between 2018 and 2024. The indicted individuals generated a revenue of at least US$866,255 from only ten of the at least 64 infiltrated US companies.

    North Korean threat actors are evolving across the threat landscape to incorporate more sophisticated tactics and tools to conduct malicious employment-related activity, including the use of custom and AI-enabled software.

    Tactics and techniques

    The tactics and techniques employed by North Korean remote IT workers involve a sophisticated ecosystem of crafting fake personas, performing remote work, and securing payments. North Korean IT workers apply for remote roles, in various sectors, at organizations across the globe.

    They create, rent, or procure stolen identities that match the geo-location of their target organizations (for example, they would establish a US-based identity to apply for roles at US-based companies), create email accounts and social media profiles, and establish legitimacy through fake portfolios and profiles on developer platforms like GitHub and LinkedIn. Additionally, they leverage AI tools to enhance their operations, including image creation and voice-changing software. Facilitators play a crucial role in validating fraudulent identities and managing logistics, such as forwarding company hardware and creating accounts on freelance job websites. To evade detection, these workers use VPNs, virtual private servers (VPSs), and proxy services as well as RMM tools to connect to a device housed at a facilitator’s laptop farm located in the country of the job.

    Figure 1. The North Korean IT worker ecosystem

    Crafting fake personas and profiles

    The North Korean remote IT worker fraud scheme begins with the procurement of identities for the workers. These identities, which can be stolen or “rented” from witting individuals, include names, national identification numbers, and dates of birth. The workers might also leverage services that generate fraudulent identities, complete with seemingly legitimate documentation, to fabricate their personas. They then create email accounts and social media pages they use to apply for jobs, often indirectly through staffing or contracting companies. They also apply for freelance opportunities through freelancer sites as an additional avenue for revenue generation. Notably, they often use the same names/profiles repeatedly rather than creating unique personas for each successful infiltration.

    Additionally, the North Korean IT workers have used fake profiles on LinkedIn to communicate with recruiters and apply for jobs.

    Figure 2. An example of a North Korean IT worker LinkedIn profile that has since been taken down.

    The workers tailor their fake resumes and profiles to match the requirements for specific remote IT positions, thus increasing their chances of getting selected. Over time, we’ve observed these fake resumes and employee documents noticeably improving in quality, now appearing more polished and lacking grammatical errors facilitated by AI.

    After creating their fake personas, the North Korean IT workers then attempt to establish legitimacy by creating digital footprints for these fake personas. They typically leverage communication, networking, and developer platforms, (for example, GitHub) to showcase their supposed portfolio of previous work samples:

    Figure 3. Example profile used by a North Korean IT worker that has since been taken down.

    Using AI to improve operations

    Microsoft Threat intelligence has observed North Korean remote IT workers leveraging AI to improve the quantity and quality of their operations. For example, in October 2024, we found a public repository containing actual and AI-enhanced images of suspected North Korean IT workers:

    Figure 4. Photos of potential North Korean IT workers

    The repository also contained the resumes and email accounts used by the said workers, along with the following tools and resources they can use to secure employment and to do their work:

    • VPS and VPN accounts, along with specific VPS IP addresses
    • Playbooks on conducting identity theft and creating and bidding jobs on freelancer websites
    • Wallet information and suspected payments made to facilitators
    • LinkedIn, GitHub, Upwork, TeamViewer, Telegram, and Skype accounts
    • Tracking sheet of work performed, and payments received by the IT workers

    Image creation

    Based on our review of the repository mentioned previously, North Korean IT workers appear to conduct identity theft and then use AI tools like Faceswap to move their pictures over to the stolen employment and identity documents. The attackers also use these AI tools to take pictures of the workers and move them to more professional looking settings. The workers then use these AI-generated pictures on one or more resumes or profiles when applying for jobs.

    Figure 5. Use of AI apps to modify photos used for North Korean IT workers’ resumes and profiles
    Figure 6. Examples of resumes for North Korean IT workers. These two resumes use different versions of the same photo.

    Communications

    Microsoft Threat Intelligence has observed that North Korean IT workers are also experimenting with other AI technologies such as voice-changing software. While we haven’t observed threat actors using combined AI voice and video products as a tactic first hand, we do recognize that combining these technologies could allow future threat actor campaigns to trick interviewers into thinking they aren’t communicating with a North Korean IT worker. If successful, this tactic could allow the North Korean IT workers to do interviews directly and no longer rely on facilitators standing in for them on interviews or selling them account access.

    Facilitators for initial access

    North Korean Remote IT workers require assistance from a witting facilitator to help find jobs, pass the employment verification process, and once hired, successfully work remotely. We’ve observed Jasper Sleet advertising job opportunities for facilitator roles under the guise of partnering with a remote job candidate to help secure an IT role in a competitive market:

    Figure 7. Example of a job opportunity for a facilitator role

    The IT workers may have the facilitators assist in creating accounts on remote and freelance job websites. They might also ask the facilitator to perform the following tasks as their relationship builds:

    • Create a bank account for the North Korean IT worker, or lend their (the facilitator’s) own account to the worker
    • Purchase mobile phone numbers or SIM cards

    During the employment verification process, the witting accomplice helps the North Korean IT workers validate the latter’s fraudulent identities using online background check service providers. The documents submitted by the workers include fake or stolen drivers’ licenses, social security cards, passports, and permanent resident identification cards. Workers train using interview scripts, which include a justification for why the employee must work remotely.

    Once hired, the remote workers direct company laptops and hardware to be sent to the address of the accomplice. The accomplice then either runs a laptop farm that provides the laptops with an internet connection at the geo-location of the role or forwards the items internationally. For hardware that remain in the country of the role, the accomplice signs into the computers and installs software that enables the workers to connect remotely. Remote IT workers might also access devices remotely using IP-based KVM devices, like PiKVM or TinyPilot.

