Category: Asia

  • MIL-OSI Russia: Kazakhstan Plays Key Role in China-Central Asia Partnership – Chinese Consul General in Almaty

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    Almaty, July 1 (Xinhua) — In an exclusive article for DKnews.kz, Chinese Consul General in Almaty Jiang Wei shared her views on the historic 2nd China-Central Asia Summit in Astana, where the leaders of the six countries opened a new page in centuries-old cooperation. She stressed that Kazakhstan continues to play a key role in deepening Central Asia’s strategic partnership with China.

    As the Consul General noted, an unprecedented level of political mutual trust has been achieved between the parties. According to her, after establishing diplomatic relations, China and the Central Asian countries have built a comprehensive strategic partnership, secured it with numerous documents within the framework of the Belt and Road initiative, and are promoting the concept of a community with a common destiny both at the bilateral and regional levels.

    The Astana Declaration became a symbol of political unity, the diplomat said, adding that in it the parties confirmed their readiness to support each other on key issues, and the declaration itself became a powerful expression of political consensus and a signal of stability in conditions of global uncertainty.

    Jiang Wei also stressed that China and Central Asian countries have achieved impressive results in practical cooperation. “The summit announced that 2025-2026 will be the Years of High-Quality Development of China-Central Asia Cooperation, focusing on six priority areas, such as unimpeded trade, industrial investment, connectivity, green resource management, agricultural modernization, and facilitating people-to-people exchanges,” the consul general noted.

    Speaking about the Action Plan for the high-quality joint construction of the Belt and Road signed by the heads of six states, she noted that this is the first time that China has signed such a document with all the countries in the border region at once.

    “The summit also decided to establish a poverty alleviation center, an educational exchange and cooperation center, a desertification control center, and a platform to create favorable conditions for trade within the China-Central Asia format. These initiatives are aimed at improving the well-being of the Central Asian population, training highly qualified specialists, managing water and natural resources, and promoting high-quality economic development. All this clearly demonstrates the deep meaning of the slogan “promoting joint modernization through high-quality development,” Jiang Wei emphasized.

    The Consul General said that the summit demonstrated a new level of good-neighborliness and friendship. Speaking about the Treaty on Eternal Good-Neighborliness, Friendship and Cooperation signed by the six parties, a document that legally enshrines the principle of eternal friendship between peoples, she said: “This agreement has become a new milestone in the history of Chinese-Central Asian relations, opening the way for cooperation for decades to come.”

    “More than 100 agreements on sister cities were signed, which forms a solid humanitarian basis for people’s diplomacy. These “bridges of friendship” contribute to the expansion of cultural and humanitarian interaction. The parties also agreed to intensify cooperation in such areas as parliamentary and inter-party ties, contacts between women and youth, the work of the media, analytical centers and public organizations,” the consul general added. “All this will become a new impetus for the dialogue of civilizations and a continuation of the thousand-year tradition of friendship between peoples,” she emphasized.

    In addition, as the diplomat reported, following the summit, more than 60 bilateral agreements were signed, covering such areas as trade, investment, science and technology, customs regulation, tourism, and the media. These agreements, in her opinion, will give a powerful impetus to further deepening ties between the parties in the “golden period.” –0–

    MIL OSI Russia News

  • MIL-OSI Security: Fugitive Cindy Rodriguez Singh, Wanted for Capital Murder in Everman, Texas, Added to the FBI’s List of Ten Most Wanted Fugitives

    Source: US FBI

    On October 31, 2023, Cindy Rodriguez Singh was charged with capital murder in the District Court of Tarrant County, Fort Worth, Texas. On November 2, 2023, a federal arrest warrant was issued for Rodriguez Singh in the U.S. District Court, Northern District of Texas, Fort Worth, Texas, for Unlawful Flight to Avoid Prosecution. On August 29, 2024, the FBI announced a reward of up to $25,000 for information leading to her arrest and conviction. Today, the FBI is increasing that amount and now offering up to a $250,000 reward.

