Category: Artificial Intelligence

  • MIL-OSI: $HAREHOLDER ALERT: Class Action Attorney Juan Monteverde Investigates the Merger of SpartanNash Company (NASDAQ: SPTN)

    Source: GlobeNewswire (MIL-OSI)

    NEW YORK, July 01, 2025 (GLOBE NEWSWIRE) — Class Action Attorney Juan Monteverde with Monteverde & Associates PC (the “M&A Class Action Firm”), has recovered millions of dollars for shareholders and is recognized as a Top 50 Firm in the 2024 ISS Securities Class Action Services Report. The firm is headquartered at the Empire State Building in New York City and is investigating SpartanNash Company (NASDAQ: SPTN) related to its sale to C&S Wholesale Grocers for $26.90 per share in cash without interest to SpartanNash shareholders. Is it a fair deal?

    Click here for more info https://monteverdelaw.com/case/spartannash-company/. It is free and there is no cost or obligation to you.

    NOT ALL LAW FIRMS ARE EQUAL. Before you hire a law firm, you should talk to a lawyer and ask:

    1. Do you file class actions and go to Court?
    2. When was the last time you recovered money for shareholders?
    3. What cases did you recover money in and how much?

    About Monteverde & Associates PC

    Our firm litigates and has recovered money for shareholders…and we do it from our offices in the Empire State Building. We are a national class action securities firm with a successful track record in trial and appellate courts, including the U.S. Supreme Court. 

    No one is above the law. If you own common stock in the above listed company and have concerns or wish to obtain additional information free of charge, please visit our website or contact Juan Monteverde, Esq. either via e-mail at jmonteverde@monteverdelaw.com or by telephone at (212) 971-1341.

    Contact:
    Juan Monteverde, Esq.
    MONTEVERDE & ASSOCIATES PC
    The Empire State Building
    350 Fifth Ave. Suite 4740
    New York, NY 10118
    United States of America
    jmonteverde@monteverdelaw.com
    Tel: (212) 971-1341

    Attorney Advertising. (C) 2025 Monteverde & Associates PC. The law firm responsible for this advertisement is Monteverde & Associates PC (www.monteverdelaw.com).  Prior results do not guarantee a similar outcome with respect to any future matter.

    The MIL Network

  • MIL-OSI Europe: Written question – Education on legal awareness and protecting the land in the cross-border Alpine environment – E-002506/2025

    Source: European Parliament

    Question for written answer  E-002506/2025
    to the Commission
    Rule 144
    Giuseppe Antoci (The Left)

    The municipality of Borgo San Dalmazzo (Cuneo), located in a mountainous area near the French border and affected by extreme weather events like Storm Alex, has launched an initiative to create the ‘Cittadella a protezione del territorio delle Alpi Marittime’ (‘Citadel for the protection of the land in the Maritime Alps’). The aim is to host facilities for civil protection teams and the AIB volunteer corps[1].

    At the same time, the municipality plans to run educational projects to promote legal awareness and active citizenship, aimed particularly at young people, through interinstitutional partnerships, including at cross-border level.

    In the light of the above, can the Commission please answer the following:

    • 1.Are there any EU programmes and/or structural funds that can support local initiatives to promote legal awareness and active citizenship in mountain communities?
    • 2.Is there any funding for integrated projects for preventing hydrogeological instability, managing natural risks and enhancing natural capital in cross-border areas such as the Maritime Alps?

    Submitted: 23.6.2025

    • [1] Corpo Volontari Antincendi Boschivi (‘Forest Fire Volunteer Corps’).
    Last updated: 1 July 2025

    MIL OSI Europe News

  • MIL-OSI Security: Team of North Korean Remote IT Workers Indicted in Theft Scheme

    Source: US FBI

    FBI Atlanta Warns Public to Increase Hiring Scrutiny

    FBI Atlanta is warning the public about the threat of hiring Remote IT workers who use false identifications to conceal their true North Korean identities.

    Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Koreans, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal from two companies virtual currency, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants concealed their North Korean identities from their employers by providing the employers with false identification documents that contained stolen and fake identity information.

    In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

    After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

    To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds, using the virtual currency mixer Tornado Cash, and then transferred the funds to virtual currency exchange accounts controlled by Kang Tae Bok and Chang Nam Il but held in the names of aliases. These accounts were opened using fraudulent Malaysian identification documents.

    According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents, along with other individuals, and worked together as a co-located team.

    Neither of the victim companies in this investigation would have hired the individuals had they known they were North Korean citizens. FBI Atlanta is warning the public about the threat of North Korean citizens who often apply for Remote IT roles as blockchain developers. These individuals often use multiple fake names, identity cards, and social media accounts to gain employment at numerous companies. Companies looking to hire Remote IT workers, especially for blockchain development, are encouraged to apply additional layers of scrutiny to their interview and hiring processes.

    Recommendations for Strengthening Remote-Hiring Processes

    • Implement identity-verification processes during interviewing, onboarding, and throughout the employment of any remote worker. Cross-check HR systems for other applicants with the same resume content and/or contact information. The FBI has observed in other instances that North Korean IT workers use artificial intelligence and face-swapping technology during video job interviews to obfuscate their true identities.
    • Educate HR staff, hiring managers, and development teams regarding the North Korean IT worker threat, specifically focusing on changes in address or payment platforms during the onboarding process.
    • Review each applicant’s communication accounts as North Korean IT workers have reused phone numbers (particularly voice-over-IP numbers) and email addresses on multiple resumes purportedly belonging to different applicants.
    • Verify third-party staffing firms conduct robust hiring practices and routinely audit those practices.
    • Use “soft” interview questions to ask applicants for specific details about their location or educational background. North Korean IT workers often claim to have attended non-US educational institutions.
    • Check applicant resumes for typos and unusual terminology.
    • Complete as much of the hiring and onboarding process as possible in person.

    Reporting: If you suspect you have been approached or victimized by a North Korean IT worker, the FBI recommends taking the following actions:

    • Report the suspicious activity to the FBI’s Internet Crime Complaint Center (IC3) at www.IC3.gov as quickly as possible.
    • Evaluate network activity from the suspected employee and their assigned device(s), and use internal intrusion-detection software to capture activity on the suspected device(s).

    Reference

    In 2022 and 2023, the United States, along with foreign partners, issued public advisories regarding how North Korean IT workers operate and provided red-flag indicators and due diligence measures for businesses to avoid hiring North Korean freelance developers. In May 2024, the FBI provided further guidance regarding North Korean IT workers and their use of witting and unwitting US-based individuals.

    MIL Security OSI

  • MIL-OSI: Industry giant SunnyMining redefines cloud mining: making crypto mining as easy as using an app

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, July 01, 2025 (GLOBE NEWSWIRE) — When it comes to “mining”, many people still think that they must buy mining machines, understand technology, and keep an eye on the market. But SunnyMining is subverting this traditional perception: “You can easily earn BTC and XRP every day without buying mining machines or understanding blockchain.”

    As a technology leader in the field of cloud mining, SunnyMining uses AI computing power scheduling, green energy data centers and global node deployment to make mining as convenient as using an app. From registration, contract selection to daily settlement, everyone can easily participate.

    Why is SunnyMining “simpler”?

    No equipment, easy to get started: Register to receive $15 free computing power and start mining mainstream currencies such as BTC, LTC, DOGE, etc.

    Automatic system operation: No manual intervention is required, the platform automatically adjusts the computing power according to market dynamics to maximize the efficiency of revenue.

    Multi-terminal support, mining at any time: Supports web, mobile browser and official App operations, whether you are in front of the computer, on the phone or on the road, mining can be easily carried out

    Daily settlement, transparent arrival: All revenue systems are settled daily, progress can be checked, and operations can be controlled.

    Multi-language support, serving the world: SunnyMining currently covers 195 countries, supports multi-language interfaces and 24-hour customer service response.

    A new era of mining: from tech game to mass portal

    SunnyMining believes that mining should not be a threshold, but a “digital income channel” that everyone can access – as natural as using daily applications.

    Relying on intelligent scheduling systems, fully managed cloud nodes and green energy infrastructure, the platform has covered 195 countries around the world, allowing users to start mining without equipment configuration or technical background. They only need to register to start mining, the system runs automatically, and the income is credited daily.

    Free contracts are not a “gimmick”, but a practical starting point

    In the field of mining, “free” is often questioned as a marketing trick, but the $15 registration computing power reward provided by SunnyMining is truly usable, visible, and profitable.

    After registration, users can try out mainstream currencies such as BTC, DOGE, and LTC without any investment, and daily income will be automatically settled in the account. The platform also provides a daily sign-in reward mechanism to continuously encourage novice experience.

    It’s actually very simple to start mining. It only takes three steps

    1. Open SunnyMining official website
    Go to sunnymining.com and register an account with your email.
    2. Receive $15 free computing power
    After registration, you can directly receive free mining rewards and choose BTC, DOGE, XRP and other currencies to start the experience.
    3. Wait for the income to arrive every day
    The system automatically mines and settles every day. You don’t need to do anything, and the income is directly sent to your account.

    Diversified contract options, free configuration of investment rhythm

    Novice experience contract: investment amount: $100, contract period: 2 days, daily income $4, total net profit: $100+$8.
    DOGE-Classic Contract Plan investment amount: $600, contract period: 7 days, daily income $7.8, total net profit: $600+$54.6
    DOGE-Classic Contract Plan: investment amount: $1,200, contract period: 10 days, daily income $16.08, total net profit: $1,300 + $160.8.
    BTC-Intermediate Contract Program: investment amount: $3000, contract period: 16 days, daily income $41.7, total net profit: $3000 + $667.2.
    BTC-Intermediate Contract Program: investment amount: $8000, contract period: 27 days, daily income $119.02, total net profit: $8000 +$3218.
    BTC-Advanced Contract Program: Investment amount: $12,000, contract period: 35 days, daily income $184.8, total net profit: $12,000 + $6468.
    BTC-Advanced Contract Program: Investment amount: $23,000, contract period: 42 days, daily income $365.7, total net profit $23,000 + $15359.4.

    Users can freely choose according to budget, cycle and preference. There is no need for complex configuration. The system will automatically execute and the income will be credited to the account daily.

    It is not just a platform, but also a digital economic distribution system

    SunnyMining’s intelligent system will automatically adjust mining strategies according to market and computing power changes, so that every computing power can bring the highest possible returns.
    McAfee® and Cloudflare® provide bank-level security protection to ensure the stability of user assets and full data encryption.
    What users see is an App-level experience with automatic settlement in the background and one-click operation in the front end. The complex on-chain calculation and security mechanism are encapsulated into a simple system of “light operation + daily income”.

    Sustainability is not only about environmental protection, but also about long-termism

    SunnyMining achieves low-energy and high-efficiency mining operations by deploying green energy infrastructure around the world, combining wind power, hydropower and AI computing power scheduling.
    Unlike traditional “high-energy consumption, high-profit” cyclical mining, SunnyMining is promoting the transformation to an intelligent, environmentally friendly and sustainable revenue model.

    Redefining “Who can mine”

    SunnyMining not only lowers the threshold for mining, but also completely reshapes the way to participate in mining. Through a smarter, greener and easier-to-use system, it is truly returning the right to obtain digital assets to every ordinary person.
    For more details, please visit SunnyMining official website: https://www.sunnymining.com/
    Download APP: https://sunnymining.com/download/

    Media Contact
    SunnyMining
    info@sunnymining.com

    Disclaimer: The information provided in this press release is not a solicitation for investment, nor is it intended as investment advice, financial advice, or trading advice. Cryptocurrency mining and staking involve risk. There is potential for loss of funds. It is strongly recommended you practice due diligence, including consultation with a professional financial advisor, before investing in or trading cryptocurrency and securities.

    Attachment

    The MIL Network

  • MIL-OSI USA: Congressmembers Langworthy and Stefanik Introduce SAFER at the Border Act to Block Dangerous Migrants Exploiting Biden-era Loopholes

    Source: US Congressman Nick Langworthy (NY-23)

    WASHINGTON, D.C. – Congressmembers Nick Langworthy (NY-23) and Elise Stefanik (NY-21) introduced the Safeguarding Americans from Extreme Risk (SAFER) at the Border Act, legislation aimed at closing dangerous loopholes left wide open by the Biden administration and restoring strict vetting protocols to ensure extremists and criminals are kept out of the United States.

     

    “My constituents are fed up with the flood of murderers, terrorists, and dangerous individuals that poured into our communities across New York State—all because of the reckless, failed open-border policies of the Biden administration,” said Congressman Langworthy. “A nation without secure borders is a nation in decline, and it’s time we take bold, decisive action to reverse the chaos of the last four years.”

     

    He continued, “The SAFER at the Border Act answers the urgent call from Border Czar Tom Homan, who has sounded the alarm on the unprecedented number of illegal aliens who entered our country under the Biden administration from high-risk countries like Iran. This legislation is about protecting American families from threats that never should have made it onto our soil in the first place.”

     

    “The Worst Governor in America Kathy Hochul embraced and fully supported Joe Biden’s catastrophic open border policies. She has put all New Yorkers at risk by prioritizing illegals first and New Yorkers LAST with her sanctuary state policies,” Chairwoman Stefanik said. “Today, I am announcing I am co-leading the SAFER at the Border Act with Congressman Nick Langworthy to keep dangerous criminal illegals from terrorizing New York and our nation’s streets. The legislation closes loopholes that were exploited by Kathy Hochul’s failed policies and Joe Biden’s reckless abuse of immigration parole. Terrorists, transnational criminals, and dangerous foreign nationals invaded our sovereign nation under the corrupt and failed leadership of Kathy Hochul. We must put law-abiding New Yorkers first and secure our borders.”

     

    Specifically, the SAFER at The Border Act would:

     

    • Prohibit parole for high-risk aliens: The bill bars the Secretary of Homeland Security from granting immigration parole to individuals who pose national security or public safety risks—such as known terrorists, members of transnational criminal organizations, or those flagged in federal threat databases.
    • Closes loopholes for refugee parole: It prohibits parole of refugees into the United States outside of the established refugee admission process, preventing the administration from using broad parole authority to bypass standard vetting and security protocols.
    • Targets national security threats in immigration law: The bill ensures that individuals with ties to terrorism, espionage, or foreign criminal networks are flagged and blocked from entering the U.S., reinforcing existing inadmissibility standards with clear statutory guardrails.

     

    The full text of the legislation can be found here.

     

    Original cosponsors of this legislation include Reps. Michael Cloud (TX), Chuck Edwards (NC), Gabe Evans (CO), Chuck Fleischmann (TN), Michael Guest (MS), Nicole Malliotakis (NY), Andy Ogles (TN), Michael Rulli (OH), Mike Simpson (ID), Pete Stauber (NY), Elise Stefanik (NY), Scott DesJarlais (TN), and Claudia Tenney (NY).

     

    The SAFER at The Border Act is supported by the Immigration Accountability Project, Federation for American Immigration Reform (FAIR), and America First Policy Institute (AFPI).

     

    While the country is no longer facing the mass release of illegal aliens into the country under the guise of ‘humanitarian parole’, Congress must act to prevent this kind of abuse from happening again. In light of reports that the Biden Administration released suspected terrorists into the interior during the border crisis, Congress must change the law so that no known or suspected terrorists can ever be granted humanitarian parole. The SAFER at the Border Act prioritizes safeguarding American communities by prohibiting parole for individuals deemed dangerous, including those associated with espionage, sabotage, terrorism, or serious criminal activities. The Immigration Accountability Project applauds Senator Daines and Congressman Langworthy for this effort to help bring sanity and security back to the immigration system,”saidGrant Newman, Director of Government Relations, Immigration Accountability Project.

     

    “For the last four years, suspected terrorists were encountered at our borders in record numbers and special interest aliens flooded into the country, putting the interests of illegal aliens over protecting our national security. As a result of the Biden Administration’s catch-and-release policies and abuse of parole, dangerous aliens were more likely than ever before to slip through the cracks. Limiting the DHS Secretary from paroling aliens designated as terrorists, suspected terrorists, or special interest aliens is a commonsense step. FAIR is proud to support this crucial bill to help ensure the safety of American citizens and protect against the abuse of our immigration laws,”said Joe Chatham, Director of Government Relations, FAIR.

     

    “Border security is national security, and our open southern border has significantly increased our Nation’s vulnerability to terrorist attacks. An unprecedented number of terrorists, special interest aliens, and cartel members have exploited the Biden Administration’s failed border strategy and been released into American communities. We must reverse course from these disastrous policies, secure our border, and stop these national security and public safety threats from entering our Nation. The Safeguarding Americans from Extremist Risk (SAFER) at the Border Act empowers the Department of Homeland Security to protect American families,” said Chad Wolf, former acting Secretary of the Department of Homeland Security and Executive Director of the America First Policy Institute.

     

    Read the exclusive here.

      

    ###

    MIL OSI USA News

  • Hardeep Singh Puri highlights India’s economic milestones and reforms at ICAI Foundation Day

    Source: Government of India

    Source: Government of India (4)

    Union Minister for Petroleum and Natural Gas, Hardeep Singh Puri, on Tuesday outlined India’s remarkable economic transformation over the past eleven years, crediting bold policy reforms, robust governance, and far-reaching social welfare measures for propelling the country from the world’s eleventh largest economy in 2014 to the fourth largest today.

    Addressing the 77th Foundation Day of the Institute of Chartered Accountants of India (ICAI) at Bharat Mandapam in New Delhi, Puri noted that India’s GDP has more than doubled, from USD 2.1 trillion in 2014 to USD 4.3 trillion in 2025. He said India has recently surpassed Japan and is on track to overtake Germany by 2030 to become the world’s third-largest economy.

    Reflecting on a decade of extensive welfare programmes, the Minister highlighted that over 27 crore citizens have been lifted out of multidimensional poverty, nearly four crore homes have been sanctioned under the Pradhan Mantri Awas Yojana, and more than 15 crore rural households now have access to piped drinking water through the Jal Jeevan Mission. Health coverage under Ayushman Bharat now benefits over 70 crore people, providing ₹5 lakh insurance per family each year.

    Puri also underscored India’s ability to attract foreign investment, citing USD 748 billion in foreign direct investment inflows between 2014 and 2025—an increase of 143% over the previous decade—and the rise in source countries from 89 to 112. Landmark economic measures such as the Insolvency and Bankruptcy Code, Production-Linked Incentive schemes, Goods and Services Tax, and Direct Benefit Transfers, along with the removal of over 25,000 compliances and 1,400 outdated laws, have further strengthened India’s business environment.