    Defense evasion and persistence

    To conceal their physical location as well as maintain persistence and blend into the target organization’s environment, the workers typically use VPNs (particularly Astrill VPN), VPSs, proxy services, and RMM tools. Microsoft Threat Intelligence has observed the persistent use of JumpConnect, TinyPilot, Rust Desk, TeamViewer, AnyViewer, and Anydesk. When an in-person presence or face-to-face meeting is required, for example to confirm banking information or attend a meeting, the workers have been known to pay accomplices to stand in for them. When possible, however, the workers eliminate all face-to-face contact, offering fraudulent excuses for why they are not on camera during video teleconferencing calls or speaking.

    Attribution

    Microsoft Threat Intelligence uses the name Jasper Sleet (formerly known as Storm-0287) to represent activity associated with North Korean’s remote IT worker program. These workers are primarily focused on revenue generation, use remote access tools, and likely fall under a particular leadership structure in North Korea. We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet.

    How Microsoft disrupts North Korean remote IT worker operations with machine learning

    Microsoft has successfully scaled analyst tradecraft to accelerate the identification and disruption of North Korean IT workers in customer environments by developing a custom machine learning solution. This has been achieved by leveraging Microsoft’s existing threat intelligence and weak signals generated by monitoring for many of the red flags listed in this blog, among others. For example, this solution uses impossible time travel risk detections, most commonly between a Western nation and China or Russia. The machine learning workflow uses these features to surface suspect accounts most likely to be North Korean IT workers for assessment by Microsoft Threat Intelligence analysts.

    Once Microsoft Threat Intelligence reviews and confirms that an account is indeed associated with a North Korean IT worker, customers are then notified with a Microsoft Entra ID Protection risk detection warning of a risky sign-in based on Microsoft’s threat intelligence. Microsoft Defender XDR customers also receive the alert Sign-in activity by a suspected North Korean entity in the Microsoft Defender portal.

    Defending against North Korean remote IT worker infiltration

    Defending against the threats from North Korean remote IT workers involves a threefold strategy:

    • Ensuring a proper vetting approach is in place for freelance workers and vendors
    • Monitoring for anomalous user activity
    • Responding to suspected Jasper Sleet signals in close coordination with your insider risk team

    Investigate

    How can you identify a North Korean remote IT worker in the hiring process?

    To protect your organization against a potential North Korean insider threat, it is important for your organization to prioritize a process for verifying employees to identify potential risks. The following can be used to assess potential employees:

    • Confirm the potential employee has a digital footprint and look for signs of authenticity. This includes a real phone number (not VoIP), a residential address, and social media accounts. Ensure the potential employee’s social media/professional accounts are not highly similar to the accounts of other individuals. In addition, check that the contact phone number listed on the potential employee’s account is unique and not also used by other accounts.
    • Scrutinize resumes and background checks for consistency of names, addresses, and dates. Consider contacting references by phone or video-teleconference rather than email only.
    • Exercise greater scrutiny for employees of staffing companies, since this is the easiest avenue for North Korean workers to infiltrate target companies.
    • Search whether a potential employee is employed at multiple companies using the same persona.
    • Ensure the potential employee is seen on camera during multiple video telecommunication sessions. If the potential employee reports video and/or microphone issues that prohibit participation, this should be considered a red flag.
    • During video verification, request individuals to physically hold driver’s licenses, passports, or identity documents up to camera.
    • Keep records, including recordings of video interviews, of all interactions with potential employees.
    • Require notarized proof of identity.

    Monitor

    How can your organization prevent falling victim to the North Korean remote IT worker technique?

    To prevent the risks associated with North Korean insider threats, it’s vital to monitor for activity typically associated with this fraudulent scheme.

    Monitor for identifiable characteristics of North Korean remote workers

    Microsoft has identified the following characteristics of a North Korean remote worker. Note that not all the criteria are necessarily required, and further, a positive identification of a remote worker doesn’t guarantee that the worker is North Korean.

    • The employee lists a Chinese phone number on social media accounts that is used by other accounts.
    • The worker’s work-issued laptop authenticates from an IP address of a known North Korean IT worker laptop farm, or from foreign—most commonly Chinese or Russian—IP addresses even though the worker is supposed to have a different work location.
    • The worker is employed at multiple companies using the same persona. Employees of staffing companies require heightened scrutiny, given this is the easiest way for North Korean workers to infiltrate target companies.
    • Once a laptop is issued to the worker, RMM software is immediately downloaded onto it and used in combination with a VPN.
    • The worker has never been seen on camera during a video telecommunication session or is only seen a few times. The worker may also report video and/or microphone issues that prohibit participation from the start.
    • The worker’s online activity doesn’t align with routine co-worker hours, with limited engagement across approved communication platforms.

    Monitor for activity associated with Jasper Sleet access

    • If RMM tools are used in your environment, enforce security settings where possible, to implement MFA:
      • If an unapproved installation is discovered, reset passwords for accounts used to install the RMM services. If a system-level account was used to install the software, further investigation may be warranted.
    • Monitor for impossible travel—for example, a supposedly US-based employee signing in from China or Russia.
    • Monitor for use of public VPNs such as Astrill. For example, IP addresses associated with VPNs known to be used by Jasper Sleet can be added to Sentinel watchlists. Or, Microsoft Defender for Identity can integrate with your VPN solution to provide more information about user activity, such as extra detection for abnormal VPN connections.
    • Monitor for signals of insider threats in your environment. Microsoft Purview Insider Risk Management can help identify potentially malicious or inadvertent insider risks.
    • Monitor for consistent user activity outside of typical working hours.

    Remediate

    What are the next steps if you positively identify a North Korean remote IT worker employed at your company?