    “The disappearance and suspected death of Noel Alvarez is still fresh in the minds of everyone in Everman as well as throughout North Texas. The addition of Cindy Rodriguez Singh to the FBI’s Ten Most Wanted Fugitives List is an opportunity to bring this case to the eyes and ears of citizens across the country and around the world,” said FBI Dallas Special Agent in Charge R. Joseph Rothrock. “We are confident that this publicity will culminate in her arrest and that she will be returned to the United States to answer for her alleged crimes.”

    “The addition of Cindy Rodriguez Singh to the FBI’s Ten Most Wanted Fugitives list marks a powerful moment in our unrelenting pursuit of justice for Noel. This is a promise we made to him and to this community, that we would never stop until those responsible are held accountable,” said Craig Spencer, former chief of police and current city manager and emergency management coordinator for the city of Everman. “This designation amplifies our reach and renews our focus. We urge anyone, anywhere, with information to come forward now. Noel deserves that much. We are so incredibly thankful to the FBI for their continued effort and support on this incredibly important case.”

    “I deeply appreciate the unwavering dedication of our law enforcement agencies throughout this investigation,” Tarrant County District Attorney Phil Sorrells said. “We are hopeful that Cindy Rodriguez Singh will be apprehended and returned to Tarrant County. My office is committed to delivering justice for Noel.”

    Rodriguez Singh’s last confirmed sighting was on March 22, 2023, as she, her husband, and six juvenile children, boarded an international flight to India. She was born in Dallas, Texas, in 1985, and is 40 years old. The fugitive is 5’1” to 5’3” tall, weighs 120 to 140 pounds, has a medium complexion, and has tattoos on her back, both legs, right arm, right hand, and right calf. She has brown eyes and brown hair.

    Rodriguez Singh is believed to have ties to India and Mexico. Additional information and wanted posters in English, Spanish, and Hindi, can be found at this link: https://www.fbi.gov/wanted/topten.

    The FBI’s Ten Most Wanted Fugitives list was established in March 1950. Since its inception, 537 fugitives have appeared on the list and 497 have been apprehended or located—many due to tips from citizens. Since its inception, there have been eight fugitives wanted from the North Texas region placed on the list. In addition, five fugitives that have been placed on the list were arrested in the North Texas region.

    The FBI is offering a reward of up to $250,000 for information leading to the arrest of Cindy Rodriguez Singh. Anyone with information concerning Rodriguez Singh should immediately contact the nearest FBI office or local law enforcement agency.

    Calls can be directed to 1-800-CALL-FBI (1-800-225-5324) or the FBI’s Dallas Field Office at 972-559-5000. Individuals from outside of the United States should contact the nearest U.S. Embassy or Consulate. Tips can also be submitted digitally at tips.fbi.gov. All information can remain anonymous, and confidentiality is guaranteed.

    This fugitive investigation is being conducted by the FBI’s Fort Worth Resident Agency, Everman Police Department, Northeast Tarrant County Child Abduction Response Team, Tarrant County District Attorney’s Office, and Texas Rangers.

    Media Contact:

    Public Affairs Officer, Melinda Urbina Garcia, murbina@fbi.gov

    MIL Security OSI

  • President Murmu inaugurates and lays foundation stones for key projects at Mahayogi Gorakhnath University

    Source: Government of India

    Source: Government of India (4)

    President Droupadi Murmu on Tuesday inaugurated and laid the foundation stone for multiple development projects at Mahayogi Gorakhnath University in Gorakhpur. The projects include the inauguration of the University’s Auditorium, Academic Block, and Panchkarma Kendra, as well as the foundation stone-laying for a new Girls’ Hostel.