    The Minister pointed to significant improvements in tax administration, with the number of annual income tax returns filed more than doubling from 3.6 crore in FY 2013–14 to 8.5 crore in FY 2024–25. He noted that 95% of these returns are now processed within 30 days, helping ensure that every tax rupee translates into social benefits such as LPG connections for households, medicines for the underprivileged, rural electrification, pensions for senior citizens, and jobs for the youth.

    Highlighting the resilience of India’s banking sector, Puri said gross non-performing assets of scheduled commercial banks have fallen from 14.58% in FY 2017–18 to below 3% in FY 2024–25. He also noted that India’s digital economy continues to expand rapidly, with the Unified Payments Interface (UPI) handling nearly 50% of the world’s real-time digital transactions and serving over 500 million active users. India’s fintech adoption now stands at 87%, compared to a global average of 67%, driven by widespread access to digital identity and mobile connectivity.

    Among flagship initiatives, the Minister lauded the success of the Pradhan Mantri Ujjwala Yojana, which has delivered more than 16.5 crore LPG connections since 2014. This has empowered women, improved health by reducing indoor air pollution, and enhanced public welfare. The Oil & Gas sector’s robust growth was reflected in the doubling of the market capitalization of Public Sector Undertakings (PSUs) to ₹8.79 lakh crore since 2014.

    Looking ahead, Puri urged chartered accountants to embrace new technologies such as artificial intelligence and advanced analytics to automate routine tasks and focus on delivering strategic insights. “Embracing AI is no longer optional—it is essential for staying competitive and innovative in today’s evolving financial world,” he said.

    Puri called on the ICAI community to uphold the values of transparency, efficiency, and accountability as India advances towards its goal of becoming a developed nation by 2047. “On this special day, remember that your profession has the power to protect and sustain our economy. Your dedication is vital for building Viksit Bharat,” he said.

  • MIL-OSI: Little Pepe Surpasses $3,000,000 Presale Milestone, Ignites Hype Across EVM Layer 2 Meme Space

    Source: GlobeNewswire (MIL-OSI)

    DUBAI, United Arab Emirates, July 01, 2025 (GLOBE NEWSWIRE) — Viral meme token LILPEPE has already raised over $3 million and is currently in its 4th presale stage, priced at just $0.0013. It’s shaking up the EVM Layer 2 space by merging meme culture with serious blockchain utility—offering lightning-fast transactions, ultra-low fees, and full Ethereum compatibility through the Little Pepe Chain. This innovative blend of virality and infrastructure positions $LILPEPE as a standout project in the next generation of meme space.

    Little Pepe: A New Era of Meme Token Beyond the Hype

    Meme coins have long been viewed as novelty acts—fun, speculative assets with little intrinsic value. But times are changing, and Little Pepe is leading that transformation. Designed from the ground up as a high-speed, low-cost Layer 2 blockchain, the Little Pepe sets a new technical standard while embracing the energy and virality of meme culture.

    Where most meme coins rely solely on community-driven momentum, Little Pepe fuses utility and scalability, making $LILPEPE a token with a real role to play. Built as an ERC-20 token on the Little Pepe, $LILPEPE is more than just a meme fun—it’s the token of a growing ecosystem.

    EVM-Compatible Layer 2: Speed Meets Scalability

    The Layer 2 ecosystem has gained major traction in recent years, especially as Ethereum continues to face scalability and gas fee challenges. Little Pepe addresses those concerns head-on with a network engineered for efficiency. EVM compatibility ensures seamless integration with existing Ethereum-based dApps and wallets, making it easy for developers and users alike to migrate or interact without friction.

    This design choice positions the Little Pepe not just as another Layer 2 solution, but as a meme-powered blockchain that doesn’t sacrifice performance. Its lightning-fast transactions and near-zero gas fees mean users can transact, play, mint, or trade without ever worrying.

    $LILPEPE Presale: Over $3 Million Raised

    $LILPEPE’s presale performance can be a strong indicator of long-term growth. Little Pepe has already crossed the $3 million mark in presale funding, currently sitting in Stage 4. This surge of capital has come from many crypto whales.

    More so, the presale is exclusively available via littlepepe.com, giving investors a chance to get in early before listing on the exchanges. With four stages already underway and a growing community behind it, the momentum is clear.

    Viral Meme Token $LILPEPE

    Timing in crypto is everything, and $LILPEPE arrives at a critical inflection point. Meme coins like PEPE, SHIB, and DOGE have shown that massive gains are possible, but also highlighted the volatility of hype-driven assets. By building real infrastructure beneath the meme, Little Pepe is aiming for something more sustainable.

    The crypto world is hungry for innovation, but also for culture—and Little Pepe provides both. Its blend of humor, decentralization, and technical performance may well mark the arrival of the next big crypto narrative: meme coins with purpose.

    Furthermore, whether you’re a meme enthusiast, a DeFi investor, or someone scouting the next big altcoin breakout, Little Pepe offers something rare in this market: a reason to believe that fun, function, and finance can coexist. With over $3 million raised, a powerful utility token, and a purpose-built Layer 2 chain, $LILPEPE may be early—but it’s already unstoppable.

    About Little Pepe

    Little Pepe is a next-gen Layer 2 blockchain designed to merge meme culture with high-speed, low-cost decentralized infrastructure. Built for scalability, security, and accessibility, Little Pepe supports EVM-compatible applications and is powered by means of the $LILPEPE token. The project’s mission is to create a meme coin environment wherein utility meets virality, empowering users through cutting-edge technology and lightning-fast transactions.

    For more information:
    Website: https://littlepepe.com/
    Telegram: https://t.me/littlepepetoken
    Twitter: https://x.com/littlepepetoken

    Contact Details:
    COO-James Stephen
    media@littlepepe.com

    Disclaimer: This content is provided by Little Pepe. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice. Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed. Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. GlobeNewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/4cbb184f-d963-4852-a67a-486c5bb4b5bb

    The MIL Network

  • MIL-OSI Economics: Podcast: Microsoft EVP Rajesh Jha on leading with courage in the AI era

    Source: Microsoft

    Headline: Podcast: Microsoft EVP Rajesh Jha on leading with courage in the AI era

    MOLLY WOOD: That was Rajesh Jha, Microsoft’s Executive Vice President for Experiences and Devices. As a key figure at the helm of Microsoft’s product innovation, he leads a team of tens of thousands of people around the world who have worked to integrate AI into Windows and tools like Microsoft 365, Teams, and more. He’s also a key member of the company’s senior leadership team, which works directly for Microsoft Chairman and CEO Satya Nadella. In this episode, Jha shares his perspective on navigating the complexities of how AI is changing the way we work, and he offers actionable advice on how leaders have to adapt, compete, and bring their people along with them. And now my conversation with Rajesh. Rajesh, thank you so much for being on WorkLab today.  

    RAJESH JHA: Thank you, Molly, for hosting me. It’s a real pleasure to be here with you.  

    MOLLY WOOD: You have more than 30,000 employees, and you run a $100 billion business, which is more than most CEOs do. What are just some of the many lessons I’m sure you have learned from running such a huge organization? 

    RAJESH JHA: It’s been a real privilege to be at Microsoft through so many of the growth years. When I reflect back on my career, there are a few things that are enduring. The mission matters because through the ups and downs, if you have a sense of purpose, you have a North Star, that really does matter. And Microsoft has been really great to always be grounded in our customer successes, our success—this theme of empowerment, from Bill into Steve into Satya. So that was definitely number one. The second thing that I would say is, it seems very trite, but it has really worked for me specifically and my team, is, whenever we are looking at a hard strategic call, we start from, how would the customer react to the decision that we’re making, that has been incredibly grounding, so that’s been enduring. Of course, the team matters, the culture matters, because that’s where the work gets done. And then finally, managing a large business is about, literally, about figuring out how to make elephants dance, because you have a large-scale business, customers expect us to have a certain level of quality and continuity and predictability. At the same time, they take a bet on us to innovate. And so how do you stay nimble and innovate while also being predictable and trustworthy for customers? That is a hard thing to go do, but absolutely essential. It’s an and, it just can’t be an or.  

    MOLLY WOOD: Well, and Microsoft is an elephant that has danced, quite nimbly, for the last 50 years— 

    RAJESH JHA: Sometime clumsily, sometimes nimbly, yes. [laughter]  

    MOLLY WOOD: We’ll focus on the nimble—or not, right, based on your experience in bringing new technologies to market and helping to effectuate some pretty major technological innovations. What insights do you have for leaders who are now navigating this AI transformation?  

    RAJESH JHA: I mean, now is the time for leaders to really consider how their businesses, how their teams, how their skill set—how does that evolve in a world where we are looking at, you know, something at the peer of electricity coming into society, or the internet coming into society. And so it’s time to lean forward, and lean forward in a way that makes sense for their businesses or their business process. It is such a big change that it’s going to probably take a decade to play out, but there is no avoiding the sea change that’s underway now. So some bravery, but bravery on customers’ terms. 

    MOLLY WOOD: Yeah. I’m thinking of leaders who may be wary, who may need a dose of that courage. You’ve spoken about being asked by Steve Ballmer to bring Office to cloud, as one example of a transformation that maybe you were a little wary about. Can you walk us through that experience and how it might give a shot of courage for folks today. 

    RAJESH JHA: This was, you know, back maybe 15 years ago, Microsoft was incredibly profitable and the cloud was a question mark for many at Microsoft. A) would this technology be mature enough? B) is the business model, because the margins were going to be lower on the cloud than our old business model of being on premises. Number three, would we be able to transform fast enough? Because Microsoft had grown up being a server company, a client company, and would we be able to transcend that to be about cloud and mobile. And they were all very important questions. And there was a lot of, you know, let’s hold back. Let’s see if this trend is really real or not. And Steve showed incredible courage by going all in. What Steve did was he gave license to people to go and learn, even if we were not perfect on day one. And so the big lesson for me in how Steve started that journey was, leaders, if you have hesitation, whether it’s a business model hesitation or cultural hesitation, skill hesitation, it’s very hard for the teams to rally behind something where the leader themselves are half-hearted. So that was a very big moment for us, because he was unambiguous about, hey, this is the way that software is going to be delivered in the future. This is the way we can democratize the value we bring to customers. And there were a lot of benefits, and we are just going to go all in.  

    MOLLY WOOD: So leaders have to go all in. But I would imagine it’s not a—progress is not always a straight line. 

    RAJESH JHA: No, it wasn’t. And even with us in the cloud, it wasn’t. But the main thing is, leaders have to lead. And when you’re taking a look, the hard things are process, business model change, culture change, skill change. They’re all incredibly hard, and that’s why there has to be a commitment from the top that we are going to see this through. And then we were eyes wide open as what our deficiencies were. And so we didn’t have the right skill set. We trained people, we brought in new people, we embraced the red—all the things that we were not doing well in this new transformation. We were very open, very honest. It just takes leadership to set the tone here and to set the things in motion. 

    MOLLY WOOD: Right, and to your point, persistence and belief that it is the right direction so that you stay on that road even when it gets hard.  

    RAJESH JHA: That is correct, Molly, absolutely. And then one additional point I would make with persistence and belief is, it’s one thing to say it, it’s another thing to allocate resources to that belief. We have a quote, which is, if you really want to see the strategy of an organization, you’ve got to see where they’re allocating resources.  

    MOLLY WOOD: On the one hand, it sounds like you’re saying, get comfortable with chaos—  

    RAJESH JHA: Controlled chaos, Molly. Controlled chaos.   

    MOLLY WOOD: Then of course there’s the question of how not to break things. You know, security becomes a big concern with incorporating AI, doing it in a way that doesn’t introduce more problems. What is your advice for having proper guardrails in place as you transform in the AI age?  

    RAJESH JHA: So, I’m gonna answer that in two parts. Part one is, what do I mean by controlled chaos? So Satya invited Scott Guthrie, myself, Charlie [Bell] as the three big product leaders at Microsoft to go over to Bill’s house to see GPT-4, and Satya’s exact comment to me at that time was, I’ve gotta get you guys to be believers. And he had already seen it. And so he and Kevin Scott, they were already on board about the capabilities. So anyway, we go over to Bill’s house, it was in the kitchen area, where the OpenAI folks had put in a demo and they had a grader who grades AP biology there. The thing that really got me was it was not just the multiple choice questions that the model was doing a great job of, it was doing a great job on the written answers. There was some of the AP biology stuff, I’ve studied some biology, but they were far above my ability to understand. And so I look at all of that, I’m completely blown away. But then, for me, the big moment was when Bill asked the question, what would you say to the parent of a sick child, and the empathy or the humanity, almost, that it was able to convey in the answer was like, I would’ve felt proud to have written such a thoughtful note. And I was like, god, this is really, I mean, we are leaving behind the low-altitude handshake between computing and humanity. We are taking a look at something that can be almost at the pure level. And so now, fast-forward, it’s not that long, two years, and we are at the point where we are talking about agents and digital labor and people working together. 

    MOLLY WOOD: But that was it, that worked. You became believers. 

    RAJESH JHA: For me, that was it. I lead a large organization, and I see lots of cool stuff all the time, and part of my job is to make sure the trains keep running on time, but make sure I’m open-minded about big things. And when big things show up, I try to scope it and manage it. I have never in my 30 years ever gone to my team and said, drop all your plans. And for me, that was it. None of the existing plans matter anymore. I huddled all my senior leaders, and I said, Folks, I want you all to run a hundred miles an hour. It’s going to be very uncomfortable, because we’re going to unleash some amount of chaos, but let’s make sure we harden our processes that this chaos does not make its way to customers. So what I mean by controlled chaos is, if you’re unleashing a lot of activity all at once, you need to have the mitigating controls and the guardrails to make sure the chaos is controlled and managed. And so we huddled together to make sure our processes were hardened. So that’s one of the things with controlled chaos. But one of the guardrails that is not negotiable is security, as you correctly pointed out. So in our implementation of AI, we started very much from the mindset of, how does the AI inherit all the existing security and governance controls that an organization already has? It’s one thing to come and tell them, hey, rethink all your business process, rethink your scaling, rethink how work is done, and rethink your security and governance. It’s just not doable. And so we architected this from the ground up, that, for example, when you use Microsoft Copilot, it is using your permissions, so it only has access to what you have access to. It can never do any more than what you might do as a human. And then we also made sure that it was the mindset of a copilot, not an autopilot, and so the humans were always in control. So this way, whatever governance, data classification, permissions, you know, conditional access, retention policies—whatever a customer had, and how they managed human-to-human conversations, all of that accreted to human-to-AI conversation. That was a very hard guardrail we knew we just could not compromise.  

    MOLLY WOOD: But I want to go back to the example that you just gave, this moment of having this experience and realizing how— 

    RAJESH JHA: Profound. 

    MOLLY WOOD: Profound—exactly—and sophisticated these models were, because those are the kind of moments that give you the faith to go all in. 

    Rajesh Jha: Just to go back to that moment, Molly, I mean, to think as an engineer, as somebody who’s been in the tech industry a long time, who’s been through so many of the transformations, the big takeaway for me was, you know, for the first time computing, so far, human and machine interaction has been very much—machines are very low level. You know, we interact with pixels, we click on things, we read stuff. When I come in to work, I don’t come in to work thinking, oh, I should do 16 minutes of email and then read four documents and then, you know, open that spreadsheet, take a look at that budget. I come in thinking, I’ve got to work on budget today. So I think at a high level of intent, but then my intent to decompose is, either on my device, on a bunch of icons I’m swiping through, flipping from application to application, or going really low level—reading emails and then clicking a link. And so high-level intent gets reduced to low-level clerical work, almost. So when I saw this demo, I was like, Wow, the interaction is going to change. It is not going to be intent and then reduced to low-level stuff. AI is going to have the capability to have a human-to-human-like conversation. So intent, high-level intent to high-level intent, and that was what was the big takeaway for me. This is the computing for the last 35 years. One thing that hadn’t changed was a fundamental interaction pattern between people and their devices, and that was going to change, because now you could express, hey, I want to write a document that has the following three ideas, take a look at the relevant stuff in my enterprise and on the web—and can you compose a report for me? That is the kind of thing that I would tell another human being if there was a new hire in my team and, you know, I was thinking about a project to give them. This is the kind of way I might express the project to them, and then they will go in and do the work, check in with me, and we go back and forth. Now that was going to be possible.  

    MOLLY WOOD: Let’s keep talking about that idea of leveling up. We now live in a world where I may get an email from your account and I may not know if it was written by you or an AI, and that may not matter.  

    RAJESH JHA: You know, in some ways, it’s not that different from what happens for some of us. Let’s say I was to send a large piece of email to my team. I would actually work with my staff and my leadership team to get the latest status on a few things, and then I would put it in my words, and I would send it out. Now, everybody has that ability, because what the copilot does, you know, if I’m responding to a customer today, I go to my engineer who’s working on the customer issues, and say, hey, what is the latest status on this? And I would take a look at some of the other past conversations. I would try and respond to the customer that way. Now the copilot is doing that for me. It’s taking a look at my past emails. It reaches out to the customer service database. It tells me the latest status on this. It creates me a draft that I then go write and I send it out. And in some ways, I get reminded of, my dad used to run a large steel plant in India, and I visited him about 20 years ago. I walked into his office and he was very proud, because they had just gotten email, and I was working at Microsoft, and he had just gotten email. His secretary walked in at that time, and she said, Mr. Jha, I’ve got your morning messages for you, and here’s a message that I’m just going to go reach out to your technical assistant or respond to this person. This one, I know what to do already. This one, what would you like me to tell the customer, this person’s asking for dinner tomorrow. You’re free. And they were done in 15 minutes, and she left. And I looked at my dad, and I said, god, you’re so old-fashioned. Somebody’s actually printing your email, reading and coming and talking to you about it, whereas, look at me, I’m carrying it on my phone. I can get to it anywhere. But now, you know, I understand he was a smart guy, and I’m a digital clerk. I do all the clerical work myself. You know, I’m sorting messages. I’m replying to staff. I don’t come in to work thinking I should be a digital clerk. I come in to work because I want to lead a team, build products and value. That is what AI is now going to do. It’s going to take the clerical part for all of us, and will automate a lot of clerical parts to let the human ingenuity and the creativity and really let us focus on the intent and the meaning of our work.  