    Because Jasper Sleet activity follows legitimate job offers and authorized access, Microsoft recommends approaching confirmed or suspected Jasper Sleet intrusions with an insider risk approach using your organization’s insider risk response plan or incident response provider like Microsoft Incident Response. Some steps might include:

    • Restrict response efforts to a small, trusted insider risk working group, trained in operational security (OPSEC) to avoid tipping off subjects and potential collaborators.
    • Rapidly evaluate the subject’s proximity to critical assets, such as:
      • Leadership or sensitive teams
      • Direct reports or vendor staff the subject has influence over
      • Suppliers or vendors
      • People/non-people accounts, production/pre-production environments, shared accounts, security groups, third-party accounts, security groups, distribution groups, data clusters, and more
    • Conduct preliminary link analysis to:
      • Detect relationships with potential collaborators, supporters, or other potential aliases operated by the same actor
      • Identify shared indicators (for example, shared IP addresses, behavioral overlap)
      • Avoid premature action that might alert other Jasper Sleet operators
    • Conduct a risk-based prioritization of efforts, informed by:
      • Placement and access to critical assets (not necessarily where you identified them)
      • Stakeholder insight from potentially impacted business units
      • Business impact considerations of containment (which might support additional collection/analysis) or mitigation (for example, eviction)
    • Conduct open-source intelligence (OSINT) collection and analysis to:
      • Determine if the identity associated with the threat actor is associated with a real person. For example, North Korean IT workers have leveraged stolen identities of real US persons to facilitate their fraud. Conduct OSINT on all available personally identifiable information (PII) provided by the actor (name, date of birth, SSN, home of record, phone number, emergency contact, and others) and determine if these items are linked to additional North Korean actors, and/or real persons’ identities.
      • Gather all known external accounts operated by the alias/persona (for example, LinkedIn, GitHub, freelance working sites, bug bounty programs).
      • Perform analysis on account images using open-source tools such as FaceForensics++ to determine prevalence of AI-generated content. Detection opportunities within video and imagery include: 
        • Temporal consistency issues: Rapid movements cause noticeable artifacts in video deepfakes as the tracking system struggles to maintain accurate landmark positioning. 
        • Occlusion handling: When objects pass over the AI-generated content such as the face, deepfake systems tend to fail at properly reconstructing the partially obscured face.
        • Lighting adaptation: Changes in lighting conditions might reveal inconsistencies in the rendering of the face
        • Audio-visual synchronization: Slight delays between lip movements and speech are detectable under careful observation
          • Exaggerated facial expressions. 
          • Duplicative or improperly placed appendages.
          • Pixelation or tearing at edges of face, eyes, ears, and glasses.
    • Engage counterintelligence or insider risk/threat teams to:
      • Understand tradecraft and likely next steps
      • Gain national-level threat context, if applicable
    • Make incremental, risk-based investigative and response decisions with the support of your insider threat working group and your insider threat stakeholder group; one providing tactical feedback and the other providing risk tolerance feedback.
    • Preserve evidence and document findings.
    • Share lessons learned and increase awareness.
    • Educate employees on the risks associated with insider threats and provide regular security training for employees to recognize and respond to threats, including a section on the unique threat posed by North Korean IT workers.

    After an insider risk response to Jasper Sleet, it might be necessary to also conduct a thorough forensic investigation of all systems that the employee had access to for indicators of persistence, such as RMM tools or system/resource modifications.

    For additional resources, refer to CISA’s Insider Threat Mitigation Guide. If you suspect your organization is being targeted by nation-state cyber activity, report it to the appropriate national authority. For US-based organizations, the Federal Bureau of Investigation (FBI) recommends reporting North Korean remote IT worker activity to the Internet Crime Complaint Center (IC3).

    Microsoft Defender XDR detections

    Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, apps to provide integrated protection against attacks like the threat discussed in this blog.

    Customers with provisioned access can also use Microsoft Security Copilot in Microsoft Defender to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.

    Microsoft Defender XDR

    Alerts with the following titles in the security center can indicate threat activity on your network:

    • Sign-in activity by a suspected North Korean entity

    Microsoft Defender for Endpoint

    Alerts with the following titles in the security center can indicate Jasper Sleet RMM activity on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Suspicious usage of remote management software
    • Suspicious connection to remote access software

    Microsoft Defender for Identity

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Atypical travel
    • Suspicious behavior: Impossible travel activity

    Microsoft EntraID Protection

    Microsoft Entra ID Protection risk detections inform Entra ID user risk events and can indicate associated threat activity, including unusual user activity consistent with known patterns identified by Microsoft Threat Intelligence research. Note, however, that these alerts can be also triggered by unrelated threat activity.

    • Microsoft Entra threat intelligence (sign-in): (RiskEventType: investigationsThreatIntelligence)

    Microsoft Defender for Cloud Apps

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Impossible travel activity

    Microsoft Security Copilot

    Security Copilot customers can use the standalone experience to create their own prompts or run the following pre-built promptbooks to automate incident response or investigation tasks related to this threat:

    • Incident investigation
    • Microsoft User analysis
    • Threat actor profile

    Note that some promptbooks require access to plugins for Microsoft products such as Microsoft Defender XDR or Microsoft Sentinel.

    Hunting queries

    Microsoft Defender XDR

    Because organizations might have legitimate and frequent uses for RMM software, we recommend using the Microsoft Defender XDR advanced hunting queries available on GitHub to locate RMM software that hasn’t been endorsed by your organization for further investigation. In some cases, these results might include benign activity from legitimate users. Regardless of use case, all newly installed RMM instances should be scrutinized and investigated.

    If any queries have high fidelity for discovering unsanctioned RMM instances in your environment, and don’t detect benign activity, you can create a custom detection rule from the advanced hunting query in the Microsoft Defender portal. 

    Microsoft Sentinel

    The alert Insider Risk Sensitive Data Access Outside Organizational Geo-locationjoins Azure Information Protection logs (InformationProtectionLogs_CL) with Microsoft Entra ID sign-in logs (SigninLogs) to provide a correlation of sensitive data access by geo-location. Results include:

    • User principal name
    • Label name
    • Activity
    • City
    • State
    • Country/Region
    • Time generated

    The recommended configuration is to include (or exclude) sign-in geo-locations (city, state, country and/or region) for trusted organizational locations. There is an option for configuration of correlations against Microsoft Sentinel watchlists. Accessing sensitive data from a new or unauthorized geo-location warrants further review.

    References

    Acknowledgments

    For more information on North Korean remote IT worker operations, we recommend reviewing DTEX’s in-depth analysis in the report Exposing DPRK’s Cyber Syndicate and IT Workforce.