    Addressing the gathering, the President praised the University for promoting a holistic approach to medicine by integrating allopathy and Ayurveda education and healthcare services through its Medical College, Ayurveda College, and affiliated hospitals. She also acknowledged the efforts of Gorakshanath Medical College Hospital and Research Centre, which is in the process of establishing a state-of-the-art 1800-bed hospital.

    Highlighting the role of private educational institutions in nation-building, the President emphasized that those committed to philanthropy and public service would play a key role in realizing the objectives of the National Education Policy (NEP) 2020. 

    Murmu noted that Mahayogi Gorakhnath University is the first private university in Gorakhpur and has, within just four years of its establishment, emerged as a significant centre for higher and employment-oriented education in eastern Uttar Pradesh.

    The President expressed her particular delight in laying the foundation stone for the new Girls’ Hostel, calling it a vital initiative for women’s empowerment. She stressed that lack of safe residential facilities often hinders girls’ access to higher education. In this regard, the University’s step to build a dedicated hostel for female students would make higher education more accessible and secure for women.

    “Education is the most effective means of empowerment,” the President said, applauding the University’s efforts in contributing to gender equity in education.

    Murmu also said that the overall health and educational development of Purvanchal, the eastern region of Uttar Pradesh, would significantly contribute to the inclusive growth of the entire state. “When Uttar Pradesh, the most populous state in the country, progresses rapidly, India as a whole will set new benchmarks in development,” she added.

  • MIL-OSI: SIMPPLE Ltd. Provides Compliance Updates with Nasdaq’s Continued Listing Requirements

    Source: GlobeNewswire (MIL-OSI)

    Singapore, July 01, 2025 (GLOBE NEWSWIRE) — SIMPPLE Ltd. (NASDAQ: SPPL) (“SIMPPLE” or “the Company”), a leading technology provider and innovator in the facilities management (FM) sector, today announced that it believes it has regained compliance with the minimum shareholders’ equity requirement under Nasdaq Listing Rule 5550(b)(1) due to strong financial performance and closing of a financing round, as well as the requirement to hold an annual meeting of shareholders under Nasdaq Listing Rule 5620(a).

    Shareholders’ Equity Compliance

    As of the date of this report, the Company believes its shareholders’ equity is above the Nasdaq $2.5 million requirement. This increase is partially attributable to the closing of a private investment in public equity (“PIPE”) offering for total gross proceeds of $2,000,001.00. The objective of this fund raise is to accelerate product development and to increase market share, especially in the Australia and New Zealand (ANZ) markets. In addition, the Company expects to continue strengthening its financial position for the full year, supported by robust operating performance for the first half of 2025. Based on these trends and internal forecasts, the Company projects that it will continue to meet and exceed shareholders’ equity requirement by year-end.

    Annual General Meeting Compliance

    Separately, the Company confirms that it has successfully concluded its Annual General Meeting of Shareholders (“AGM”), which was held at 9:00am Eastern Time, on June 30, 2025. The convening of this AGM satisfies the requirement under Nasdaq Listing Rule 5620(a) to hold an annual meeting of shareholders within the required timeframe. It is, however, also noted that the Company has announced earlier this year that it will rely on Cayman Islands home country exemption with regards to AGM requirements in the future.

    The Company will continue to monitor its ongoing compliance with all applicable Nasdaq listing standards and will provide further updates as appropriate.

    About SIMPPLE LTD.

    Headquartered in Singapore, SIMPPLE LTD. is an advanced technology solution provider in the emerging PropTech space, focused on helping facilities owners and managers manage facilities autonomously. Founded in 2016, the Company has a strong foothold in the Singapore facilities management market, serving over 60 clients in both the public and private sectors and extending out of Singapore into Australia and the Middle East. The Company has developed its proprietary SIMPPLE Ecosystem, to create an automated workforce management tool for building maintenance, surveillance and cleaning comprised of a mix of software and hardware solutions such as robotics (both cleaning and security) and Internet-of-Things (“IoT”) devices. 