    MOLLY WOOD: We need help, Rajesh. We need help. [laughter] Well, speaking of delivering that help to customers, it’s been about a year, year and a half, since Microsoft 365 Copilot launched. Do you have stories from the trenches? Are there fun examples you can share about how this has gone?  

    RAJESH JHA: Really well. Ever since I came to Microsoft, this is the fastest adoption we’ve seen. When a customer buys a license and gives it to an end user, because the copilot is integrated into your user flows in Office, or Teams in a meeting, or so on and so forth, we see very good uptake in usage and retention. Some things that surprised me a little bit—and in hindsight, perhaps not so surprising—is the amount of customizations that customers do want for AI. I have feedback from some customers saying, hey, your AI, I want it to engage more because, you know, we build safety into our AI so it will not engage on some topics. Some customers want it to engage more, some want it to engage less. So they want to customize that. One of the things that some customers ask for is, hey, I would like your AI to not reach out to the web. I only want it to work with the stuff that’s in my enterprise. And I say, yeah, we’ve got that configuration for you. But can I ask you why? If you allow your employees to be able to use the browser and search the web as a part of their job, why is it not okay for the copilot that’s acting on their behalf to reach out on the web and assist them? So I’m surprised with the amount of configuration that enterprises want, which is, of course, enterprises have different business rules and process, so we built many more customizations in M365 Copilot than I had anticipated coming in. 

    MOLLY WOOD: I read some research recently where one of the AI firms said that they had done some analysis and found themselves really surprised at how long the long tail of interactions with AI are.  

    RAJESH JHA: So true. This generation of AI is about information work. It changes how people write, learn, collaborate, read, and so there’s a long tail. Not all of us triage information the same way.  

    MOLLY WOOD: What are some best practices that are starting to emerge? Because certainly every enterprise is going to adopt differently, interact differently, and then have different use cases that may or may not make their experience work.  

    RAJESH JHA: That’s a great question. I would say the successful implementations that we see are the first stage, of course, is to enable people to get productivity boosts with the AI, where the AI is really assisting you. And then the next most important thing that customers end up doing that gives them a real return on investment is to rethink their high-value business process or high-cost business processes, and figure out how to reconfigure that with agents that can automate a bunch of those processes to be either more effective or more efficient. That, I think, is changing the way work happens. For example, if you’re a lawyer and you’re working with a bunch of documents, instead of having—somebody spent a lot of time going through the past relevant briefs and composing a new template. How do you change a new brief creation? How do you change an approval process? How do you change a customer support ticket handling? How do you change a marketing campaign? How do you change a developer workflow? I see customers actually taking a business process, and they are rewiring that for a world where people and AI can work together to automate that, to make it more effective, more efficient. So that is a good best practice, is not trying to solve a hundred business processes, but taking a few and going really deep and measuring the ROI and tweaking that, because then the payoff is right there. 

    MOLLY WOOD: Well, and to dig in a little further, it also sounds like what you’re saying is that companies and CIOs maybe need to commit. Like, if you don’t commit, if you don’t plug Copilot in, if you don’t enable the full Microsoft Graph, if you maybe don’t give access to the web, people are still going to find these tools and use some version of them that might not be as good as they could be if you really do go all in. 

    RAJESH JHA: Yeah, Molly, it’s exactly right. I mean, it goes back to the point we made, which is, leaders, have, you know, leaders have to lead. And the reason why they have to lead here in this transformation is, if a support organization, a marketing organization, engineering organization is wired to work the old way, they are not automatically going to rewire themselves for a world where AI can do a bunch of tasks and people’s tasks change. That’s not going to happen, bottom-up. It’s going to have to happen from the leaders leaning in and saying, okay, you know, am I sure that I have the right compliance and governance and security? Because those are non-negotiable. But once I have that, how do I lead the way where I empower and I get to a world where AI assisting, to agents and people working together? One of the concepts we’ve talked about, and it’s come out in the new Work Trend Index is, corporations, for the longest time, have had static org charts, and every once in a while you do a reorganization and you reconfigure teams for your new evolving business priorities. But those things are not very frequent, nor should they be very frequent, because there’s a huge lag to those things. The way work happens is people, it’s, teams are less static and they’re more outcome-driven. Some of this started to happen post-COVID also, where the fluidity of the team composition was not represented in the org chart. That thing is going to accelerate far more in a world where digital labor and people, agents and people, are going to work together as business processes get rewired. None of this is going to be possible without leaders committing to that. And the way you can commit to it is by taking a few processes that are incredibly important for your business’ top line or your profitability because it’s a high-cost thing, and trying to figure out how to reconfigure those things for people and agents working together in one team. 

    MOLLY WOOD: What do you wish business leaders understood about AI agents to help them make that commitment? 

    RAJESH JHA: The first thing I would just say is, like, it’s not some distant future, it’s happening now. My product management team, they ran a research today of a bunch of different organizations, and this time, you know, usually we talk to 30,000 people across different organizations, 30 different countries. This time, they also reached out to AI-native companies that have started to emerge, so-called frontier companies. And if you take a look at the frontier companies, it is very obvious that the way the distribution of human work and digital labor, how that gets constituted, there’s very interesting patterns that are starting to emerge. The first thing I would just tell leaders is—of established companies such as myself, my peers, and the rest of large organizations—it’s possible today to take full advantage of agents. The security model exists, the identity model exists, the user interface exists. The hard work here is to actually go pick the processes that give you the most bang for the buck and then be rigorous about measuring that. And this is why we invested in something called the Copilot Impact Dashboard, so customers can take their core KPIs and they can measure how the copilot is moving those KPIs. So be rigorous, but be forward-looking. It’s not, hey, let’s just take a leap of faith and let’s get agents everywhere. Be rigorous with security. Be rigorous with governance. Measure the ROI, but pick the processes that you’re going to go add agents to. 

    MOLLY WOOD: It seems like the other tension, in addition to going all in, right, in addition to commitment, is pace, the pace of introducing that change, going fast to keep up to, you know, be pushed properly by Frontier Firms, but not compromising security and guardrails. 

    RAJESH JHA: And so on the pace, it’s a super good tension that you pick up on, and we deal with the tension all the time ourselves at Microsoft. What is hard is to have pace at scale. But what’s not hard is to have pace at smaller scale. I’m not advocating for a large organization to go and say, go rewire all your business process, fast, into the frontier methodology. I’m saying, pick a few that are really important to you and go with base on those, learn from that. Meanwhile, invest in skilling. Meanwhile, invest in assistance for everybody else. And that’s what we do, too, in my team. We want to move very quickly, but we move very quickly in a scoped garden with a few processes, a few customers, and then once we are sure it is mature and it’s ready, do we then scale it out. So, moving fast doesn’t mean move fast all over, all at once, if you’re a large organization. It means you’re moving fast by having picked and assessed. And, you know, which way do you want to go fast and where do you want to go more cautiously, and then take the lessons from moving fast and more broadly. 

    MOLLY WOOD: Right. It’s so valuable to put a fine point on that, because any problem is manageable in component parts. 

    RAJESH JHA: Hundred percent. Hundred percent. And picking is the important thing. But if you pick something unimportant that you’re moving fast on, you’re not really learning a lot either. 

    MOLLY WOOD: Right. Then the other tension, the technology itself is moving really fast, so you might have incorporated something, you’re doing a great job measuring it, and now there’s a whole new tool. How do you advise business leaders to keep up?  

    RAJESH JHA: The playbook is still the same. You have to figure out how to move fast and stay predictable at the same time. And the way you do that is by managing where you move fast and by having rigorous measures of whether the ROI is working out or not. Because you’re a hundred percent right. I mean, the compression of innovation that I’m seeing in the AI wave is like nothing that we’ve seen before in the last 30 years. 

    MOLLY WOOD: So as we talk about committing, you know, it’s one thing to say, maybe give your model access to the web, but there’s this Microsoft Graph that it seems like really unlocks that power. 

    RAJESH JHA: The Microsoft Graph is really not Microsoft’s graph. It is a graph for the customer. It’s owned by the customer. And what it captures is how people inside of their organization work together—the meetings that are important, the documents that have been created, the chats and the projects that people are working on—the business processes that run in their organization, that is all a part of the Microsoft Graph. So you take the power of a reasoning model that now has access to the graph—remember again, the reasoning model has access to the same things that you would as an individual. So when I ask a reasoning model or an agent to work on my behalf on Microsoft Graph, it is working with my permissions. But now it has the ability to read far more, process far more than I would be able to. You take the unique intellectual property of the customer in the graph with all the right permissions overlaid, and then you let AI work on that, along with what’s available in the web, on the world knowledge, your enterprise knowledge—that is the real enabler. So what is great about the researcher in Microsoft 365 Copilot is that it works with your enterprise permissions and your enterprise data, everything that is in the graph. And that is what I think is a real breakthrough. Now you’ve got the makings of a digital employee, somebody who was able to come in, join an organization, and take advantage of all the intellectual property with all the permissioning honored, and take that and be a part of producing output for the company.  

    MOLLY WOOD: Right. I mean, it’s institutional knowledge, like, think about what a great employee I could be if I knew all the context and all the history that a company had gone through. 

    RAJESH JHA: Exactly. And all the relevant, you know, escalations, projects, all of that stuff. 

    MOLLY WOOD: Switching gears a little. You work very closely with Microsoft CEO Satya Nadella. Are there questions that he regularly asks you that you think all leaders should be asking their employees? 

    RAJESH JHA: I think fundamentally my boss, you know, Satya, I mean, he’s pushing me on exactly the set of questions you were asking, on my own organization. The way he describes the priorities that I have and my peer groups have, three priorities—quality, security, and AI transformation, are you moving fast? Fully understanding that quality and security and then moving fast, sometimes are intentions, but that’s what he’s saying. Are you doing your job to do all of these at the same time? A lot of the thrust of his conversations, questions are, are you evolving your own team to be frontier, and what’s getting in your way? Because whatever we learn then applies to our customers. So are we applying the same methodology to make your enterprise-grade securities non-negotiable. And then at the same time, are you moving fast to take full advantage? Are you really rethinking your production functions? So I would say all of his questions and interactions distill into these three things, and are we doing a good job balancing these three things.  

    MOLLY WOOD: This company has reinvented itself many times. What are the key lessons that we and all business leaders should take from those reinventions? 

    RAJESH JHA: I would say again, mission matters. Through those 50 years, our mission is a theme around empowerment, so number one. Number two, I would say is, team culture matters, of course, because the how and where the work—there’s no substitute for that. But then I would say you gotta do the and, it’s never an or. How do you stay scaled and perform while waiting and disrupting at the same time? That comes down to strong leadership, it comes down to good processes. Then, what you touched on that I want to reiterate is, you know, just resiliency. We didn’t get everything right in the last 50 years. We made mistakes, but being resilient, learning from the mistakes, embracing the red so we can do a better job the next time. I think those are all components that I would just say we benefited from having incredible CEOs from Bill and Steve and Satya, so that has been an amazing, you know, learning experience for me and many others to work with those three amazing individuals.  

    MOLLY WOOD: If our listeners could take away one actionable AI-related insight from you, what would it be? 

    RAJESH JHA: I would say, go embrace agents. Pick out your most important processes, reimagine them how agents and digital labor can rewire that. 

    MOLLY WOOD: We love to ask our WorkLab guests how they are using AI themselves, either at work or in your personal life. Are there use cases that have been really helpful for you that you’re willing to talk about? 

    RAJESH JHA: Yeah, the one thing we didn’t talk about that I feel is just mind-blowing, is this reasoning models. You know, today, Molly, you and I going back and forth, then you ask me a hard question, I’ll give you an answer off the cuff. But if you tell me, Rajesh, go think about it and come back to me. And, you know, I have a set of tools available to me and I come back to you, I’m going to give you a much better answer. And so with the reasoning model, that’s what’s happening. We are now letting the AI actually go reason over stuff, give it more time, more compute, and more tools. And so for me, the real breakthrough was every quarter I sit down with my leadership team to take a look at our plans for the next six months. So I ran the researcher model. The researcher model is a deep reasoning model in M365 Copilot that works with the graph and the web, and I asked it, hey, I’m about to have an off-site with my leadership team to take a look at the plans for the next six months, take a look at the competitive landscape, take a look at customer feedback, take a look at all the ideas that have been accumulating in the team, and try and give me a draft of what might be a good starting point for our off-site for the next six-month planning. It was incredible. It was able to get through my email and documents that I hadn’t fully read but my team was iterating on, it looked at the last year’s plans to take a look at the competitive landscape, gave me a great five-page, actually it was eight-page, document that I can now go and tweak and make it my own, and overlay my perspective and use as a starting point. The other one is, like, often I talk to customers, and before I get on the call, I ask my agent—it’s called a KYC agent that my team built, which is, know your customer—and so before I get on to a call with a customer, I go into that agent experience in M365 Copilot and say, can you bring me up to speed on this customer? And it’s able to get to the support tickets, their adoption, their past communications with me, all of that stuff. And I often end up showing the customer the output, and we walk through it, and their question is like, how did you generate that? And in personal life, you want to make a big purchase, you want to do a seven-day trip planning, you want to buy a new car. You know, instead of clicking on 40 links, they can do a lot of research for you and show you that. So I use it for a lot of that too. 

    MOLLY WOOD: Fast-forward for us, three to five years, if possible. What do you think could be the most profound change in the way we work? 

    RAJESH JHA: You know, I think it goes back to the reconstitution of the workforce between humans and digital labor. I think the way we think about org charts, the way we think about groups coming together, the way we think about production function. I mean, it is a big deal to have intelligence be abundant and for it to be affordable. At the same time, I feel very encouraged about what people can uniquely do when you take a lot of the grind and predictability and, you know, have a colleague that is intelligent. I mean, I feel very bullish about how the economy is going to evolve. It won’t be a straight line. There will be scale backs in some of the roles that we think about investing in today, but there will be new roles we’ll be creating. So it’s very hard to predict exactly how it’s going to play out or whether that’s a three-year horizon, five-year horizon, but I do think that is a very clear trend of where we are headed. 

    MOLLY WOOD: Rajesh Jha is Microsoft’s Executive Vice President of Experiences and Devices. Thank you so much for the time today. I couldn’t appreciate it more. 

    RAJESH JHA: Thank you, Molly. I really do appreciate the time as well. 

    MOLLY WOOD: That was Rajesh Jha, Microsoft’s Executive Vice President of Experiences and Devices. Thank you all so much for joining us on this final episode of this season of WorkLab. We’ll be back next season with more insights on how to stay ahead of the curve while the way we work is transforming so quickly. If you’ve got a question or a comment, please drop us an email at worklab@microsoft.com, and check out Microsoft’s Work Trend Indexes and the WorkLab digital publication, where you’ll find all our episodes along with thoughtful stories that explore how business leaders are thriving in today’s new world of work. You can find all of it at microsoft.com/worklab. As for this podcast, please, if you don’t mind, rate us, review us, and follow us wherever you listen. It helps us out a ton. The WorkLab podcast is a place for experts to share their insights and opinions. As students of the future of work, Microsoft values inputs from a diverse set of voices. That said, the opinions and findings of our guests are their own and they may not necessarily reflect Microsoft’s own research or positions. WorkLab is produced by Microsoft with Godfrey Dadich Partners and Reasonable Volume. I’m your host, Molly Wood. Sharon Kallander and Matthew Duncan produced this podcast. Jessica Voelker is the WorkLab editor. 

    MIL OSI Economics

  • MIL-OSI Economics: Podcast: Microsoft EVP Rajesh Jha on leading with courage in the AI era

    Source: Microsoft

    Headline: Podcast: Microsoft EVP Rajesh Jha on leading with courage in the AI era

    MOLLY WOOD: That was Rajesh Jha, Microsoft’s Executive Vice President for Experiences and Devices. As a key figure at the helm of Microsoft’s product innovation, he leads a team of tens of thousands of people around the world who have worked to integrate AI into Windows and tools like Microsoft 365, Teams, and more. He’s also a key member of the company’s senior leadership team, which works directly for Microsoft Chairman and CEO Satya Nadella. In this episode, Jha shares his perspective on navigating the complexities of how AI is changing the way we work, and he offers actionable advice on how leaders have to adapt, compete, and bring their people along with them. And now my conversation with Rajesh. Rajesh, thank you so much for being on WorkLab today.  

    RAJESH JHA: Thank you, Molly, for hosting me. It’s a real pleasure to be here with you.  

    MOLLY WOOD: You have more than 30,000 employees, and you run a $100 billion business, which is more than most CEOs do. What are just some of the many lessons I’m sure you have learned from running such a huge organization? 

    RAJESH JHA: It’s been a real privilege to be at Microsoft through so many of the growth years. When I reflect back on my career, there are a few things that are enduring. The mission matters because through the ups and downs, if you have a sense of purpose, you have a North Star, that really does matter. And Microsoft has been really great to always be grounded in our customer successes, our success—this theme of empowerment, from Bill into Steve into Satya. So that was definitely number one. The second thing that I would say is, it seems very trite, but it has really worked for me specifically and my team, is, whenever we are looking at a hard strategic call, we start from, how would the customer react to the decision that we’re making, that has been incredibly grounding, so that’s been enduring. Of course, the team matters, the culture matters, because that’s where the work gets done. And then finally, managing a large business is about, literally, about figuring out how to make elephants dance, because you have a large-scale business, customers expect us to have a certain level of quality and continuity and predictability. At the same time, they take a bet on us to innovate. And so how do you stay nimble and innovate while also being predictable and trustworthy for customers? That is a hard thing to go do, but absolutely essential. It’s an and, it just can’t be an or.  

    MOLLY WOOD: Well, and Microsoft is an elephant that has danced, quite nimbly, for the last 50 years— 

    RAJESH JHA: Sometime clumsily, sometimes nimbly, yes. [laughter]  

    MOLLY WOOD: We’ll focus on the nimble—or not, right, based on your experience in bringing new technologies to market and helping to effectuate some pretty major technological innovations. What insights do you have for leaders who are now navigating this AI transformation?  