    Learn more

    Meet the experts behind Microsoft Threat Intelligence, Incident Response, and the Microsoft Security Response Center at our VIP Mixer at Black Hat 2025. Discover how our end-to-end platform can help you strengthen resilience and elevate your security posture.

    For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog. 

    To get notified about new publications and to join discussions on social media, follow us on LinkedIn, X (formerly Twitter), and Bluesky. 

    To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast. 

    MIL OSI Economics

  • MIL-OSI USA: Sen. Budd Votes for the One Big Beautiful Bill Act ToDeliver Historic Tax Cuts for North Carolina Families

    US Senate News:

    Source: United States Senator Ted Budd (R-North Carolina)
    Washington, D.C. — U.S. Senator Ted Budd (R-N.C.) released the following statement after voting in support of President Trump’s One Big Beautiful Bill Act, historic legislation that lowers taxes for families, makes America safer and more secure, and unleashes economic growth for the future:
    “I voted in favor of the One Big Beautiful Bill Act because the people of North Carolina deserve more of their hard-earned wages, a more secure border, a reinvigorated military, responsible spending reforms for government programs, and a thriving economy. My colleagues and I fought successfully to protect North Carolina’s tobacco growers to help them stay competitive with China. I am also grateful that this bill included my PELL Act, which will help Americans earn in-demand credentials for rewarding careers. I hope my colleagues in the House quickly get this bill on President Trump’s desk because Americans cannot afford the largest tax increase in our nation’s history,” said Sen. Budd. 
    Here’s How the One Big Beautiful Bill Act Directly Benefits North Carolina:
    Provides Unprecedented Tax Relief for Families
    This legislation helps Americans keep more money in their pockets by extending key provisions of President Trump’s 2017 Tax Cuts and Jobs Act. Preventing the largest tax increase in American history will save the average North Carolinian $2,474 in 2026.
    Working families will receive significant savings with the increase and permanence of the child tax credit, expanded tax credits for paid leave, enhanced 529 savings accounts, and additional childcare access.
    This legislation lowers taxes for seniors relying on Social Security.
    Gives Workers the Tools They Need to Advance Their Careers
    Sen. Budd fought to have his PELL Act included in this legislation, a provision that expands Pell Grant eligibility for high-quality, short-term workforce programs. This would benefit individuals seeking to advance their careers without long-term debt while also providing American businesses with a broader, better-prepared talent pool ready to meet the demands of a rapidly evolving economy.
    Protects North Carolina Agriculture
    Sen. Budd successfully defended tobacco’s eligibility to receive the “duty drawback,” allowing tobacco manufacturers to receive reimbursement for the tariffs they pay on materials used to produce tobacco products that they ship to international markets. This will protect North Carolina growers and prevent the tobacco market from being flooded with cheaper, lower-quality products from China and Brazil.
    This legislation provides serious tax relief for North Carolina farmers by raising the death tax exemption, ensuring family farms can be passed down to future generations, rather than being broken up and sold.
    Unlocks Economic Growth & American Manufacturing
    This legislation will create a renaissance in American manufacturing by delivering full expensing for companies that build new factories and invest in equipment and machinery. This will help create new, good-paying jobs.
    By enhancing the small business deduction and making it permanent, small businesses will be able to hire more workers.
    Increasing deductions for small businesses’ equipment and property will quickly help businesses grow.
    Reduces Government Spending to Preserve & Protect Government Programs
    This legislation contains the first structural reforms to address waste, fraud, and abuse in key government programs like SNAP and Medicaid in over three decades. Slowing the rate of exponential cost increases will result in significant deficit savings and will preserve and protect these programs for future generations.
    Invests in America’s National Defense
    Sen. Budd helped secure funding to boost manufacturing capacity for the next generation of the F-15, the F-15EX, which will sustain the training mission at Seymour Johnson far into the future. 
    This legislation also includes significant funding to enhance America’s air superiority by preventing the retirement of the F-15E aircraft flying out of Seymour Johnson Air Force Base. 
    America’s troops deserve a pay raise. This legislation increases pay and allowances while making improvements to housing, healthcare, childcare, and education.
    This legislation makes generational investments in our military readiness that will protect the American homeland and deter our adversaries by boosting America’s missile defense by building the “Golden Dome.”
    Sen. Budd worked to secure investments to improve housing at Fort Bragg and Seymour Johnson and funds for restoration and modernization at Camp Lejeune.
    This legislation creates new production lines to scale innovative, cost-effective munitions, so we are no longer shooting $4M missiles at $50,000 drones.
    This legislation makes the largest ever investment in the Coast Guard’s history, which will purchase more than 40 new helicopters and six new C-130J aircraft, which will be serviced at the Aviation Technical Training Center in Elizabeth City. The legislation also funds 17 new icebreakers to protect American interests and 21 new cutters to combat drug runners and human traffickers.
    Keeps America’s Border Secure
    While President Trump’s policies have resulted in a dramatic drop-off of illegal immigration, this legislation also boosts America’s border security by surging funding for 3,000 new Border Patrol agents and 10,000 new ICE agents. The One Big Beautiful Bill also increases funding to finish President Trump’s border wall.
    Ushers in Next-Generation Technologies
    This legislation includes funding for the transformational air traffic control modernization project underway at the FAA. This will quickly update aging and failing technologies to keep Americans safe in the sky.
    This legislation makes a historic amount of spectrum available for commercial use, which will create new jobs and unleash the next generation of wireless technology. This will ensure America remains the premier destination for innovation and help unleash a new area of advanced manufacturing. This will also make the internet faster & more dependable across the country through commercial success stories like 5G, 6G, wi-fi, and private networks using CBRS.

    MIL OSI USA News

  • MIL-OSI United Kingdom: FREE Energy upgrades offered to Plymouth homes

    Source: City of Plymouth

    It may be summer, but some Plymouth residents will be able to apply for free energy installations that will make their homes cosier without costing a penny or the earth.