    RAJESH JHA: I mean, now is the time for leaders to really consider how their businesses, how their teams, how their skill set—how does that evolve in a world where we are looking at, you know, something at the peer of electricity coming into society, or the internet coming into society. And so it’s time to lean forward, and lean forward in a way that makes sense for their businesses or their business process. It is such a big change that it’s going to probably take a decade to play out, but there is no avoiding the sea change that’s underway now. So some bravery, but bravery on customers’ terms. 

    MOLLY WOOD: Yeah. I’m thinking of leaders who may be wary, who may need a dose of that courage. You’ve spoken about being asked by Steve Ballmer to bring Office to cloud, as one example of a transformation that maybe you were a little wary about. Can you walk us through that experience and how it might give a shot of courage for folks today. 

    RAJESH JHA: This was, you know, back maybe 15 years ago, Microsoft was incredibly profitable and the cloud was a question mark for many at Microsoft. A) would this technology be mature enough? B) is the business model, because the margins were going to be lower on the cloud than our old business model of being on premises. Number three, would we be able to transform fast enough? Because Microsoft had grown up being a server company, a client company, and would we be able to transcend that to be about cloud and mobile. And they were all very important questions. And there was a lot of, you know, let’s hold back. Let’s see if this trend is really real or not. And Steve showed incredible courage by going all in. What Steve did was he gave license to people to go and learn, even if we were not perfect on day one. And so the big lesson for me in how Steve started that journey was, leaders, if you have hesitation, whether it’s a business model hesitation or cultural hesitation, skill hesitation, it’s very hard for the teams to rally behind something where the leader themselves are half-hearted. So that was a very big moment for us, because he was unambiguous about, hey, this is the way that software is going to be delivered in the future. This is the way we can democratize the value we bring to customers. And there were a lot of benefits, and we are just going to go all in.  

    MOLLY WOOD: So leaders have to go all in. But I would imagine it’s not a—progress is not always a straight line. 

    RAJESH JHA: No, it wasn’t. And even with us in the cloud, it wasn’t. But the main thing is, leaders have to lead. And when you’re taking a look, the hard things are process, business model change, culture change, skill change. They’re all incredibly hard, and that’s why there has to be a commitment from the top that we are going to see this through. And then we were eyes wide open as what our deficiencies were. And so we didn’t have the right skill set. We trained people, we brought in new people, we embraced the red—all the things that we were not doing well in this new transformation. We were very open, very honest. It just takes leadership to set the tone here and to set the things in motion. 

    MOLLY WOOD: Right, and to your point, persistence and belief that it is the right direction so that you stay on that road even when it gets hard.  

    RAJESH JHA: That is correct, Molly, absolutely. And then one additional point I would make with persistence and belief is, it’s one thing to say it, it’s another thing to allocate resources to that belief. We have a quote, which is, if you really want to see the strategy of an organization, you’ve got to see where they’re allocating resources.  

    MOLLY WOOD: On the one hand, it sounds like you’re saying, get comfortable with chaos—  

    RAJESH JHA: Controlled chaos, Molly. Controlled chaos.   

    MOLLY WOOD: Then of course there’s the question of how not to break things. You know, security becomes a big concern with incorporating AI, doing it in a way that doesn’t introduce more problems. What is your advice for having proper guardrails in place as you transform in the AI age?  

    RAJESH JHA: So, I’m gonna answer that in two parts. Part one is, what do I mean by controlled chaos? So Satya invited Scott Guthrie, myself, Charlie [Bell] as the three big product leaders at Microsoft to go over to Bill’s house to see GPT-4, and Satya’s exact comment to me at that time was, I’ve gotta get you guys to be believers. And he had already seen it. And so he and Kevin Scott, they were already on board about the capabilities. So anyway, we go over to Bill’s house, it was in the kitchen area, where the OpenAI folks had put in a demo and they had a grader who grades AP biology there. The thing that really got me was it was not just the multiple choice questions that the model was doing a great job of, it was doing a great job on the written answers. There was some of the AP biology stuff, I’ve studied some biology, but they were far above my ability to understand. And so I look at all of that, I’m completely blown away. But then, for me, the big moment was when Bill asked the question, what would you say to the parent of a sick child, and the empathy or the humanity, almost, that it was able to convey in the answer was like, I would’ve felt proud to have written such a thoughtful note. And I was like, god, this is really, I mean, we are leaving behind the low-altitude handshake between computing and humanity. We are taking a look at something that can be almost at the pure level. And so now, fast-forward, it’s not that long, two years, and we are at the point where we are talking about agents and digital labor and people working together. 

    MOLLY WOOD: But that was it, that worked. You became believers. 

    RAJESH JHA: For me, that was it. I lead a large organization, and I see lots of cool stuff all the time, and part of my job is to make sure the trains keep running on time, but make sure I’m open-minded about big things. And when big things show up, I try to scope it and manage it. I have never in my 30 years ever gone to my team and said, drop all your plans. And for me, that was it. None of the existing plans matter anymore. I huddled all my senior leaders, and I said, Folks, I want you all to run a hundred miles an hour. It’s going to be very uncomfortable, because we’re going to unleash some amount of chaos, but let’s make sure we harden our processes that this chaos does not make its way to customers. So what I mean by controlled chaos is, if you’re unleashing a lot of activity all at once, you need to have the mitigating controls and the guardrails to make sure the chaos is controlled and managed. And so we huddled together to make sure our processes were hardened. So that’s one of the things with controlled chaos. But one of the guardrails that is not negotiable is security, as you correctly pointed out. So in our implementation of AI, we started very much from the mindset of, how does the AI inherit all the existing security and governance controls that an organization already has? It’s one thing to come and tell them, hey, rethink all your business process, rethink your scaling, rethink how work is done, and rethink your security and governance. It’s just not doable. And so we architected this from the ground up, that, for example, when you use Microsoft Copilot, it is using your permissions, so it only has access to what you have access to. It can never do any more than what you might do as a human. And then we also made sure that it was the mindset of a copilot, not an autopilot, and so the humans were always in control. So this way, whatever governance, data classification, permissions, you know, conditional access, retention policies—whatever a customer had, and how they managed human-to-human conversations, all of that accreted to human-to-AI conversation. That was a very hard guardrail we knew we just could not compromise.  

    MOLLY WOOD: But I want to go back to the example that you just gave, this moment of having this experience and realizing how— 

    RAJESH JHA: Profound. 

    MOLLY WOOD: Profound—exactly—and sophisticated these models were, because those are the kind of moments that give you the faith to go all in. 

    Rajesh Jha: Just to go back to that moment, Molly, I mean, to think as an engineer, as somebody who’s been in the tech industry a long time, who’s been through so many of the transformations, the big takeaway for me was, you know, for the first time computing, so far, human and machine interaction has been very much—machines are very low level. You know, we interact with pixels, we click on things, we read stuff. When I come in to work, I don’t come in to work thinking, oh, I should do 16 minutes of email and then read four documents and then, you know, open that spreadsheet, take a look at that budget. I come in thinking, I’ve got to work on budget today. So I think at a high level of intent, but then my intent to decompose is, either on my device, on a bunch of icons I’m swiping through, flipping from application to application, or going really low level—reading emails and then clicking a link. And so high-level intent gets reduced to low-level clerical work, almost. So when I saw this demo, I was like, Wow, the interaction is going to change. It is not going to be intent and then reduced to low-level stuff. AI is going to have the capability to have a human-to-human-like conversation. So intent, high-level intent to high-level intent, and that was what was the big takeaway for me. This is the computing for the last 35 years. One thing that hadn’t changed was a fundamental interaction pattern between people and their devices, and that was going to change, because now you could express, hey, I want to write a document that has the following three ideas, take a look at the relevant stuff in my enterprise and on the web—and can you compose a report for me? That is the kind of thing that I would tell another human being if there was a new hire in my team and, you know, I was thinking about a project to give them. This is the kind of way I might express the project to them, and then they will go in and do the work, check in with me, and we go back and forth. Now that was going to be possible.  

    MOLLY WOOD: Let’s keep talking about that idea of leveling up. We now live in a world where I may get an email from your account and I may not know if it was written by you or an AI, and that may not matter.  

    RAJESH JHA: You know, in some ways, it’s not that different from what happens for some of us. Let’s say I was to send a large piece of email to my team. I would actually work with my staff and my leadership team to get the latest status on a few things, and then I would put it in my words, and I would send it out. Now, everybody has that ability, because what the copilot does, you know, if I’m responding to a customer today, I go to my engineer who’s working on the customer issues, and say, hey, what is the latest status on this? And I would take a look at some of the other past conversations. I would try and respond to the customer that way. Now the copilot is doing that for me. It’s taking a look at my past emails. It reaches out to the customer service database. It tells me the latest status on this. It creates me a draft that I then go write and I send it out. And in some ways, I get reminded of, my dad used to run a large steel plant in India, and I visited him about 20 years ago. I walked into his office and he was very proud, because they had just gotten email, and I was working at Microsoft, and he had just gotten email. His secretary walked in at that time, and she said, Mr. Jha, I’ve got your morning messages for you, and here’s a message that I’m just going to go reach out to your technical assistant or respond to this person. This one, I know what to do already. This one, what would you like me to tell the customer, this person’s asking for dinner tomorrow. You’re free. And they were done in 15 minutes, and she left. And I looked at my dad, and I said, god, you’re so old-fashioned. Somebody’s actually printing your email, reading and coming and talking to you about it, whereas, look at me, I’m carrying it on my phone. I can get to it anywhere. But now, you know, I understand he was a smart guy, and I’m a digital clerk. I do all the clerical work myself. You know, I’m sorting messages. I’m replying to staff. I don’t come in to work thinking I should be a digital clerk. I come in to work because I want to lead a team, build products and value. That is what AI is now going to do. It’s going to take the clerical part for all of us, and will automate a lot of clerical parts to let the human ingenuity and the creativity and really let us focus on the intent and the meaning of our work.  

    MOLLY WOOD: We need help, Rajesh. We need help. [laughter] Well, speaking of delivering that help to customers, it’s been about a year, year and a half, since Microsoft 365 Copilot launched. Do you have stories from the trenches? Are there fun examples you can share about how this has gone?  

    RAJESH JHA: Really well. Ever since I came to Microsoft, this is the fastest adoption we’ve seen. When a customer buys a license and gives it to an end user, because the copilot is integrated into your user flows in Office, or Teams in a meeting, or so on and so forth, we see very good uptake in usage and retention. Some things that surprised me a little bit—and in hindsight, perhaps not so surprising—is the amount of customizations that customers do want for AI. I have feedback from some customers saying, hey, your AI, I want it to engage more because, you know, we build safety into our AI so it will not engage on some topics. Some customers want it to engage more, some want it to engage less. So they want to customize that. One of the things that some customers ask for is, hey, I would like your AI to not reach out to the web. I only want it to work with the stuff that’s in my enterprise. And I say, yeah, we’ve got that configuration for you. But can I ask you why? If you allow your employees to be able to use the browser and search the web as a part of their job, why is it not okay for the copilot that’s acting on their behalf to reach out on the web and assist them? So I’m surprised with the amount of configuration that enterprises want, which is, of course, enterprises have different business rules and process, so we built many more customizations in M365 Copilot than I had anticipated coming in. 

    MOLLY WOOD: I read some research recently where one of the AI firms said that they had done some analysis and found themselves really surprised at how long the long tail of interactions with AI are.  

    RAJESH JHA: So true. This generation of AI is about information work. It changes how people write, learn, collaborate, read, and so there’s a long tail. Not all of us triage information the same way.  

    MOLLY WOOD: What are some best practices that are starting to emerge? Because certainly every enterprise is going to adopt differently, interact differently, and then have different use cases that may or may not make their experience work.  

    RAJESH JHA: That’s a great question. I would say the successful implementations that we see are the first stage, of course, is to enable people to get productivity boosts with the AI, where the AI is really assisting you. And then the next most important thing that customers end up doing that gives them a real return on investment is to rethink their high-value business process or high-cost business processes, and figure out how to reconfigure that with agents that can automate a bunch of those processes to be either more effective or more efficient. That, I think, is changing the way work happens. For example, if you’re a lawyer and you’re working with a bunch of documents, instead of having—somebody spent a lot of time going through the past relevant briefs and composing a new template. How do you change a new brief creation? How do you change an approval process? How do you change a customer support ticket handling? How do you change a marketing campaign? How do you change a developer workflow? I see customers actually taking a business process, and they are rewiring that for a world where people and AI can work together to automate that, to make it more effective, more efficient. So that is a good best practice, is not trying to solve a hundred business processes, but taking a few and going really deep and measuring the ROI and tweaking that, because then the payoff is right there. 

    MOLLY WOOD: Well, and to dig in a little further, it also sounds like what you’re saying is that companies and CIOs maybe need to commit. Like, if you don’t commit, if you don’t plug Copilot in, if you don’t enable the full Microsoft Graph, if you maybe don’t give access to the web, people are still going to find these tools and use some version of them that might not be as good as they could be if you really do go all in. 

    RAJESH JHA: Yeah, Molly, it’s exactly right. I mean, it goes back to the point we made, which is, leaders, have, you know, leaders have to lead. And the reason why they have to lead here in this transformation is, if a support organization, a marketing organization, engineering organization is wired to work the old way, they are not automatically going to rewire themselves for a world where AI can do a bunch of tasks and people’s tasks change. That’s not going to happen, bottom-up. It’s going to have to happen from the leaders leaning in and saying, okay, you know, am I sure that I have the right compliance and governance and security? Because those are non-negotiable. But once I have that, how do I lead the way where I empower and I get to a world where AI assisting, to agents and people working together? One of the concepts we’ve talked about, and it’s come out in the new Work Trend Index is, corporations, for the longest time, have had static org charts, and every once in a while you do a reorganization and you reconfigure teams for your new evolving business priorities. But those things are not very frequent, nor should they be very frequent, because there’s a huge lag to those things. The way work happens is people, it’s, teams are less static and they’re more outcome-driven. Some of this started to happen post-COVID also, where the fluidity of the team composition was not represented in the org chart. That thing is going to accelerate far more in a world where digital labor and people, agents and people, are going to work together as business processes get rewired. None of this is going to be possible without leaders committing to that. And the way you can commit to it is by taking a few processes that are incredibly important for your business’ top line or your profitability because it’s a high-cost thing, and trying to figure out how to reconfigure those things for people and agents working together in one team. 

    MOLLY WOOD: What do you wish business leaders understood about AI agents to help them make that commitment? 

    RAJESH JHA: The first thing I would just say is, like, it’s not some distant future, it’s happening now. My product management team, they ran a research today of a bunch of different organizations, and this time, you know, usually we talk to 30,000 people across different organizations, 30 different countries. This time, they also reached out to AI-native companies that have started to emerge, so-called frontier companies. And if you take a look at the frontier companies, it is very obvious that the way the distribution of human work and digital labor, how that gets constituted, there’s very interesting patterns that are starting to emerge. The first thing I would just tell leaders is—of established companies such as myself, my peers, and the rest of large organizations—it’s possible today to take full advantage of agents. The security model exists, the identity model exists, the user interface exists. The hard work here is to actually go pick the processes that give you the most bang for the buck and then be rigorous about measuring that. And this is why we invested in something called the Copilot Impact Dashboard, so customers can take their core KPIs and they can measure how the copilot is moving those KPIs. So be rigorous, but be forward-looking. It’s not, hey, let’s just take a leap of faith and let’s get agents everywhere. Be rigorous with security. Be rigorous with governance. Measure the ROI, but pick the processes that you’re going to go add agents to. 

    MOLLY WOOD: It seems like the other tension, in addition to going all in, right, in addition to commitment, is pace, the pace of introducing that change, going fast to keep up to, you know, be pushed properly by Frontier Firms, but not compromising security and guardrails. 

    RAJESH JHA: And so on the pace, it’s a super good tension that you pick up on, and we deal with the tension all the time ourselves at Microsoft. What is hard is to have pace at scale. But what’s not hard is to have pace at smaller scale. I’m not advocating for a large organization to go and say, go rewire all your business process, fast, into the frontier methodology. I’m saying, pick a few that are really important to you and go with base on those, learn from that. Meanwhile, invest in skilling. Meanwhile, invest in assistance for everybody else. And that’s what we do, too, in my team. We want to move very quickly, but we move very quickly in a scoped garden with a few processes, a few customers, and then once we are sure it is mature and it’s ready, do we then scale it out. So, moving fast doesn’t mean move fast all over, all at once, if you’re a large organization. It means you’re moving fast by having picked and assessed. And, you know, which way do you want to go fast and where do you want to go more cautiously, and then take the lessons from moving fast and more broadly. 

    MOLLY WOOD: Right. It’s so valuable to put a fine point on that, because any problem is manageable in component parts. 

    RAJESH JHA: Hundred percent. Hundred percent. And picking is the important thing. But if you pick something unimportant that you’re moving fast on, you’re not really learning a lot either. 

    MOLLY WOOD: Right. Then the other tension, the technology itself is moving really fast, so you might have incorporated something, you’re doing a great job measuring it, and now there’s a whole new tool. How do you advise business leaders to keep up?  

    RAJESH JHA: The playbook is still the same. You have to figure out how to move fast and stay predictable at the same time. And the way you do that is by managing where you move fast and by having rigorous measures of whether the ROI is working out or not. Because you’re a hundred percent right. I mean, the compression of innovation that I’m seeing in the AI wave is like nothing that we’ve seen before in the last 30 years. 

    MOLLY WOOD: So as we talk about committing, you know, it’s one thing to say, maybe give your model access to the web, but there’s this Microsoft Graph that it seems like really unlocks that power. 

    RAJESH JHA: The Microsoft Graph is really not Microsoft’s graph. It is a graph for the customer. It’s owned by the customer. And what it captures is how people inside of their organization work together—the meetings that are important, the documents that have been created, the chats and the projects that people are working on—the business processes that run in their organization, that is all a part of the Microsoft Graph. So you take the power of a reasoning model that now has access to the graph—remember again, the reasoning model has access to the same things that you would as an individual. So when I ask a reasoning model or an agent to work on my behalf on Microsoft Graph, it is working with my permissions. But now it has the ability to read far more, process far more than I would be able to. You take the unique intellectual property of the customer in the graph with all the right permissions overlaid, and then you let AI work on that, along with what’s available in the web, on the world knowledge, your enterprise knowledge—that is the real enabler. So what is great about the researcher in Microsoft 365 Copilot is that it works with your enterprise permissions and your enterprise data, everything that is in the graph. And that is what I think is a real breakthrough. Now you’ve got the makings of a digital employee, somebody who was able to come in, join an organization, and take advantage of all the intellectual property with all the permissioning honored, and take that and be a part of producing output for the company.  

    MOLLY WOOD: Right. I mean, it’s institutional knowledge, like, think about what a great employee I could be if I knew all the context and all the history that a company had gone through. 

    RAJESH JHA: Exactly. And all the relevant, you know, escalations, projects, all of that stuff. 

    MOLLY WOOD: Switching gears a little. You work very closely with Microsoft CEO Satya Nadella. Are there questions that he regularly asks you that you think all leaders should be asking their employees? 

    RAJESH JHA: I think fundamentally my boss, you know, Satya, I mean, he’s pushing me on exactly the set of questions you were asking, on my own organization. The way he describes the priorities that I have and my peer groups have, three priorities—quality, security, and AI transformation, are you moving fast? Fully understanding that quality and security and then moving fast, sometimes are intentions, but that’s what he’s saying. Are you doing your job to do all of these at the same time? A lot of the thrust of his conversations, questions are, are you evolving your own team to be frontier, and what’s getting in your way? Because whatever we learn then applies to our customers. So are we applying the same methodology to make your enterprise-grade securities non-negotiable. And then at the same time, are you moving fast to take full advantage? Are you really rethinking your production functions? So I would say all of his questions and interactions distill into these three things, and are we doing a good job balancing these three things.  

    MOLLY WOOD: This company has reinvented itself many times. What are the key lessons that we and all business leaders should take from those reinventions? 

    RAJESH JHA: I would say again, mission matters. Through those 50 years, our mission is a theme around empowerment, so number one. Number two, I would say is, team culture matters, of course, because the how and where the work—there’s no substitute for that. But then I would say you gotta do the and, it’s never an or. How do you stay scaled and perform while waiting and disrupting at the same time? That comes down to strong leadership, it comes down to good processes. Then, what you touched on that I want to reiterate is, you know, just resiliency. We didn’t get everything right in the last 50 years. We made mistakes, but being resilient, learning from the mistakes, embracing the red so we can do a better job the next time. I think those are all components that I would just say we benefited from having incredible CEOs from Bill and Steve and Satya, so that has been an amazing, you know, learning experience for me and many others to work with those three amazing individuals.  

    MOLLY WOOD: If our listeners could take away one actionable AI-related insight from you, what would it be? 

    RAJESH JHA: I would say, go embrace agents. Pick out your most important processes, reimagine them how agents and digital labor can rewire that. 

    MOLLY WOOD: We love to ask our WorkLab guests how they are using AI themselves, either at work or in your personal life. Are there use cases that have been really helpful for you that you’re willing to talk about? 

    RAJESH JHA: Yeah, the one thing we didn’t talk about that I feel is just mind-blowing, is this reasoning models. You know, today, Molly, you and I going back and forth, then you ask me a hard question, I’ll give you an answer off the cuff. But if you tell me, Rajesh, go think about it and come back to me. And, you know, I have a set of tools available to me and I come back to you, I’m going to give you a much better answer. And so with the reasoning model, that’s what’s happening. We are now letting the AI actually go reason over stuff, give it more time, more compute, and more tools. And so for me, the real breakthrough was every quarter I sit down with my leadership team to take a look at our plans for the next six months. So I ran the researcher model. The researcher model is a deep reasoning model in M365 Copilot that works with the graph and the web, and I asked it, hey, I’m about to have an off-site with my leadership team to take a look at the plans for the next six months, take a look at the competitive landscape, take a look at customer feedback, take a look at all the ideas that have been accumulating in the team, and try and give me a draft of what might be a good starting point for our off-site for the next six-month planning. It was incredible. It was able to get through my email and documents that I hadn’t fully read but my team was iterating on, it looked at the last year’s plans to take a look at the competitive landscape, gave me a great five-page, actually it was eight-page, document that I can now go and tweak and make it my own, and overlay my perspective and use as a starting point. The other one is, like, often I talk to customers, and before I get on the call, I ask my agent—it’s called a KYC agent that my team built, which is, know your customer—and so before I get on to a call with a customer, I go into that agent experience in M365 Copilot and say, can you bring me up to speed on this customer? And it’s able to get to the support tickets, their adoption, their past communications with me, all of that stuff. And I often end up showing the customer the output, and we walk through it, and their question is like, how did you generate that? And in personal life, you want to make a big purchase, you want to do a seven-day trip planning, you want to buy a new car. You know, instead of clicking on 40 links, they can do a lot of research for you and show you that. So I use it for a lot of that too. 

    MOLLY WOOD: Fast-forward for us, three to five years, if possible. What do you think could be the most profound change in the way we work? 

    RAJESH JHA: You know, I think it goes back to the reconstitution of the workforce between humans and digital labor. I think the way we think about org charts, the way we think about groups coming together, the way we think about production function. I mean, it is a big deal to have intelligence be abundant and for it to be affordable. At the same time, I feel very encouraged about what people can uniquely do when you take a lot of the grind and predictability and, you know, have a colleague that is intelligent. I mean, I feel very bullish about how the economy is going to evolve. It won’t be a straight line. There will be scale backs in some of the roles that we think about investing in today, but there will be new roles we’ll be creating. So it’s very hard to predict exactly how it’s going to play out or whether that’s a three-year horizon, five-year horizon, but I do think that is a very clear trend of where we are headed. 

    MOLLY WOOD: Rajesh Jha is Microsoft’s Executive Vice President of Experiences and Devices. Thank you so much for the time today. I couldn’t appreciate it more. 

    RAJESH JHA: Thank you, Molly. I really do appreciate the time as well. 

    MOLLY WOOD: That was Rajesh Jha, Microsoft’s Executive Vice President of Experiences and Devices. Thank you all so much for joining us on this final episode of this season of WorkLab. We’ll be back next season with more insights on how to stay ahead of the curve while the way we work is transforming so quickly. If you’ve got a question or a comment, please drop us an email at worklab@microsoft.com, and check out Microsoft’s Work Trend Indexes and the WorkLab digital publication, where you’ll find all our episodes along with thoughtful stories that explore how business leaders are thriving in today’s new world of work. You can find all of it at microsoft.com/worklab. As for this podcast, please, if you don’t mind, rate us, review us, and follow us wherever you listen. It helps us out a ton. The WorkLab podcast is a place for experts to share their insights and opinions. As students of the future of work, Microsoft values inputs from a diverse set of voices. That said, the opinions and findings of our guests are their own and they may not necessarily reflect Microsoft’s own research or positions. WorkLab is produced by Microsoft with Godfrey Dadich Partners and Reasonable Volume. I’m your host, Molly Wood. Sharon Kallander and Matthew Duncan produced this podcast. Jessica Voelker is the WorkLab editor. 

    MIL OSI Economics

  • MIL-OSI USA: Warren Responds to Senate Republicans Passing Trump Bill, Slams Republicans for “Cheer[ing] Over Taking Away Health Care from Around 17 Million People”

    US Senate News:

    Source: United States Senator for Massachusetts – Elizabeth Warren
    July 01, 2025
    Watch the Video (YouTube)
    Washington, D.C. — In a new video reacting to the passage of President Trump’s “Big, Beautiful Bill,” U.S. Senator Elizabeth Warren (D-Mass.) slammed Senate Republicans for “cheer[ing] over taking away health care from around 17 million people… giving huge tax breaks to a handful of billionaires.” 
    On Tuesday, the Senate completed 26 hours of debate on the “Big, Beautiful Bill,” following Democrats’ successful delay of the bill’s passage. Despite Republicans’ efforts to rush the bill through, it only passed after Vice President JD Vance broke the 50-50 Senate tie. 
    During the debate and amendment process, Senate Democrats successfully pushed to strike provisions that would have devastated the deployment of clean energy and prohibited the regulation of artificial intelligence (AI) at the state level for ten years. 
    “[W]e proved why we stay in the fight, because actually, there are pieces of this bill that we got better…It’s always the reminder: all of those calls matter,” said Senator Warren. 
    The bill now heads back to the House of Representatives for consideration of the Senate’s amended version of the bill. 
    Senator Warren urged people across the country to continue fighting back as the bill continues to make its way through Congress. 
    “We stay in it not because it’s an easy fight, not because we’re guaranteed to win every time. We stay in it, because it’s the right fight,” Senator Warren concluded. 
    Transcript: Senator Warren’s Reaction to Senate Passage of the “Big, Beautiful Bill”July 1, 2025
    Senator Elizabeth Warren: I’m leaving the Senate now at the end of the vote. When the Republicans won, they cheered. 
    They cheered over taking away health care from around 17 million people. They cheered over giving huge tax breaks to a handful of billionaires. They cheered over running up the national debt by another three and a half trillion dollars. 
    You know, this bill is bad. It’s bad economically, it’s bad morally. This bill is just wrong. 
    But, we stay in the fight. We stay in the fight. And we proved why we stay in the fight, because actually, there are pieces of this bill that we got better. 
    We got the tax on solar and wind knocked out, and that’s going to help with clean energy. We got a few different pieces and made them better. So that’s reason number one. It’s always the reminder: all of those calls matter. 
    Reason number two is: it’s still not over. The bill has now got to go back over to the House, and there are a lot of Republicans who are feeling really squeamish about this bill at this point, so that means we got to stay in the fight. 
    And reason number three is: yeah, they may do this now, but come November 2026, they’re going to have to face the voters. They’re going to have to face the people, the families of the people whose health care they took away, and they’re going to have to explain exactly what they just did just now on the floor of the United States Senate and whatever they do next. 
    So, this is hard, but damn, we stay in the fight. We stay in it not because it’s an easy fight, not because we’re guaranteed to win every time. We stay in it, because it’s the right fight.

    MIL OSI USA News

  • MIL-OSI USA: PRESS RELEASE: Reps. Barragán, Buchanan, Sánchez, and Bilirakis Reintroduce Bipartisan Resolution Recognizing June 2025 as Alzheimer’s and Brain Awareness Month

    Source: United States House of Representatives – Representative Nanette Diaz Barragán (CA-44)

    FOR IMMEDIATE RELEASE
    June 30, 2025

    Contact: Jin.Choi@mail.house.gov

    Reps. Barragán, Buchanan, Sánchez, and Bilirakis Reintroduce Bipartisan Resolution Recognizing June 2025 as Alzheimer’s and Brain Awareness Month

    Washington, D.C. – Today, Congresswoman Nanette Barragán (CA-44), Congressman Vern Buchanan (FL-16), Congresswoman Linda Sánchez (CA-38), and Congressman Gus Bilirakis (FL-12) reintroduced a bipartisan resolution to designate June 2025 as Alzheimer’s and Brain Awareness Month. The resolution seeks to increase public understanding of Alzheimer’s disease, support continued investment in research, and recognize the strength and sacrifice of individuals living with Alzheimer’s and their caregivers.

    “Nearly 7 million Americans, including my own mother, are living with Alzheimer’s or another form of dementia. This disease is deeply personal to me, and to the countless families who serve as caregivers while grappling with its emotional and financial toll,” said Rep. Barragán. “We must continue to raise awareness, advance research, and support caregivers, especially those in communities of color where disparities in diagnosis, access to care, and outcomes persist. I’m grateful to my colleagues, Reps. Buchanan, Sánchez, and Bilirakis, for their partnership in this bipartisan effort.”

    “As someone who cared for a parent with this horrible disease, I believe that it is critical for Congress to take steps to recognize the impact that Alzheimer’s and dementia have on the millions of Americans diagnosed every year,” said Rep. Buchanan. “I am proud to co-lead this bipartisan resolution with Reps. Barragán, Sánchez and Bilirakis to bring much-needed and continued awareness to these deadly diseases.”

    “As the daughter of two parents who suffered from Alzheimer’s, I can tell you firsthand how devastating the disease is, as well as the emotional toll it takes on families,” Congresswoman Linda T. Sánchez said. “This resolution recognizes the importance of early detection and screening, as well as how this disease disproportionately affects women, Latinos, and Black Americans. It is important that we continue raising awareness around the facts of this disease, and advancing research to eventually find a cure.”

    “As research continues to yield advancement in the development of more treatment options for patients with Alzheimer’s, we know that early detection, diagnosis and intervention offers the best promise for disease management which is why we must raise awareness of the signs, symptoms and impact this disease has on millions of Americans,” said Congressman Gus Bilirakis. “My family has coped with the devastating impacts of this horrific disease for more than a decade, so I understand the toll it takes on the patient and his or her loved ones as it progresses. We owe it to our fellow Americans to develop a system of care that prioritizes education, screening and assessment so that patients can enjoy the best possible quality of life.”

    “On behalf of the over 7 million Americans living with Alzheimer’s, thank you to Reps. Barragán, Buchanan, Bilirakis and Sánchez for recognizing June as Alzheimer’s & Brain Awareness Month and for your unwavering dedication to the Alzheimer’s community,” said Rachel Conant, Alzheimer’s Association senior vice president of public policy and AIM executive director. “Your commitment to bipartisan solutions is driving progress in the fight against this devastating disease.”

    The Alzheimer’s & Brain Awareness Month resolution is endorsed by the Alzheimer’s Association and Alzheimer’s Impact Movement (AIM).

    The full text of the legislation can be found here. 

    ###

    MIL OSI USA News

  • MIL-OSI: BTCMiner: A ticket to wealth, register and get a $500 contract

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, July 01, 2025 (GLOBE NEWSWIRE) —

    BTCMiner is an intelligent cloud mining platform that helps global users easily enter the field of digital currency mining through simple operations and flexible investment methods. With its stable returns, zero-risk guarantee and innovative mining mechanism,

    Start BTCMiner cloud mining journey now: and receive $500

    1: Go to the official website to register → https://btcminer.net

    2: Select a contract: The platform has a variety of contract options, and users can choose one or more contracts at the same time

    3: Automatically settle income every 24 hours, and check income records and transaction records at any time on the dashboard

    4: Multi-currency withdrawal and recharge: (BTC) (ETH) (XRP) (LTC) (BCH) (USDT) (DOGE)

    Some contracts of BTCMiner are displayed, and you can go to the official website to view more contracts

    BTC Miner has obtained FCA (Financial Conduct Authority) certification, ensuring the compliance and fund security of the platform

    BTCMiner platform’s original principal and interest guarantee contract allows investors to not worry about the risks brought by market fluctuations.

    BTCMiner platform is equipped with AI intelligent scheduling system, which intelligently optimizes mining strategies according to market conditions, electricity costs, computing resources and other factors to provide each investor with maximum returns

    It is better to act than to be moved, and choosing the right direction is more important than working hard

    Official website address: https://btcminer.net

    Official email: info@btcminer.net

    Click here to download the app

    Attachment

    The MIL Network

  • MIL-OSI: Old National Names Matt Keen Chief Information Officer

    Source: GlobeNewswire (MIL-OSI)

    MINNEAPOLIS and ST. PAUL, Minn., July 01, 2025 (GLOBE NEWSWIRE) — (NASDAQ: ONB) Old National Bancorp (“Old National”) has appointed Matt Keen as Chief Information Officer (CIO). In this role, Keen will join Old National’s Executive Leadership Team – the company’s senior-most group of C-suite executives.

    Keen brings more than three decades of experience in significant technology leadership roles at national companies, including leading architecture development, as well as experience with brokerage and banking services, cloud service optimization, and platform modernization.

    “As Old National continues our Midwest and Southeast expansion, our technology strategy and capabilities are also evolving to continue meeting our ever-growing clients’ needs and expectations,” said Old National Chairman & CEO Jim Ryan. “Matt’s wide-ranging technology expertise will be essential for helping us innovate and deliver client-focused solutions, while also supporting the personal relationships that have always been the heart of our success.”

    Keen’s previous technology leadership experience included consulting with American Express as part of his tenure at PriceWaterhouseCoopers, almost 15 years at Ameriprise Financial (formerly a division of American Express), and six years at Two Harbors Investments. Most recently, he served as CIO for Bremer Bank, which became a division of Old National Bank on May 1, 2025.

    As Old National’s CIO, Keen will lead a forward-thinking approach to leveraging technology as an enabler for business success. He will shape and execute the company’s technology strategy, working closely and collaboratively with all aspects of the business to identify ways to increase efficiencies and drive growth. With a particular emphasis on innovation, Keen and his team will use technology, as well as data and analytics, to effectively support and enhance the client and team member experience, to meet their ever-evolving expectations.

    “I’m looking forward to continuing to advance the strong technology foundation that has enabled Old National to achieve its growth goals,” Keen said. “Through a collaborative approach and intense focus on our clients, we’ll bring forward the best technology capabilities to serve the business and support the culture that our team members, clients, and communities expect and appreciate.”

    A resident of Chanhassen, Minn., Keen holds a degree in quantitative methods and computer science from the University of St. Thomas.

    Keen succeeds retiring Chief Information Officer Paul S. Kilroy, who joined Old National in 2020. During his tenure, Kilroy spearheaded a groundbreaking partnership with Infosys that vastly improved contact center quality and stabilized information quality metrics across the organization, leading to a 2024 “Tech Exec of the Year” honor from the Indianapolis Business Journal.

    ABOUT OLD NATIONAL
    Old National Bancorp (NASDAQ: ONB) is the holding company of Old National Bank. As the fifth largest commercial bank headquartered in the Midwest, Old National proudly serves clients primarily in the Midwest and Southeast. With approximately $70 billion of assets and $37 billion of assets under management (including Bremer Financial Corporation on a pro forma basis as of March 31, 2025), Old National ranks among the top 25 banking companies headquartered in the United States. Tracing our roots to 1834, Old National focuses on building long-term, highly valued partnerships with clients while also strengthening and supporting the communities we serve. In addition to providing extensive services in consumer and commercial banking, Old National offers comprehensive wealth management and capital markets services. For more information and financial data, please visit Investor Relations at oldnational.com. In 2025, Points of Light again named Old National one of “The Civic 50” — an honor reserved for the 50 most community-minded companies in the United States.