    People on a low income, those on certain benefits or live in a certain postcode could be eligible for the grant under the Warm Homes Local Grant.

    The grant is designed to give more people who rent or own homes the chance to have more energy efficient measures installed. This could include:

    • wall, loft and underfloor insulation
    • air source heat pumps
    • smart controls
    • solar panels.

    Plymouth City Council has been allocated £2.5 million and is working with Plymouth Energy Community (PEC) to deliver the improvements. Since starting in 2013, PEC has helped over 37,000 households with energy advice or energy efficiency measures.

    Councillor Chris Penberthy, Cabinet Member for Housing, said: “Thousands of private homes need to have more energy efficient measures but the upfront cost of installing them is simply beyond the reach of many people.

    “This is an incredible opportunity for people to get free measures installed, save them thousands of pounds for years to come – and help the environment at the same time.”

    A decision has been signed to allocate £2.5m from the Warm Homes Local Grant into the capital programme. This enables the Council to fully fund retrofit measures for eligible residents. This funding is expected to pay for over 200 homes to have new measures installed.

    Justin Bear, Retrofit Lead at Plymouth Energy Community, added: “Helping people improve the comfort and energy efficiency of their homes is core to what PEC do so we’re delighted to partner with the Council on this scheme.”

    “Retrofitting our homes improves people’s health, and also ensures people are more secure in being able to pay their winter bills.”

    To be eligible, your home must:

    • be privately owned (either by you or your landlord)
    • have an Energy Performance Certificate (EPC) of D, E, F or G – if you do not know your home’s EPC, you can find it out when you apply
    • Your household income must usually be £36,000 a year or less. If you earn more, you might still be eligible if you live in a certain postcode area or
    • someone in your household is getting certain benefits.

    People can Apply for the Warm Homes: Local Grant to improve a home – GOV.UK to see if they are eligible. Their home will be surveyed to assess the installation of the most appropriate measures. If you have a landlord, they may need to pay for some of the improvements.

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: ARU students across region to celebrate graduation

    Source: Anglia Ruskin University

    An ARU graduation ceremony at Chelmsford Cathedral

    July will see approximately 6,000 Anglia Ruskin University (ARU) students across the East of England cross the stage to graduate, ready to take the next step in their careers.

    Ceremonies begin at the Cambridge Corn Exchange from Monday, July 7 until Wednesday, July 9. In addition to students formally receiving their degrees, an honorary doctorate will be bestowed on Nadia Edwards-Dashti, entrepreneur, author, equity and inclusion thought-leader, and co-founder of London-based Harrington Starr, a global leader in FinTech recruitment.

    Peterborough Cathedral will host the first ever set of graduations for ARU Peterborough students at 2pm on Friday, 11 July.

    On Monday, 14 July, graduation ceremonies take place in Essex, with 21 ceremonies to be held at Chelmsford Cathedral across the week.

    On Thursday, 17 July, ARU will bestow the award of Honorary Doctor of Business Administration on alumnus Vice Admiral Andrew Kyte, the Royal Navy’s Chief of Defence Logistics and Support.

    Many of the 6,000 students due to attend graduation ceremonies this month will go on to take up vital roles in public service, including careers as doctors and police officers.

    “Graduation is always a fantastic occasion, not only for our students and their families, but also our staff who have worked with them for several years to help them to earn their degree.

    “My warmest congratulations to all our graduates, we are extremely proud of them and they will always be part of our ARU community.”

    Professor Roderick Watkins, Vice Chancellor of Anglia Ruskin University (ARU)

    MIL OSI United Kingdom

  • MIL-OSI USA: The Justice Department Files Lawsuit Against Sanctuary City Policies In Los Angeles, California

    Source: US State of North Dakota

    Today, the Department of Justice filed a lawsuit against the City of Los Angeles, California, Los Angeles Mayor Karen Bass, and the Los Angeles City Council over policies that Los Angeles enacted shortly after President Donald J. Trump’s reelection to interfere with the federal government’s enforcement of its immigration laws.

    Not only are Los Angeles’s “sanctuary city” policies illegal under federal law, but, as alleged in the complaint, Los Angeles’s refusal to cooperate with federal immigration authorities contributed to the recent lawlessness, rioting, looting, and vandalism that was so severe that it required the federal government to deploy the California National Guard and the United States Marines to quell the chaos.

    “Sanctuary policies were the driving cause of the violence, chaos, and attacks on law enforcement that Americans recently witnessed in Los Angeles,” said Attorney General Pamela Bondi. “Jurisdictions like Los Angeles that flout federal law by prioritizing illegal aliens over American citizens are undermining law enforcement at every level – it ends under President Trump.”

    “Today’s lawsuit holds the City of Los Angeles accountable for deliberately obstructing the enforcement of federal immigration law,” said U.S. Attorney Bill Essayli for the Central District of California. “The United States Constitution’s Supremacy Clause prohibits the City from picking and choosing which federal laws will be enforced and which will not. By assisting removable aliens in evading federal law enforcement, the City’s unlawful and discriminatory ordinance has contributed to a lawless and unsafe environment that this lawsuit will help end.”

    On her first day in office, Attorney General Bondi instructed the Department’s Civil Division to identify state and local laws, policies, and practices that facilitate violations of federal immigration laws or impede lawful federal immigration operations, and, where appropriate, to take legal action to challenge such laws, policies, and practices. Today’s lawsuit is the latest in a series of lawsuits brought by the Civil Division targeting illegal sanctuary city policies across the country, including in New York and New Jersey.

    MIL OSI USA News

  • MIL-OSI USA: Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes

    Source: US State of North Dakota

    Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers

    The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.

    According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.

    As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.

    “These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”

    “North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”

    “North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”

    Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts

    Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme. 

    “The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”

    According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).

    Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.

    IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files  containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.

    Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.

    Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.

    The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.

    Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.

    Kim Kwang Jin et al. Indictment – Northern District of Georgia

    Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.

    “The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”

    According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

    After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

    To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.

    The FBI Atlanta Field Office is investigating the case.

    Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.

    21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District

    Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.

    Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.

    ***

    The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.

    As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.

    Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.

    The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.

    The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI USA: Department of Justice Announces the Opening of Nominations to Honor the Honorable: The Attorney General’s Award for Distinguished Service in Policing

    Source: US State of North Dakota

    WASHINGTON – United States Attorney General Pamela Bondi announced today that the Department of Justice is now accepting nominations to Honor the Honorable: The Attorney General’s Award for Distinguished Service in Policing. This award represents the Department of Justice’s reaffirmed commitment to uplifting the valor and exceptional contributions to policing of our great nation’s law enforcement personnel. It is the mission of the Department of Justice to recognize individuals in law enforcement who exhibit remarkable courage, innovation, and outstanding performance in making America safe again.

    The Attorney General’s Honor the Honorable Award recognizes individual or teams of rank-and-file officers from state, local, Tribal or territorial law enforcement agencies for exceptional efforts in policing. The awarded officers, deputies and troopers will have demonstrated exceptional service in one of three areas: criminal investigations, field operations or exemplary community involvement. Within each category, an award will be given to law enforcement agencies serving small, medium and large jurisdictions. Those agency sizes are defined as:

    • Small: agencies serving populations of fewer than 50,000;
    • Medium: agencies serving populations of 50,000 to 250,000;
    • Large: agencies serving populations of more than 250,000.

    By acknowledging and rewarding these efforts, the Department strives to advance and reaffirm its dedication to policing and to promote proactive law enforcement methods that support public safety within our nation’s communities. Through this Award, the Attorney General recognizes that the nation’s law enforcement agencies, officers, deputies and troopers continue to work tirelessly to make American communities safe places to live and work again.

    The deadline for nominations is July 14, 2025, at 8:00 p.m. EDT. More information and the application for nominees can be found at: https://www.justice.gov/ag/policing-award

    MIL OSI USA News

  • MIL-OSI Australia: Snake in enclosure found on Bundaberg footpath

    Source: Tasmania Police

    Issued: 1 Jul 2025

    Wildlife rangers are asking for public assistance to find the owner of a snake and enclosure that was found on a footpath in the Bundaberg suburb of Avenell Heights.

    A man walking his dog made the unusual discovery and took snake and enclosure home before calling a local snake catcher.

    After retrieving the snake and the enclosure, the snake catcher handed it in to the Department of the Environment, Tourism, Science and Innovation.

    Senior Wildlife Ranger Amanda Yates said the snake is an albino Darwin carpet python, and it was most likely captive-bred and raised.

    The snake, an albino Darwin carpet python, was found in an enclosure on the footpath.

    “We are trying to determine why the snake and the enclosure were on the footpath,” Ms Yates said.

    “These snakes are not native to Queensland, but they are popular among the reptile trade due to their striking features.

    “The snake appears healthy and we’re appealing for public information so we can find the owner.

    “We hoping to return the snake to its owner, and anyone with information is encouraged to contact the

    department.”

    Anyone with information can call DETSI on 1300 130 372.

    In Queensland, people need a permit to keep native animals as pets. Information about wildlife permits can be found here.

    Media contact:                 DETSI Media Unit on (07) 3339 5831 or media@detsi.qld.gov.au

    MIL OSI News

  • MIL-OSI USA: Durable Medical Equipment Owner Sentenced to 12 Years for $61 Million Medicare Fraud Scheme

    Source: US State of North Dakota

    A Florida man was sentenced today to 12 years in prison and three years of supervised release for conspiring to defraud Medicare with false reimbursement claims for durable medical equipment (DME). He was also ordered to pay $21,195,540.18 in restitution and forfeiture in the amount of $2,514,040.

    According to court documents, Peter Roussonicolos, 64, of Port Saint Lucie, Florida, owned and operated five DME suppliers as a silent partner. Roussonicolos hid his involvement in the companies from Medicare because he had one or more felony convictions, making him ineligible to enroll with the government program. To further conceal his involvement, he recruited and paid co-conspirators to serve as nominee owners of the DME suppliers and caused others to falsify Medicare enrollment forms, bank records, and other documents to conceal the true ownership and control of the DME suppliers. He also knew that a co-conspirator paid kickbacks and bribes to patient recruiters in exchange for beneficiary referrals. As part of the scheme, the DME companies submitted approximately $61.5 million in false and fraudulent claims to Medicare for medically unnecessary DME that was ineligible for reimbursement and were paid approximately $26.7 million of these claims.

    “Through lies and deceit, the defendant and his co-conspirators orchestrated a $61 million fraud on Medicare,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The defendant’s fraud drained critical government resources that could have been used to help vulnerable Americans. Today’s sentencing demonstrates the Department’s steadfast commitment to protecting taxpayer dollars and ensuring accountability for those who seek to defraud our health care programs.”

    “Today’s sentence underscores HHS-OIG’s firm commitment to thoroughly investigating individuals who engage in illegal kickback schemes to prescribe medically unnecessary durable medical equipment for their own personal financial gain,” said Deputy Inspector General for Investigations Christian J. Schrank with the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG). “We remain steadfast in our mission to protect the integrity of Medicare and other federal healthcare programs as well as the people served by those programs.”

    “This defendant and his co-conspirators orchestrated an elaborate scheme to steal millions from Medicare through kickbacks and sham billing,” said Assistant Director Jose A. Perez of the FBI Criminal Investigative Division. “Today’s sentencing demonstrates that those who exploit our healthcare system for personal gain will be held accountable. The FBI is committed to working with our partners to protect taxpayer dollars and ensure the integrity of healthcare programs.”

    In November 2024, Roussonicolos pleaded guilty to conspiracy to commit health care fraud and wire fraud.

    The FBI and HHS-OIG investigated the case.

    Trial Attorney Jennifer Burns and Assistant Chiefs Jamie de Boer and Emily Gurskis of the Criminal Division’s Fraud Section prosecuted the case. Trial Attorneys Joanna Bowman and Lindita Ciko Torza of the Special Matters Unit assisted in the prosecution.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of 9 strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with the Office of the Inspector General for the Department of Health and Human Services, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www. justice. gov/criminal-fraud/health-care-fraud-unit.

    MIL OSI USA News

  • MIL-OSI Australia: Mary River crocodile update

    Source: Tasmania Police

    Issued: 1 Jul 2025

    Wildlife rangers have humanely euthanised a three-metre estuarine (saltwater) crocodile on the banks of the Mary River at Dundathu, near Maryborough in the Wide Bay region due to the ongoing public safety risk.

    The crocodile was reported to Department of the Environment, Tourism, Science and Innovation by a member of the public on 24 June 2025.

    The department thanks the person for submitting the crocodile sighting report.

    Crocodile sightings can be reported by using the QWildlife app, completing an online crocodile sighting report on the DETSI website, or by calling 1300 130 372. The department investigates every crocodile sighting report received.

    MIL OSI News

  • MIL-OSI USA: Canadian Man Arrested and Detained for Role in Deadly Alien Smuggling Conspiracy at the U.S.’s Northern Border

    Source: US State of North Dakota

    Note: View the indictment here and detention letter here.

    WASHINGTON — A dual Canadian American citizen was arrested on Sunday, June 15, for his role in a deadly human smuggling conspiracy that left a family of four, including two children under the age of three, dead in the St. Lawrence River. Oakes was arrested as he attempted to enter the United States via the Massena, New York, Port of Entry.

    Timothy Oakes, 34, from the Akwesasne Mohawk Indian Reservation (AMIR), Canada, was previously arraigned on numerous human smuggling offenses in the Northern District of New York District Court and had his detention hearing earlier today and will remain detained. Oakes was indicted on April 9 for conspiring with others to engage in alien smuggling, four counts of alien smuggling for profit, and four counts of alien smuggling resulting in death. United States based co-conspirators Dakota Montour, 31, and Kawisiiostha Celecia Sharrow, 43, both of Akwesasne-Mohawk, New York, and Janet Terrance, 45, of Hogansburg, New York, entered guilty pleas on Jan. 23, Oct. 8, 2024, and March 6, respectively.

    “As alleged, Oakes and his co-conspirators profited from a human smuggling operation with a singular, cold-hearted aim: making money by bringing illegal aliens into the United States, regardless of the danger to human life involved,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “Their greed resulted in the deaths of a mother, a father, and two small children, as well as one of the defendants’ own brothers. The Criminal Division will continue to disrupt and dismantle these organizations and bring justice to smugglers whose actions result in senseless deaths.”

    “This case shows the terrible perils of illegally crossing the border,” said U.S. Attorney John A. Sarcone III for the Northern District of New York. “Four family members died because a smuggling network put them in harm’s way. My office is proud to partner with Joint Task Force Alpha to continue to combat dangerous human smuggling and trafficking organizations that operate on our northern border.”

    “Oakes’ arrest comes as part of our nearly two-year long investigation into a transnational criminal organization responsible for the large-scale smuggling of aliens from Canada into the United States,” said U.S. Immigration and Customs Enforcement Homeland Security Investigations (ICE HSI) Buffalo Special Agent in Charge Erin Keegan. “ICE HSI leverages its full range of authorities to combat and dismantle the heinous networks of greedy criminals who illicitly sell dangerous, sometimes fatal, passage through our nation’s northern border. We are extremely grateful for a multitude of law enforcement agency partners on the Border Enforcement Security Taskforce who join us in this fight to bring smugglers to justice.”

    “Two toddler aged children and their parents were the tragic victims of an alien smuggling attempt gone horribly wrong,” said Chief Patrol Agent Robert Garcia of the U.S. Border Patrol’s Swanton Sector. “Their deaths were a direct result of callous smugglers who exploited the vulnerable. Due to unrelenting perseverance and investigative efforts by multiple law enforcement agencies, those responsible will be held accountable. Our pursuit of justice persists until justice is served.”

    According to court documents, Oakes was a key facilitator in a human smuggling organization (HSO) that smuggled aliens from Canada into northern New York. Oakes, working with the HSO, routinely smuggled aliens into the United States by piloting boats across the St. Lawrence River. Additionally, Oakes used his home as a staging area for aliens before the HSO smuggled them into the United States. Oakes earned approximately $1,000 for every alien whom he smuggled across the St. Lawrence River into the United States.

    In March 2023, Oakes housed a Romanian family of four, together with other aliens, for about 24 hours. He then transported the family and a boat to a public boat launch. His brother, Casey Oakes, attempted to use the boat to smuggle the Romanian family into the United States, but the boat capsized, killing all four members of the family, as well as Casey Oakes.    

    Terrance, Montour, and Sharrow admitted in their plea agreements that in late March 2023, they were employed to illegally transport a Romanian family of four — a mother, father, one-year-old boy, and two-year-old girl — from Canada into New York. Specifically, Montour admitted that he was aware of the dangerous weather conditions on the day of the tragedy — high winds, freezing temperatures, and limited visibility — yet another co-conspirator still loaded the family of four into the small boat to attempt to cross the St. Lawrence River.

    HSI Massena engaged in an extensive years-long investigation of the case, with assistance from the U.S. Border Patrol, U.S. Customs and Border Protection (CBP), HSI’s Human Smuggling Unit in Washington, D.C., CBP’s National Targeting Center International Interdiction Task Force, New York State Police, Canada Border Services Agency, Akwesasne Mohawk Police Service, St. Regis Mohawk Tribal Police Department, Ontario Provincial Police, Sûreté du Québec, St. Lawrence County Sheriff’s Department, Royal Canadian Mounted Police, and the Cornwall Police Service. The Justice Department’s Office of International Affairs provided significant support with foreign legal assistance requests.

    The defendant’s vehicle with light blue boat in tow on March 29, 2023, at 9:29 p.m., consistent with the boat found in the river during recovery efforts.