    Investor Relations:
    Lynell Durchholz
    (812) 464-1366
    lynell.durchholz@oldnational.com

    Media Relations:
    Rick Vach
    (904) 535-9489
    rick.vach@oldnational.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/5d64d8b1-0fab-4151-8bd2-c21133a36465

    The MIL Network

  • MIL-OSI USA: After Weeks of Markey Raising the Alarm, Senate Strikes AI Moratorium from Budget Reconciliation Bill Overnight in Overwhelming 99-1 Vote

    US Senate News:

    Source: United States Senator for Massachusetts Ed Markey
    Washington (July 1, 2025) – Overnight, the U.S. Senate voted 99-1 in favor of an amendment co-sponsored by Senator Edward J. Markey (D-Mass.), member of the Commerce, Science, and Transportation Committee, Senator Maria Cantwell (D-Wash.), Ranking Member of the Senate Committee on Commerce, Science and Transportation, and Senator Marsha Blackburn (R–Tenn.) to strip a ten-year moratorium on state AI regulations from the Republican budget reconciliation bill.
    “Early this morning, the Senate overwhelmingly voted to reject a dangerous provision to block states from regulating artificial intelligence, including protecting kids online. This 99-1 vote sent a clear message that Congress will not sell out our kids and local communities in order to pad the pockets of Big Tech billionaires. I am proud to have partnered with Ranking Member Cantwell and Senator Blackburn on an amendment to strip this dangerous language, and I look forward to working with my colleagues to develop responsible guardrails for AI,” said Senator Markey.
    For weeks, Senator Markey raised alarms over the provision which would have forced states to make an impossible choice between enforcing AI consumer protections or accepting federal BEAD funding to expand broadband access. Despite several revisions by its author and misleading assurances about its true impact, state officials from across the country, including 17 Republican Governors and 40 state Attorneys General, as well conservative and liberal organizations – from the Heritage Foundation to the Center for American Progress – rallied against the harmful proposal.
    On June 30, Senator Markey introduced an amendment with Senator Cantwell to strip the entire provision prior to introducing the same amendment with Senator Cantwell and Senator Blackburn on July 1. On June 10, Senator Markey announced his plans to file an amendment to the Senate reconciliation bill to block Republicans’ attempt to prevent states from regulating artificial intelligence (AI) for the next 10 years. On June 4, Senator Markey convened a virtual roundtable with advocates to discuss the impacts this ban would have on communities across the country. On June 3, Senator Markey delivered remarks on the Senate floor opposing the provision in the House-passed reconciliation bill that would prevent states from regulating AI for the next ten years.
    Senator Markey is the author of the Artificial Intelligence (AI) Civil Rights Act, the most comprehensive AI civil rights legislation introduced in Congress. The legislation would put strict guardrails on companies’ use of algorithms for consequential decisions, ensure algorithms are tested before and after deployment, help eliminate and prevent bias, and renew Americans’ faith in the accuracy and fairness of complex algorithms.

    MIL OSI USA News

  • MIL-OSI: WinnerMining: Are cryptocurrency fluctuations making people panic? No, it’s the business opportunities of cloud mining.

    Source: GlobeNewswire (MIL-OSI)

    New York City, July 01, 2025 (GLOBE NEWSWIRE) — Against the backdrop of drastic fluctuations in the global economy, cryptocurrencies have become the “number one” investment asset pursued by global investors. In particular, BTC, ETH, and XRP continue to influence the global cryptocurrency market. However, AQUARONE, Steffan Luke, CEO of WinnerMining Co., Ltd., believes that amid the market fluctuations that everyone is worried about, there are business opportunities that cannot be missed.

    “Volatility” turns into business opportunities
    WinnerMining not only prevents market volatility, but also stimulates more active trading. WinnerMining offers a variety of different investment contracts for investors of all levels, allowing them to make investment decisions with confidence.
    Despite the uncertainty of US policies under President Trump, which may affect global cryptocurrencies, WinnerMining can cope with the challenges that may arise in the second half of the year and maintain its leading position in the international cryptocurrency market.
    “WinnerMining has experienced crises, whether it is COVID-19 that disrupts the world, US taxation, or regional political conflicts, and each time it has been able to manage in a professional manner and has good resources and connections in the global crypto market, so our customers will still be taken care of in the best way without being affected by irregular market behavior.”

    What are the advantages of Winnermining?
    1. Fund security: The biggest concern of any investor is fund security. There is no need to worry about it at Winnermining, because Winnermining adopts military-grade double protection and stores funds in cold wallets and the world’s top 10 authoritative banks. And it can protect users from asset loss or inflation problems between conflicts.

    2. Registration bonus: In order to welcome novices or experienced miners who join Winnermining for the first time, as long as they join Winnermining, they will immediately receive a platform reward of $15.

    3. Multiple choices: Provide more than 10 different levels of contracts, suitable for users of any class, and also support free cloud mining!

    4. Flexible participation: Support global users to invest in popular currencies such as BTC, ETH, XRP, SOL, DOGE, USDT, USDC, LTC, BCH, etc.

    5. Maintain sustainability: Winnermining has more than 100 large and small new energy power generation sites around the world to maintain the development of cloud mining and continue the mining process.

    6. Customer Support: We provide 24-hour online customer service. Users can visit and consult at any time in any region. Adhering to the concept that customers are God, we serve users from all over the world wholeheartedly and let users have the experience of first love.

    How to participate in Winnermining?
    Step 1: Visit the official website, fill in your email address and set your username/password to complete the registration.
    Step 2: Select the appropriate contract to purchase and lease (all lease contracts can refund the principal).
    Step 3: After the purchase is completed, no operation is required, just wait for 24 hours to get daily income.

    How to earn income on Winnermining?
    Users can complete registration on the official website or application and purchase contracts on the platform.
    Some equity contracts of WinnerMining in 2025 can be viewed here:
    I- Antminer S17e: Investment amount of $100, total profit of $100 + $8.
    II – Shenma Miner M30S: Investment amount of $1000, total profit of $1000 + $130.
    III – Antminer S19J Pro: Investment amount of $3000, total profit of $3000 + $675.
    IV- AvalonMiner A1346: Investment amount of $5000, total profit of $5000 + $1600.
    V – Desiwe Miner K10Ultra: Investment amount of $30,000, total profit of $30,000 + $24300.
    VI – Rack-mounted Filecoin Miner 4300TiB S: Investment amount of $100,000, total profit of $100,000 + $92,500.
    (Visit WinnerMining.VIP to view more contracts)

    Overview:
    Winnermining knows that in the ever-changing crypto market, no one can stand still. The fluctuating crypto market has bubbles and opportunities, and participating in WinnerMining cloud mining is a good choice for digital growth. Join now and get a $15 reward without applying.
    —— Click to download the APP to participate in WinnerMining to take you to experience the daily growth progress of digital assets.

    Attachment

    The MIL Network

  • MIL-OSI Russia: State Council Commission Meeting at the State University of Management: Technical Innovations and Traditional Values Will Become Priorities of Russian Education Until 2036

    Translation. Region: Russian Federal

    Source: State University of Management – Official website of the State –

    On July 1, 2025, a joint meeting of the commissions of the State Council of the Russian Federation in the areas of “Personnel”, “Youth and Children”, “Family” was held at the site of the State University of Management to consider the draft Strategy for the Development of Education in the Russian Federation until 2036.

    The moderator of the meeting, Russian journalist and TV presenter Ernest Matskyavichyus, introduced the main participants in the discussion and reported that more than 1,000 experts worked on the text of the Education Development Strategy, many of whom are present at the meeting.

    The Chairman of the Commission of the State Council of the Russian Federation on “Personnel”, Governor of the Kaluga Region, and graduate of the State University of Management Vladislav Shapsha noted in his welcoming speech that the education system should be flexible and adaptive, integrated into the real sector of the economy and continuous.

    “Today, a situation has arisen where one specialty is no longer enough for an educated person; at least two are needed to always be prepared for the changing situation on the labor market. Qualified specialists of a new type must think innovatively and be able to solve problems in the context of rapid digital transformation and global competition. The key tasks now are: synchronizing education with the labor market, overcoming imbalances in personnel training and forming a system of advanced training, since in the future the situation will change even faster, and artificial intelligence can sharply reduce employment in many areas of labor activity,” warned Vladislav Shapsha.

    The Chairman of the State Council of Russia Commission on “Youth and Children”, Governor of the Yamalo-Nenets Autonomous Okrug Dmitry Artyukhov expressed pleasure at the representative meeting on such a comprehensive topic.

    “Education is a vital area that concerns absolutely everyone: teachers, parents, and millions of children and young people across the country. We have done serious work on the Education Development Strategy on the instructions of the President. Now it is time to move on to action – to focus on implementing our plans. Together, we are laying the foundation for the future of Russian education. This is a vital state task, because it is education that solves key problems for the country: it provides knowledge and skills, trains personnel for the economy, and most importantly, brings up a new generation of Russians,” said Dmitry Artyukhov.

    The Chairman of the State Council of Russia’s Commission on the “Family” Direction, Head of the Republic of Mordovia Artem Zdunov drew the attention of those gathered to the fact that the document under discussion will determine the development vectors not only of education itself, but also through it of the entire country as a whole.

    “I will note two key priorities of the Strategy. The first is the further implementation of high-quality education regardless of the place of residence and social status of the family. Much has already been done for this: new schools and kindergartens have been built, major repairs have been carried out, and institutions have been equipped with modern equipment. The second priority is that the education system should be built on the basis of traditional Russian values, including a strong family. Efforts in this direction should be systemic and continuous, starting from kindergarten to university. The cult of large families should be spread everywhere, similar to how this year we widely celebrate the 80th anniversary of Victory in the Great Patriotic War – information should be broadcast from TV screens, from the Internet, from billboards on city streets and in educational institutions,” said Artem Zdunov.

    Deputy Minister of Education of the Russian Federation Irina Shvartsman said that a public opinion poll was conducted to prepare the draft Strategy for the Development of Education, which affected 338 thousand people. The structure of the Strategy was developed by 15 working groups, including representatives of all departments, the Presidential Administration, the Russian Academy of Education and other experts.

    “The strategy does not hide the problems, it is designed to identify and eliminate them. These are the problems of a shortage of personnel and wages, dilapidated buildings, bureaucratic burden on teachers, and the ideological gap between teachers and students. One of the main values in the education system should be a person. The rights of children and teachers should be equally protected. And to achieve humanitarian and scientific-technical leadership of Russia in the world, it is necessary not only to train qualified specialists, but also to work systematically in the direction of patriotic education,” said Irina Shvartsman.

    Deputy Minister of Science and Higher Education of the Russian Federation Dmitry Afanasyev noted that for the first time in Russia a single document on issues of education development is appearing.

    “In response to current challenges, the Ministry of Education and Science proposes to create a new list of specialties that meet the country’s strategic objectives, reboot and update state programs such as “Priority 2030” and “Advanced Engineering Schools”, and continue to build new university campuses. In addition, it is necessary to strengthen the influence of domestic education abroad, develop online forms of education, and promote the Russian language as the language of international communication. In this area, the Strategy still requires revision,” Dmitry Afanasyev said.

    Rector of the State University of Management Vladimir Stroyev noted the significant number of GUU graduates at a meeting of the State Council commissions and spoke about the work of the university.

    “The need to change the education system is obvious, but its conservatism can also have its advantages. Until the 1990s, GUU was not a management university, but an engineering and economics university. And we managed to preserve elements of the previous system. Starting in 2022, we are actively reviving the system of training industry managers who understand and know the production base well. For this purpose, GUU is implementing a system of seamless project-based learning. The structure of the university includes the Pre-University – a budget school where, in addition to studying general subjects, students begin to get used to practice-oriented learning. GUU is probably the only university in the country where project-based learning is practiced in 100% of areas of education, starting from the 1st year, which by the end of the study leads to a high level of graduate employment. In addition, we do not forget about the meanings – we are a leading university in the field of educational work, we support student families, and we encourage employees to have children. Our task is not only to raise a competent manager, but also to educate him as a responsible citizen who works for the benefit of the state and society,” said Vladimir Stroyev.

    In addition, the rector of the State University of Management introduced the meeting participants to the scientific and technical achievements of the university, in particular, to the system of work of the inter-university design bureau, and invited those interested to take a tour of the university.

    The meeting was also attended by: Deputy Head of the Secretariat of the Deputy Prime Minister of the Russian Government Antony Shvindt, Director of the Department of Personnel Policy of the Ministry of Education and Science of the Russian Federation Alexey Svistunov, Deputy Governor of the Kaluga Region Tatyana Leonova, Deputy Head of the Federal Service for Supervision in Education and Science Evgeny Semchenko and many other experts.

    Summing up the panel discussion, the Chairman of the State Council of the Russian Federation Commission on Personnel Vladislav Shapsha particularly highlighted the topic raised by many speakers about the key role of education within the Education Development Strategy. “You can teach a lot, but if a person does not have a moral core, then his technical skills can be harmful. The Russian person has always been spiritual. You cannot understand Russia with your mind, you cannot measure it with a common yardstick…”, Vladislav Valerievich concluded the meeting of the State Council commissions with a quote from a poem by Fyodor Tyutchev.

    After the end of the panel discussion, the participants of the meeting of the State Council commissions were given a tour of the State University of Management, as promised by the rector. In addition to the experts, the moderator of the discussion, Ernest Matskyavichyus, did not miss this opportunity.

    The guests were shown the new workshop of the student design bureau “Innovative Solutions”, the Engineering Project Management Center and the Media Center of the State University of Management. Antoniy Shvindt paid special attention to the scientific and technical developments of the State University of Management. Aleksey Svistunov appreciated the comfort and equipment of the premises. Ernest Matskyavichyus, naturally, was most interested in the studios, and Tatyana Leonova even proposed a project for a series of short educational videos on the topic of management science.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI: Paritii Joins Google.org’s 2025 Generative AI Accelerator to Transform Student Support with AI-Driven Workflows

    Source: GlobeNewswire (MIL-OSI)

    Paritii, creator of Swyft, is now backed by Google.org as part of the 2025 Generative AI Accelerator. Swyft utilizes generative AI to automate higher education workflows, offering personalized student support 24/7 and enabling staff to focus on high-value tasks, targeting 2 million students.

    Photo Courtesy of Paritii

    LONDON, July 01, 2025 (GLOBE NEWSWIRE) — Paritii, an EdTech leader in generative AI for higher education, has joined the 2025 Google.org Generative AI Accelerator. This recognition highlights Paritii’s work transforming student experience through its AI-powered Swyft platform, automating administrative processes, and delivering on-demand student support.

    Our commitment to social impact is recognized and trusted by our community. Based on that trust, we are honored to receive this backing from Google.org as we continue this vital work,” said Dr. Shmona Simpson, CEO of Paritii.

    Administrative burdens at underfunded colleges reduce retention, satisfaction, and graduation rates due to inefficient systems and overwhelmed advisors, especially for students with historically poor outcomes.

    Paritii’s Swyft platform automates high-volume administrative tasks, allowing staff to focus on impactful student interactions. Leveraging a proprietary frontend API and a retrieval-augmented generation (RAG) enabled large language model (LLM), Swyft processes millions of data points to streamline document workflows and support requests.

    Swyft combines generative AI with a tailored backend to deliver precision, speed, and personalized support. Students access a 24/7 AI-powered workspace to manage tasks, get guidance, and generate documents.

    The solution is poised to reach over 2 million students in the next two years, transforming how institutions serve learners at scale.

    According to Paritii, Swyft has already demonstrated transformative potential with quantifiable impact and outcomes.

    • 85% reduction in administrative processing times across partner institutions.
    • Serve 200,000 students by the end of the accelerator and 2M students in two years
    • 90% student satisfaction and a 60% reduction in document-related queries.
    • 15% increase in student retention rates through faster, more equitable support.

    This opportunity helps to affirm Paritii’s bold approach to using generative AI for systemic change, spotlighting Swyft as a model for equitable innovation and empowering the team to reimagine student support across the higher education landscape.

    The Google.org Generative AI Accelerator offers over $30 million in funding and support, plus access to Google’s AI experts and Cloud tools. This partnership will help Paritii expand Swyft’s capabilities and advance its mission to improve student outcomes across higher education at scale.

    About Paritii

    Paritii is an innovation firm at the forefront of ethical AI, specializing in inclusive technology solutions for education, medicine, and public systems. Since 2020, Paritii has partnered with over 50 institutions to design tools that are as responsible as they are effective. Flagship platforms like Swyft and SwyftRFP reflect Paritii’s mission: to expand access, reduce disparities, and make systems work better for the people they serve. From streamlining student support to reimagining procurement, Paritii is building a future where technology works for everyone.

    Contact Information:

    Contact Person’s Name: Griselle Colon
    Organization / Company: Paritii
    Company website: www.paritii.com
    Contact Email Address: griselle@paritii.com
    City, State / Province, Country: Spokane, Washington, USA

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/3def36a2-90a0-4d8d-801f-860aacae112d

    The MIL Network

  • MIL-OSI Economics: We’re teaming up with the Premier League to bring one billion-plus fans closer than ever to the game they love.

    Source: Microsoft

    Headline: We’re teaming up with the Premier League to bring one billion-plus fans closer than ever to the game they love.

    The Premier League is entering a new era, powered by Microsoft. As the Official Cloud and AI Partner of the Premier League, we’re helping the world’s most-watched football league unlock new value on and off the pitch. With one intelligent platform powering everything from fan experiences to organizational productivity, this partnership is redefining what’s possible. https://msft.it/6002SFRcO

    MIL OSI Economics

  • MIL-OSI Economics: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Source: Microsoft

    Headline: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Since 2024, Microsoft Threat Intelligence has observed remote information technology (IT) workers deployed by North Korea leveraging AI to improve the scale and sophistication of their operations, steal data, and generate revenue for the Democratic People’s Republic of Korea (DPRK). Among the changes noted in the North Korean remote IT worker tactics, techniques, and procedures (TTPs) include the use of AI tools to replace images in stolen employment and identity documents and enhance North Korean IT worker photos to make them appear more professional. We’ve also observed that they’ve been utilizing voice-changing software.

    North Korea has deployed thousands of remote IT workers to assume jobs in software and web development as part of a revenue generation scheme for the North Korean government. These highly skilled workers are most often located in North Korea, China, and Russia, and use tools such as virtual private networks (VPNs) and remote monitoring and management (RMM) tools together with witting accomplices to conceal their locations and identities.

    Historically, North Korea’s fraudulent remote worker scheme has focused on targeting United States (US) companies in the technology, critical manufacturing, and transportation sectors. However, we’ve observed North Korean remote workers evolving to broaden their scope to target various industries globally that offer technology-related roles. Since 2020, the US government and cybersecurity community have identified thousands of North Korean workers infiltrating companies across various industries.

    Organizations can protect themselves from this threat by implementing stricter pre-employment vetting measures and creating policies to block unapproved IT management tools. For example, when evaluating potential employees, employers and recruiters should ensure that the candidates’ social media and professional accounts are unique and verify their contact information and digital footprint. Organizations should also be particularly cautious with staffing company employees, check for consistency in resumes, and use video calls to confirm a worker’s identity.

    Microsoft Threat Intelligence tracks North Korean IT remote worker activity as Jasper Sleet (formerly known as Storm-0287). We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet. To disrupt this activity and protect our customers, we’ve suspended 3,000 known Microsoft consumer accounts (Outlook/Hotmail) created by North Korean IT workers. We have also implemented several detections to alert our customers of this activity through Microsoft Entra ID Protection and Microsoft Defender XDR as noted at the end of this blog. As with any observed nation-state threat actor activity, Microsoft has directly notified targeted or compromised customers, providing them with important information needed to secure their environments. As we continue to observe more attempts by threat actors to leverage AI, not only do we report on them, but we also have principles in place to take action against them.

    This blog provides additional information on the North Korean remote IT worker operations we published previously, including Jasper Sleet’s usual TTPs to secure employment, such as using fraudulent identities and facilitators. We also provide recent observations regarding their use of AI tools. Finally, we share detailed guidance on how to investigate, monitor, and remediate possible North Korean remote IT worker activity, as well as detections and hunting capabilities to surface this threat.

    From North Korea to the world: The remote IT workforce

    Since at least early 2020, Microsoft has tracked a global operation conducted by North Korea in which skilled IT workers apply for remote job opportunities to generate revenue and support state interests. These workers present themselves as foreign (non-North Korean) or domestic-based teleworkers and use a variety of fraudulent means to bypass employment verification controls.

    North Korea’s fraudulent remote worker scheme has since evolved, establishing itself as a well-developed operation that has allowed North Korean remote workers to infiltrate technology-related roles across various industries. In some cases, victim organizations have even reported that remote IT workers were some of their most talented employees. Historically, this operation has focused on applying for IT, software development, and administrator positions in the technology sector. Such positions provide North Korean threat actors access to highly sensitive information to conduct information theft and extortion, among other operations.

    North Korean IT workers are a multifaceted threat because not only do they generate revenue for the North Korean regime, which violates international sanctions, they also use their access to steal sensitive intellectual property, source code, or trade secrets. In some cases, these North Korean workers even extort their employer into paying them in exchange for not publicly disclosing the company’s data.

    Between 2020 and 2022, the US government found that over 300 US companies in multiple industries, including several Fortune 500 companies, had unknowingly employed these workers, indicating the magnitude of this threat. The workers also attempted to gain access to information at two government agencies. Since then, the cybersecurity community has continued to detect thousands of North Korean workers. On January 3, 2025, the Justice Department released an indictment identifying two North Korean nationals and three facilitators responsible for conducting fraudulent work between 2018 and 2024. The indicted individuals generated a revenue of at least US$866,255 from only ten of the at least 64 infiltrated US companies.

    North Korean threat actors are evolving across the threat landscape to incorporate more sophisticated tactics and tools to conduct malicious employment-related activity, including the use of custom and AI-enabled software.

    Tactics and techniques

    The tactics and techniques employed by North Korean remote IT workers involve a sophisticated ecosystem of crafting fake personas, performing remote work, and securing payments. North Korean IT workers apply for remote roles, in various sectors, at organizations across the globe.

    They create, rent, or procure stolen identities that match the geo-location of their target organizations (for example, they would establish a US-based identity to apply for roles at US-based companies), create email accounts and social media profiles, and establish legitimacy through fake portfolios and profiles on developer platforms like GitHub and LinkedIn. Additionally, they leverage AI tools to enhance their operations, including image creation and voice-changing software. Facilitators play a crucial role in validating fraudulent identities and managing logistics, such as forwarding company hardware and creating accounts on freelance job websites. To evade detection, these workers use VPNs, virtual private servers (VPSs), and proxy services as well as RMM tools to connect to a device housed at a facilitator’s laptop farm located in the country of the job.

    Figure 1. The North Korean IT worker ecosystem

    Crafting fake personas and profiles

    The North Korean remote IT worker fraud scheme begins with the procurement of identities for the workers. These identities, which can be stolen or “rented” from witting individuals, include names, national identification numbers, and dates of birth. The workers might also leverage services that generate fraudulent identities, complete with seemingly legitimate documentation, to fabricate their personas. They then create email accounts and social media pages they use to apply for jobs, often indirectly through staffing or contracting companies. They also apply for freelance opportunities through freelancer sites as an additional avenue for revenue generation. Notably, they often use the same names/profiles repeatedly rather than creating unique personas for each successful infiltration.

    Additionally, the North Korean IT workers have used fake profiles on LinkedIn to communicate with recruiters and apply for jobs.

    Figure 2. An example of a North Korean IT worker LinkedIn profile that has since been taken down.

    The workers tailor their fake resumes and profiles to match the requirements for specific remote IT positions, thus increasing their chances of getting selected. Over time, we’ve observed these fake resumes and employee documents noticeably improving in quality, now appearing more polished and lacking grammatical errors facilitated by AI.

    After creating their fake personas, the North Korean IT workers then attempt to establish legitimacy by creating digital footprints for these fake personas. They typically leverage communication, networking, and developer platforms, (for example, GitHub) to showcase their supposed portfolio of previous work samples:

    Figure 3. Example profile used by a North Korean IT worker that has since been taken down.

    Using AI to improve operations

    Microsoft Threat intelligence has observed North Korean remote IT workers leveraging AI to improve the quantity and quality of their operations. For example, in October 2024, we found a public repository containing actual and AI-enhanced images of suspected North Korean IT workers:

    Figure 4. Photos of potential North Korean IT workers

    The repository also contained the resumes and email accounts used by the said workers, along with the following tools and resources they can use to secure employment and to do their work:

    • VPS and VPN accounts, along with specific VPS IP addresses
    • Playbooks on conducting identity theft and creating and bidding jobs on freelancer websites
    • Wallet information and suspected payments made to facilitators
    • LinkedIn, GitHub, Upwork, TeamViewer, Telegram, and Skype accounts
    • Tracking sheet of work performed, and payments received by the IT workers

    Image creation

    Based on our review of the repository mentioned previously, North Korean IT workers appear to conduct identity theft and then use AI tools like Faceswap to move their pictures over to the stolen employment and identity documents. The attackers also use these AI tools to take pictures of the workers and move them to more professional looking settings. The workers then use these AI-generated pictures on one or more resumes or profiles when applying for jobs.

    Figure 5. Use of AI apps to modify photos used for North Korean IT workers’ resumes and profiles
    Figure 6. Examples of resumes for North Korean IT workers. These two resumes use different versions of the same photo.

    Communications

    Microsoft Threat Intelligence has observed that North Korean IT workers are also experimenting with other AI technologies such as voice-changing software. While we haven’t observed threat actors using combined AI voice and video products as a tactic first hand, we do recognize that combining these technologies could allow future threat actor campaigns to trick interviewers into thinking they aren’t communicating with a North Korean IT worker. If successful, this tactic could allow the North Korean IT workers to do interviews directly and no longer rely on facilitators standing in for them on interviews or selling them account access.

    Facilitators for initial access

    North Korean Remote IT workers require assistance from a witting facilitator to help find jobs, pass the employment verification process, and once hired, successfully work remotely. We’ve observed Jasper Sleet advertising job opportunities for facilitator roles under the guise of partnering with a remote job candidate to help secure an IT role in a competitive market:

    Figure 7. Example of a job opportunity for a facilitator role

    The IT workers may have the facilitators assist in creating accounts on remote and freelance job websites. They might also ask the facilitator to perform the following tasks as their relationship builds:

    • Create a bank account for the North Korean IT worker, or lend their (the facilitator’s) own account to the worker
    • Purchase mobile phone numbers or SIM cards

    During the employment verification process, the witting accomplice helps the North Korean IT workers validate the latter’s fraudulent identities using online background check service providers. The documents submitted by the workers include fake or stolen drivers’ licenses, social security cards, passports, and permanent resident identification cards. Workers train using interview scripts, which include a justification for why the employee must work remotely.

    Once hired, the remote workers direct company laptops and hardware to be sent to the address of the accomplice. The accomplice then either runs a laptop farm that provides the laptops with an internet connection at the geo-location of the role or forwards the items internationally. For hardware that remain in the country of the role, the accomplice signs into the computers and installs software that enables the workers to connect remotely. Remote IT workers might also access devices remotely using IP-based KVM devices, like PiKVM or TinyPilot.

    Defense evasion and persistence

    To conceal their physical location as well as maintain persistence and blend into the target organization’s environment, the workers typically use VPNs (particularly Astrill VPN), VPSs, proxy services, and RMM tools. Microsoft Threat Intelligence has observed the persistent use of JumpConnect, TinyPilot, Rust Desk, TeamViewer, AnyViewer, and Anydesk. When an in-person presence or face-to-face meeting is required, for example to confirm banking information or attend a meeting, the workers have been known to pay accomplices to stand in for them. When possible, however, the workers eliminate all face-to-face contact, offering fraudulent excuses for why they are not on camera during video teleconferencing calls or speaking.

    Attribution

    Microsoft Threat Intelligence uses the name Jasper Sleet (formerly known as Storm-0287) to represent activity associated with North Korean’s remote IT worker program. These workers are primarily focused on revenue generation, use remote access tools, and likely fall under a particular leadership structure in North Korea. We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet.

    How Microsoft disrupts North Korean remote IT worker operations with machine learning

    Microsoft has successfully scaled analyst tradecraft to accelerate the identification and disruption of North Korean IT workers in customer environments by developing a custom machine learning solution. This has been achieved by leveraging Microsoft’s existing threat intelligence and weak signals generated by monitoring for many of the red flags listed in this blog, among others. For example, this solution uses impossible time travel risk detections, most commonly between a Western nation and China or Russia. The machine learning workflow uses these features to surface suspect accounts most likely to be North Korean IT workers for assessment by Microsoft Threat Intelligence analysts.

    Once Microsoft Threat Intelligence reviews and confirms that an account is indeed associated with a North Korean IT worker, customers are then notified with a Microsoft Entra ID Protection risk detection warning of a risky sign-in based on Microsoft’s threat intelligence. Microsoft Defender XDR customers also receive the alert Sign-in activity by a suspected North Korean entity in the Microsoft Defender portal.

    Defending against North Korean remote IT worker infiltration

    Defending against the threats from North Korean remote IT workers involves a threefold strategy:

    • Ensuring a proper vetting approach is in place for freelance workers and vendors
    • Monitoring for anomalous user activity
    • Responding to suspected Jasper Sleet signals in close coordination with your insider risk team

    Investigate

    How can you identify a North Korean remote IT worker in the hiring process?

    To protect your organization against a potential North Korean insider threat, it is important for your organization to prioritize a process for verifying employees to identify potential risks. The following can be used to assess potential employees:

    • Confirm the potential employee has a digital footprint and look for signs of authenticity. This includes a real phone number (not VoIP), a residential address, and social media accounts. Ensure the potential employee’s social media/professional accounts are not highly similar to the accounts of other individuals. In addition, check that the contact phone number listed on the potential employee’s account is unique and not also used by other accounts.
    • Scrutinize resumes and background checks for consistency of names, addresses, and dates. Consider contacting references by phone or video-teleconference rather than email only.
    • Exercise greater scrutiny for employees of staffing companies, since this is the easiest avenue for North Korean workers to infiltrate target companies.
    • Search whether a potential employee is employed at multiple companies using the same persona.
    • Ensure the potential employee is seen on camera during multiple video telecommunication sessions. If the potential employee reports video and/or microphone issues that prohibit participation, this should be considered a red flag.
    • During video verification, request individuals to physically hold driver’s licenses, passports, or identity documents up to camera.
    • Keep records, including recordings of video interviews, of all interactions with potential employees.
    • Require notarized proof of identity.

    Monitor

    How can your organization prevent falling victim to the North Korean remote IT worker technique?

    To prevent the risks associated with North Korean insider threats, it’s vital to monitor for activity typically associated with this fraudulent scheme.

    Monitor for identifiable characteristics of North Korean remote workers

    Microsoft has identified the following characteristics of a North Korean remote worker. Note that not all the criteria are necessarily required, and further, a positive identification of a remote worker doesn’t guarantee that the worker is North Korean.

    • The employee lists a Chinese phone number on social media accounts that is used by other accounts.
    • The worker’s work-issued laptop authenticates from an IP address of a known North Korean IT worker laptop farm, or from foreign—most commonly Chinese or Russian—IP addresses even though the worker is supposed to have a different work location.
    • The worker is employed at multiple companies using the same persona. Employees of staffing companies require heightened scrutiny, given this is the easiest way for North Korean workers to infiltrate target companies.
    • Once a laptop is issued to the worker, RMM software is immediately downloaded onto it and used in combination with a VPN.
    • The worker has never been seen on camera during a video telecommunication session or is only seen a few times. The worker may also report video and/or microphone issues that prohibit participation from the start.
    • The worker’s online activity doesn’t align with routine co-worker hours, with limited engagement across approved communication platforms.

    Monitor for activity associated with Jasper Sleet access

    • If RMM tools are used in your environment, enforce security settings where possible, to implement MFA:
      • If an unapproved installation is discovered, reset passwords for accounts used to install the RMM services. If a system-level account was used to install the software, further investigation may be warranted.
    • Monitor for impossible travel—for example, a supposedly US-based employee signing in from China or Russia.
    • Monitor for use of public VPNs such as Astrill. For example, IP addresses associated with VPNs known to be used by Jasper Sleet can be added to Sentinel watchlists. Or, Microsoft Defender for Identity can integrate with your VPN solution to provide more information about user activity, such as extra detection for abnormal VPN connections.
    • Monitor for signals of insider threats in your environment. Microsoft Purview Insider Risk Management can help identify potentially malicious or inadvertent insider risks.
    • Monitor for consistent user activity outside of typical working hours.

    Remediate

    What are the next steps if you positively identify a North Korean remote IT worker employed at your company?

    Because Jasper Sleet activity follows legitimate job offers and authorized access, Microsoft recommends approaching confirmed or suspected Jasper Sleet intrusions with an insider risk approach using your organization’s insider risk response plan or incident response provider like Microsoft Incident Response. Some steps might include:

    • Restrict response efforts to a small, trusted insider risk working group, trained in operational security (OPSEC) to avoid tipping off subjects and potential collaborators.
    • Rapidly evaluate the subject’s proximity to critical assets, such as:
      • Leadership or sensitive teams
      • Direct reports or vendor staff the subject has influence over
      • Suppliers or vendors
      • People/non-people accounts, production/pre-production environments, shared accounts, security groups, third-party accounts, security groups, distribution groups, data clusters, and more
    • Conduct preliminary link analysis to:
      • Detect relationships with potential collaborators, supporters, or other potential aliases operated by the same actor
      • Identify shared indicators (for example, shared IP addresses, behavioral overlap)
      • Avoid premature action that might alert other Jasper Sleet operators
    • Conduct a risk-based prioritization of efforts, informed by:
      • Placement and access to critical assets (not necessarily where you identified them)
      • Stakeholder insight from potentially impacted business units
      • Business impact considerations of containment (which might support additional collection/analysis) or mitigation (for example, eviction)
    • Conduct open-source intelligence (OSINT) collection and analysis to:
      • Determine if the identity associated with the threat actor is associated with a real person. For example, North Korean IT workers have leveraged stolen identities of real US persons to facilitate their fraud. Conduct OSINT on all available personally identifiable information (PII) provided by the actor (name, date of birth, SSN, home of record, phone number, emergency contact, and others) and determine if these items are linked to additional North Korean actors, and/or real persons’ identities.
      • Gather all known external accounts operated by the alias/persona (for example, LinkedIn, GitHub, freelance working sites, bug bounty programs).
      • Perform analysis on account images using open-source tools such as FaceForensics++ to determine prevalence of AI-generated content. Detection opportunities within video and imagery include: 
        • Temporal consistency issues: Rapid movements cause noticeable artifacts in video deepfakes as the tracking system struggles to maintain accurate landmark positioning. 
        • Occlusion handling: When objects pass over the AI-generated content such as the face, deepfake systems tend to fail at properly reconstructing the partially obscured face.
        • Lighting adaptation: Changes in lighting conditions might reveal inconsistencies in the rendering of the face
        • Audio-visual synchronization: Slight delays between lip movements and speech are detectable under careful observation
          • Exaggerated facial expressions. 
          • Duplicative or improperly placed appendages.
          • Pixelation or tearing at edges of face, eyes, ears, and glasses.
    • Engage counterintelligence or insider risk/threat teams to:
      • Understand tradecraft and likely next steps
      • Gain national-level threat context, if applicable
    • Make incremental, risk-based investigative and response decisions with the support of your insider threat working group and your insider threat stakeholder group; one providing tactical feedback and the other providing risk tolerance feedback.
    • Preserve evidence and document findings.
    • Share lessons learned and increase awareness.
    • Educate employees on the risks associated with insider threats and provide regular security training for employees to recognize and respond to threats, including a section on the unique threat posed by North Korean IT workers.

    After an insider risk response to Jasper Sleet, it might be necessary to also conduct a thorough forensic investigation of all systems that the employee had access to for indicators of persistence, such as RMM tools or system/resource modifications.

    For additional resources, refer to CISA’s Insider Threat Mitigation Guide. If you suspect your organization is being targeted by nation-state cyber activity, report it to the appropriate national authority. For US-based organizations, the Federal Bureau of Investigation (FBI) recommends reporting North Korean remote IT worker activity to the Internet Crime Complaint Center (IC3).

    Microsoft Defender XDR detections

    Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, apps to provide integrated protection against attacks like the threat discussed in this blog.

    Customers with provisioned access can also use Microsoft Security Copilot in Microsoft Defender to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.