    The investigation is a result of the coordinated efforts of Joint Task Force Alpha (JTFA). JTFA, a partnership with the Department of Homeland Security (DHS), has been elevated and expanded by the Attorney General with a mandate to target cartels and other transnational criminal organizations and eliminate human smuggling and trafficking networks operating within the Americas that impact public safety and the security of our borders. JTFA currently comprises detailees from U.S. Attorneys’ Offices along the border, including the Northern District of New York. Dedicated support is provided by numerous components of the Justice Department’s Criminal Division, led by the Human Rights and Special Prosecutions Section (HRSP) and supported by the Money Laundering and Asset Recovery Section, the Office of Enforcement Operations and the Office of International Affairs, among others. JTFA also relies on substantial law enforcement investment from DHS, FBI, and the Drug Enforcement Administration, and other partners. To date, JTFA’s work has resulted in more than 380 domestic and international arrests of leaders, organizers, and significant facilitators of alien smuggling; more than 340 U.S. convictions; more than 290 significant jail sentences imposed; and forfeitures of substantial assets.

    The investigation is being conducted under the Extraterritorial Criminal Travel Strike Force (ECT) program, a joint partnership between the Justice Department’s Criminal Division and HSI. The ECT program focuses on human smuggling networks that may present particular national security or public safety risks, or present grave humanitarian concerns. ECT has dedicated investigative, intelligence and prosecutorial resources. ECT coordinates and receives assistance from other U.S. government agencies and foreign law enforcement authorities.

    Trial Attorney Jenna E. Reed of the Criminal Division’s HRSP and Assistant U.S. Attorney Jeffrey Stitt for the Northern District of New York are prosecuting the case.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces and Project Safe Neighborhoods.

    MIL OSI USA News

  • MIL-OSI USA: Ten Members and Associates of Violent Car-Theft Ring Indicted on Racketeering, Carjacking, Robbery, and Firearm Charges

    Source: US State of California

    A superseding indictment was unsealed today charging Montez Moore, 20, Duane Benson, 20, Aniya Sheperd, 20, Brandon Irons, 19, Allen Brown, 23, Markaveon Jackson, 19, Raynell Moore, 22, Lavatrice McCully-Collins, 24, Peontay Roddy, 21, and Noah Hornburg, 23 — all of St. Louis, Missouri — with crimes including racketeering conspiracy, carjacking, robbery, and firearm charges related to their participation in “the Strikers,” a violent, interstate stolen car ring.

    According to court documents, between September 2023 and March 2024, the Strikers engaged in car dealership burglaries, illegal interstate vehicle sales and thefts, shootings, carjacking, robbery, and other criminal acts throughout Missouri and Illinois.

    “As alleged, the Strikers enterprise stole approximately 50 vehicles and inflicted nearly $3 million in losses while carrying out a violent crime spree across Missouri and Illinois,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “Their reckless actions endangered communities and dealt a serious blow to local businesses. This kind of brazen, lawless conduct will not be tolerated, and the Justice Department is committed to working with our federal, state, and local partners to protect the public and hold those responsible fully accountable.”

    “Thanks to the Justice Department’s Violent Crime Initiative, we were able to expand an existing indictment to hold more members of the Strikers responsible for a litany of violent crimes,” said Acting U.S. Attorney Matthew T. Drake for the Eastern District of Missouri. “As we said when we announced St. Louis’ inclusion in the VCI last year, we are targeting and dismantling the criminal organizations that are disproportionately driving violent crime in St. Louis.”

    “This was a violent, organized crime operation that spanned across state lines, left a trail of stolen vehicles and cost millions of dollars in losses,” said Assistant Director Jose A. Perez of the FBI Criminal Investigative Division. “This case demonstrates the power of the RICO statute to dismantle interstate criminal enterprises and reflects the FBI’s unwavering commitment to pursuing those who use violence and intimidation to profit from crime.”

    In a single burglary, defendants and others burglarized a dealership in Cape Girardeau, Missouri and stole seven high-end vehicles worth approximately $855,000.

    To hide their identities during the burglaries, the defendants would wear gloves, dark clothing, and masks. In one incident, defendants Hornburg, Moore, and Irons led police on a high-speed chase, driving on a public street reaching speeds over 110 mph. In another incident, after police seized one of the stolen cars, defendants Shepard, Benson, and others broke into the police impound lot and stole the car back.     

    After stealing the vehicles, the defendants allegedly concealed their stolen nature or location by attaching stolen out-of-state dealer plates and covering or removing vehicle identification numbers. The stolen vehicles would then be used in other crimes or sold through social media advertising. The Strikers would often advertise a sales price at such a discount that prospective buyers should have suspected the vehicles were stolen. In one Instagram posting, defendants offered for sale a 2019 Infiniti q70 for $3000, a 2016 Mercedes Benz GLE 400 for $1500, and a 2014 BMW 528i for $2500.

    In one alleged carjacking and robbery, defendants Benson and Moore pulled up to a BP gas station in a stolen blue 2017 BMW 330i that had been taken from a dealership in Springfield, Illinois. They briefly waited for a lottery machine technician to walk out of the store and as captured on store surveillance, ambushed him at gunpoint, robbed him, and highjacked his white Silverado pickup.

    A screenshot showing a January 2024 robbery and carjacking in Cool Valley, Missouri

    If convicted, each defendant faces up to 20 years in prison for the racketeering conspiracy. Defendants Moore and Benson face up to an additional 30 years in prison if convicted of carjacking, robbery and use of a firearm in connection thereof. Defendant Aniya Shephard faces up to an additional 10 years in prison if convicted of possessing a machinegun.

    The Federal Bureau of Investigation and the St. Louis County Police Department are investigating the case.

    Trial Attorney Jared A. Hernandez of the Criminal Division’s Violent Crime and Racketeering Section and Assistant U.S. Attorney Nino Przulj for the Eastern District of Missouri are prosecuting the case.

    This case is part of the Criminal Division’s Violent Crime Initiative in St. Louis conducted in partnership with the U.S. Attorney’s Office in the Eastern District of Missouri and local, state, and federal law enforcement. The joint effort addresses violent crime by employing, where appropriate, federal laws to prosecute gang members and their associates in St. Louis.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News