    Microsoft Defender XDR

    Alerts with the following titles in the security center can indicate threat activity on your network:

    • Sign-in activity by a suspected North Korean entity

    Microsoft Defender for Endpoint

    Alerts with the following titles in the security center can indicate Jasper Sleet RMM activity on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Suspicious usage of remote management software
    • Suspicious connection to remote access software

    Microsoft Defender for Identity

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Atypical travel
    • Suspicious behavior: Impossible travel activity

    Microsoft EntraID Protection

    Microsoft Entra ID Protection risk detections inform Entra ID user risk events and can indicate associated threat activity, including unusual user activity consistent with known patterns identified by Microsoft Threat Intelligence research. Note, however, that these alerts can be also triggered by unrelated threat activity.

    • Microsoft Entra threat intelligence (sign-in): (RiskEventType: investigationsThreatIntelligence)

    Microsoft Defender for Cloud Apps

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Impossible travel activity

    Microsoft Security Copilot

    Security Copilot customers can use the standalone experience to create their own prompts or run the following pre-built promptbooks to automate incident response or investigation tasks related to this threat:

    • Incident investigation
    • Microsoft User analysis
    • Threat actor profile

    Note that some promptbooks require access to plugins for Microsoft products such as Microsoft Defender XDR or Microsoft Sentinel.

    Hunting queries

    Microsoft Defender XDR

    Because organizations might have legitimate and frequent uses for RMM software, we recommend using the Microsoft Defender XDR advanced hunting queries available on GitHub to locate RMM software that hasn’t been endorsed by your organization for further investigation. In some cases, these results might include benign activity from legitimate users. Regardless of use case, all newly installed RMM instances should be scrutinized and investigated.

    If any queries have high fidelity for discovering unsanctioned RMM instances in your environment, and don’t detect benign activity, you can create a custom detection rule from the advanced hunting query in the Microsoft Defender portal. 

    Microsoft Sentinel

    The alert Insider Risk Sensitive Data Access Outside Organizational Geo-locationjoins Azure Information Protection logs (InformationProtectionLogs_CL) with Microsoft Entra ID sign-in logs (SigninLogs) to provide a correlation of sensitive data access by geo-location. Results include:

    • User principal name
    • Label name
    • Activity
    • City
    • State
    • Country/Region
    • Time generated

    The recommended configuration is to include (or exclude) sign-in geo-locations (city, state, country and/or region) for trusted organizational locations. There is an option for configuration of correlations against Microsoft Sentinel watchlists. Accessing sensitive data from a new or unauthorized geo-location warrants further review.

    References

    Acknowledgments

    For more information on North Korean remote IT worker operations, we recommend reviewing DTEX’s in-depth analysis in the report Exposing DPRK’s Cyber Syndicate and IT Workforce.

    Learn more

    Meet the experts behind Microsoft Threat Intelligence, Incident Response, and the Microsoft Security Response Center at our VIP Mixer at Black Hat 2025. Discover how our end-to-end platform can help you strengthen resilience and elevate your security posture.

    For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog. 

    To get notified about new publications and to join discussions on social media, follow us on LinkedIn, X (formerly Twitter), and Bluesky. 

    To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast. 

    MIL OSI Economics

  • MIL-OSI USA: Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes

    Source: US State of North Dakota

    Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers

    The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.

    According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.

    As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.

    “These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”

    “North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”

    “North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”

    Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts

    Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme. 

    “The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”

    According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).

    Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.

    IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files  containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.

    Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.

    Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.

    The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.

    Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.

    Kim Kwang Jin et al. Indictment – Northern District of Georgia

    Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.

    “The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”

    According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

    After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

    To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.

    The FBI Atlanta Field Office is investigating the case.

    Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.

    21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District

    Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.

    Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.

    ***

    The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.

    As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.

    Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.

    The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.

    The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI USA: Justice Department Requires Divestitures and Licensing Commitments in HPE’s Acquisition of Juniper Networks

    Source: US State of California

    WASHINGTON — Achieving a result otherwise unavailable through litigation, earlier today the Justice Department advised the court it had reached a settlement with HPE and Juniper that allows their merger to continue. This novel approach by the Justice Department reflects a commitment to solving unique challenges in mergers. Under the leadership of Attorney General Pam Bondi the laws of this country will be zealously enforced.

    “Thank you to the hardworking men and women of the Antitrust Division for their work on this case.” — Gail Slater, Assistant Attorney General for the Antitrust Divison

    “This marks another key legal victory from the Department of Justice’s Antitrust division. Our attorneys will continue fighting and winning to defend the American people and consumers.” — Department of Justice Chief of Staff Chad Mizelle

    The settlement requires HPE to divest its Instant On business and mandates that the merged firm license critical Juniper software to independent competitors. HPE must divest its global “Instant On” campus and branch WLAN business, including all assets, intellectual property, R&D personnel, and customer relationships, to a DOJ-approved buyer within 180 days. The agreement also ensures that key software assets will be available to rivals looking to compete with the merged company. The parties must hold an auction to license Juniper’s AI Ops for Mist source code—an important component in modern WLAN systems. The license will be perpetual, non-exclusive, and include optional transitional support and personnel transfers to facilitate competition.

    MIL OSI USA News

  • MIL-OSI USA: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: US State of California

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: Orlando Man Indicted for Making Online Threats Against the United States Attorney for the District of New Jersey

    Source: US FBI

    Orlando, Florida – United States Attorney Gregory W. Kehoe announces the  unsealing of an indictment charging Salvatore Russotto (58, Orlando) with threatening to injure and kill the victim, the United States Attorney for the District of New Jersey, Alina Habba, and with retaliating against a federal law enforcement officer by threat. If convicted on both counts, Russotto faces a maximum penalty of 10 years in federal prison. 

    According to the indictment, on May 19, 2025, Russotto made a threat to injure and kill the victim in a series of postings from an online account belonging to him. Specifically, Russotto stated, among other things, “A slow painful death for HABBA,” “Eliminate HABBA. 86 Traitor. Death penalty for all traitors,” “I HOPE YOU DIE A PAINFUL DEATH,” a true threat of violence.

    An indictment is merely a formal charge that a defendant has committed one or more violations of federal criminal law, and every defendant is presumed innocent unless, and until, proven guilty.

    This case was investigated by the Federal Bureau of Investigation – Newark, Jersey and Tampa, Florida Field Offices – and the United States Marshals Service. It will be prosecuted by Assistant United States Attorney Kara Wick.

    MIL Security OSI

  • MIL-OSI Security: Justice Department Requires Divestitures and Licensing Commitments in HPE’s Acquisition of Juniper Networks

    Source: United States Attorneys General

    WASHINGTON — Achieving a result otherwise unavailable through litigation, earlier today the Justice Department advised the court it had reached a settlement with HPE and Juniper that allows their merger to continue. This novel approach by the Justice Department reflects a commitment to solving unique challenges in mergers. Under the leadership of Attorney General Pam Bondi the laws of this country will be zealously enforced.

    “Thank you to the hardworking men and women of the Antitrust Division for their work on this case.” — Gail Slater, Assistant Attorney General for the Antitrust Divison

    “This marks another key legal victory from the Department of Justice’s Antitrust division. Our attorneys will continue fighting and winning to defend the American people and consumers.” — Department of Justice Chief of Staff Chad Mizelle

    The settlement requires HPE to divest its Instant On business and mandates that the merged firm license critical Juniper software to independent competitors. HPE must divest its global “Instant On” campus and branch WLAN business, including all assets, intellectual property, R&D personnel, and customer relationships, to a DOJ-approved buyer within 180 days. The agreement also ensures that key software assets will be available to rivals looking to compete with the merged company. The parties must hold an auction to license Juniper’s AI Ops for Mist source code—an important component in modern WLAN systems. The license will be perpetual, non-exclusive, and include optional transitional support and personnel transfers to facilitate competition.

    MIL Security OSI

  • MIL-OSI Security: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: United States Attorneys General

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: United States Attorneys General

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes

    Source: United States Attorneys General

    Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers

    The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.

    According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.

    As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.

    “These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”

    “North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”

    “North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”

    Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts

    Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme. 

    “The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”

    According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).

    Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.

    IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files  containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.

    Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.

    Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.

    The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.

    Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.

    Kim Kwang Jin et al. Indictment – Northern District of Georgia

    Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.

    “The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”

    According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

    After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

    To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.

    The FBI Atlanta Field Office is investigating the case.

    Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.

    21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District

    Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.

    Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.

    ***

    The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.

    As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.

    Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.

    The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.

    The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Banking: RBI appoints Shri Kesavan Ramachandran as new Executive Director

    Source: Reserve Bank of India

    The Reserve Bank of India (RBI) has appointed Shri Kesavan Ramachandran as Executive Director (ED) with effect from July 01, 2025.

    Prior to being promoted as ED, Shri Kesavan Ramachandran was serving as Principal Chief General Manager in Risk Monitoring Department.

    Shri Kesavan Ramachandran has experience of over three decades in areas relating to currency management, Banking and Non-Banking supervision, training and administration. He also served as Principal of the Reserve Bank Staff College during his career. He served as, RBI’s nominee on the Board of Canara Bank for over five years and on the Auditing and Assurance Standards Board of ICAI for two years.

    As Executive Director, Shri Kesavan Ramachandran will look after Department of Regulation (Prudential Regulation Division).

    Shri Kesavan Ramachandran is a post-graduate with an MBA in Banking and Finance and holds a diploma in International Financial Reporting from ACCA, UK. He is also a Certified Associate of the IIBF.

    (Puneet Pancholy)  
    Chief General Manager

    Press Release: 2025-2026/639

    MIL OSI Global Banks

  • MIL-OSI: Combined General Meeting of July 22, 2025 Conditions for Obtaining the Preparatory Documents

    Source: GlobeNewswire (MIL-OSI)

    COMBINED GENERAL MEETING
    OF JULY 22, 2025

    CONDITIONS FOR OBTAINING THE PREPARATORY DOCUMENTS

    Bernin (Grenoble), France, on July 1, 2025 – Soitec (Euronext Paris) reminds that the Company’s shareholders are invited to attend the Annual General Meeting to be held on Tuesday July 22, 2025 at 9:30 a.m. (Paris time), in the Auditorium of the VERSO conference Center located at 52 rue de la Victoire, 75009 Paris, France.

    The preliminary meeting notice serving as convening notice as provided for in Article R. 225-73 of the French Commercial Code, including the agenda and the draft resolutions to be submitted to the shareholders’ vote during this Annual General Meeting as well as the information on how to attend and vote at the Annual General Meeting, has been published in the French legal gazette (Bulletin des Annonces Légales Obligatoires (BALO)) of June 13, 2025, bulletin No 71.

    The convening notice for this Annual General Meeting will be published in the French legal gazette “Les Affiches de Grenoble et du Dauphiné” on July 4, 2025.

    All the documents related to this Annual General Meeting are available on the Company’s website (www.soitec.com), in the section Investors/Shareholders & Analysts/Shareholders’ General Meetings/ 2025 Annual General Meeting, in accordance with laws and regulations in force.

    In accordance with article R. 225-88 of the French Commercial Code, shareholders may also obtain the documents provided for in articles R. 225-81 and R. 225-83 of the French Commercial Code, on written request made no later than five days before the date of the General Meeting, i.e. no later than Thursday July 17, 2025. This request shall be sent to the Company’s registered office by post, to the attention of the General Secretary, “AG 22 juillet 2025” Parc Technologique des Fontaines – Chemin des Franques – 38190 Bernin – France, or by e-mail to the following address: shareholders-gm@soitec.com. Requests from bearer shareholders must be accompanied by a shareholding certificate delivered by their financial intermediary mentioned in Article L. 211-3 of the French Monetary and Financial Code.
        
    Shareholders are invited to consult regularly the section dedicated to the 2025 Annual General Meeting on the Company’s website.

    This General Meeting will be broadcast live on Soitec’s website and will also be available for replay.

    # # #

     

    Agenda

    First-quarter 2025-2026 revenue: July 22, 2025, after market close.

    # # #

    About Soitec

    Soitec (Euronext – Tech 40 Paris), a world leader in innovative semiconductor materials, has for more than 30 years developed cutting-edge products that combine technological performance and energy efficiency. From its global headquarters in France, Soitec is expanding internationally with its unique solutions. The company occupies a key position in the semiconductor value chain, serving three strategic markets: mobile communications, automotive and industry, and smart devices. Soitec draws on the talent and diversity of its 2,300 employees, of 50 different nationalities, across its sites in Europe, the United States and Asia. More than 4,100 patents have been registered by Soitec.

    Soitec, SmartSiC™ and Smart Cut™ are registered trademarks of Soitec.

    For more information: https://www.soitec.com/en/

    # # #

                             

    Investor Relations: Media contacts:

    Attachment

    The MIL Network

  • MIL-OSI: eXp Realty selects Cloze’s AI-powered real estate platform for CRM of Choice program

    Source: GlobeNewswire (MIL-OSI)

    WELLESLEY, Mass., July 01, 2025 (GLOBE NEWSWIRE) — Cloze, the AI-powered real estate platform for sphere selling, today announced its inclusion in eXp Realty’s new CRM of Choice program. Beginning today, eXp Realty agents across the U.S., Canada, and Puerto Rico will be able to select Cloze as their preferred CRM — at no additional cost — as part of their monthly tech package.

    According to the National Association of Realtors (NAR), the typical REALTOR® earned 41% of their business through referrals and repeat clients, with high-performing agents often seeing a much higher percentage. Yet, 88% of the people an agent interacts with never make it into their CRM. Cloze is the only CRM that tracks calls and texts automatically from an agent’s own phone number, enabling the platform to capture an agent’s entire sphere, not just the 12% that are entered into a traditional CRM. With every communication captured in one place, Cloze’s AI keeps contact info fresh and surfaces relationships—so that agents can capitalize on their entire sphere of influence.

    Designed for agents and teams whose growth is powered by real relationships, Cloze offers agents and team leaders tools that deepen client connections, maximize productivity, and drive repeat and referral business. Cloze uses AI to surface the right outreach and follow-ups—so agents get more from their sphere with less effort—thanks to deep integrations with Canva, SkySlope, eXp Access, and more.

    “CRM of Choice represents a new chapter in how we support our agents’ growth at eXp,” said Kendall Bonner, Vice President, Industry Relations and Strategic Partnerships, eXp Realty. “Cloze’s use of AI to personalize automation and recommendations for relationship-driven selling gives agents a smarter way to turn everyday connections into lasting business.”

    A platform designed around how agents work

    At the heart of Cloze is the Cloze Intelligence Engine, which uses AI to automatically build and maintain each agent’s database by capturing real-world activity — emails, calls, texts, and meetings — without requiring manual data entry. The built-in personal assistant then nudges agents to follow up, surfaces action items from conversations, and helps prioritize the relationships that are most likely to drive future deals.

    Cloze is uniquely designed to help agents make the most of their sphere of influence:

    • Stay organized, automatically—Cloze automatically logs calls, texts, emails, and meetings, pulling in full history, even from the past, to discover warm opportunities
    • Focus on what drives Gross Commission Income (GCI)—Cloze AI reminds agents to reconnect and follow-up, surfacing key action items, deadlines, and milestones, including reaching out to past contacts, so agents hit their goals
    • Simplify and scale personal outreach—With one platform for both personal and automated outreach, agents can seamlessly move between 1:1 messages, automated marketing, and mail-merged mass outreach without switching tools
    • Stay productive while on the go—Cloze’s best-in-class mobile experience through both iOS and Android apps offer full functionality so that agents can run every part of their business from anywhere

    Easy, polished marketing—powered by AI and Canva

    Cloze’s Canva integration provides a one-click experience to create polished, eXp-branded materials — flyers, postcards, videos, social posts, and more — pre-filled with listing details. Agents can customize and send materials directly from within Cloze, ensuring brand consistency without the design hassle.

    In addition, Cloze’s real estate-savvy generative AI can ghostwrite listing descriptions, newsletters, agent bios, one-off emails, and multi-step campaigns — all from a single platform.

    Agents and teams who sell to clients that speak different languages can use Cloze’s multi-lingual marketing, which can automatically detect the language of every client to ensure everyone receives marketing materials in their language of choice, automatically.

    Embedded into the eXp ecosystem

    In addition to Canva, Cloze connects with other tools agents already use, such as eXp-supported systems like SkySlope, Dotloop, Slack, DialSafe, and eXp Access, as well as over 100 additional applications, so that agents can be more productive, all while seamlessly capturing all interactions in one place without manual entry.

    Built to support every agent—solo or on a team

    Cloze is designed to adapt to how agents actually work—whether they’re growing a solo business or working as part of a team. Shared communication history, lead routing, and visibility keep teams coordinated and on track, while personal contacts and conversations stay private by default. Agents get the structure they need without giving up control, and team leaders gain the visibility they need to support performance and accountability.

    “Cloze was built from the ground up to support sphere-based selling — and it’s why agents who use Cloze consistently outperform,” said Dan Foody, CEO and Co-Founder of Cloze. “Our new relationship with eXp Realty will bring these capabilities to even more agents across North America.”

    About Cloze

    Cloze is an AI-powered sales and marketing platform that helps real estate brokerages, agents, and teams strengthen relationships, automate outreach, and manage lead routing. Real estate leaders like Windermere, Baird & Warner, Brown Harris Stevens, and Sotheby’s International Realty use Cloze’s open platform to create a sales and marketing hub that future-proofs their tech stack. By integrating deeply with existing tools, Cloze makes it easy to add, change, or update those tools whenever needed. For more information on Cloze, visit cloze.com.

    Media Relations Contact:
    Cloze, Inc.
    Alex Coté
    press@cloze.com

    About eXp World Holdings, Inc.

    eXp World Holdings, Inc. (Nasdaq: EXPI) (the “Company”) is the holding company for eXp Realty® and SUCCESS® Enterprises. eXp Realty is the largest independent real estate brokerage in the world, with nearly 81,000 agents across 27 countries. As a cloud-based, agent-centric brokerage, eXp Realty provides real estate agents industry-leading commission splits, revenue share, equity ownership opportunities, and a global network that empowers agents to build thriving businesses. For more information about eXp World Holdings, Inc., visit: expworldholdings.com.

    SUCCESS® Enterprises, anchored by SUCCESS® magazine, has been a trusted name in personal and professional development since 1897. As part of the eXp ecosystem, it offers agents access to valuable resources to enhance their skills, grow their businesses, and achieve long-term success. For more information about SUCCESS, visit success.com.

    Media Relations Contact:
    eXp World Holdings, Inc.
    mediarelations@expworldholdings.com

    Investor Relations
    Denise Garcia
    investors@expworldholdings.com

    The MIL Network