    For more information on SIMPPLE, please visit: https://www.simpple.ai

    Safe Harbor Statement

    This press release contains forward-looking statements. In addition, from time to time, we or our representatives may make forward-looking statements orally or in writing. We base these forward-looking statements on our expectations and projections about future events, which we derive from the information currently available to us. Such forward-looking statements relate to future events or our future performance, including: our financial performance and projections; our growth in revenue and earnings; and our business prospects and opportunities. You can identify forward-looking statements by those that are not historical in nature, particularly those that use terminology such as “may,” “should,” “expects,” “anticipates,” “contemplates,” “estimates,” “believes,” “plans,” “projected,” “predicts,” “potential,” or “hopes” or the negative of these or similar terms. In evaluating these forward-looking statements, you should consider various factors, including: our ability to change the direction of the Company; our ability to keep pace with new technology and changing market needs; and the competitive environment of our business. These and other factors may cause our actual results to differ materially from any forward-looking statement.

    Forward-looking statements are only predictions. The forward-looking events discussed in this press release and other statements made from time to time by us or our representatives, may not occur, and actual events and results may differ materially and are subject to risks, uncertainties, and assumptions about us. We are not obligated to publicly update or revise any forward-looking statement, whether as a result of uncertainties and assumptions, the forward-looking events discussed in this press release and other statements made from time to time by us or our representatives might not occur.

    The MIL Network

  • MIL-OSI Economics: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Source: Microsoft

    Headline: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Since 2024, Microsoft Threat Intelligence has observed remote information technology (IT) workers deployed by North Korea leveraging AI to improve the scale and sophistication of their operations, steal data, and generate revenue for the Democratic People’s Republic of Korea (DPRK). Among the changes noted in the North Korean remote IT worker tactics, techniques, and procedures (TTPs) include the use of AI tools to replace images in stolen employment and identity documents and enhance North Korean IT worker photos to make them appear more professional. We’ve also observed that they’ve been utilizing voice-changing software.

    North Korea has deployed thousands of remote IT workers to assume jobs in software and web development as part of a revenue generation scheme for the North Korean government. These highly skilled workers are most often located in North Korea, China, and Russia, and use tools such as virtual private networks (VPNs) and remote monitoring and management (RMM) tools together with witting accomplices to conceal their locations and identities.

    Historically, North Korea’s fraudulent remote worker scheme has focused on targeting United States (US) companies in the technology, critical manufacturing, and transportation sectors. However, we’ve observed North Korean remote workers evolving to broaden their scope to target various industries globally that offer technology-related roles. Since 2020, the US government and cybersecurity community have identified thousands of North Korean workers infiltrating companies across various industries.

    Organizations can protect themselves from this threat by implementing stricter pre-employment vetting measures and creating policies to block unapproved IT management tools. For example, when evaluating potential employees, employers and recruiters should ensure that the candidates’ social media and professional accounts are unique and verify their contact information and digital footprint. Organizations should also be particularly cautious with staffing company employees, check for consistency in resumes, and use video calls to confirm a worker’s identity.

    Microsoft Threat Intelligence tracks North Korean IT remote worker activity as Jasper Sleet (formerly known as Storm-0287). We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet. To disrupt this activity and protect our customers, we’ve suspended 3,000 known Microsoft consumer accounts (Outlook/Hotmail) created by North Korean IT workers. We have also implemented several detections to alert our customers of this activity through Microsoft Entra ID Protection and Microsoft Defender XDR as noted at the end of this blog. As with any observed nation-state threat actor activity, Microsoft has directly notified targeted or compromised customers, providing them with important information needed to secure their environments. As we continue to observe more attempts by threat actors to leverage AI, not only do we report on them, but we also have principles in place to take action against them.

    This blog provides additional information on the North Korean remote IT worker operations we published previously, including Jasper Sleet’s usual TTPs to secure employment, such as using fraudulent identities and facilitators. We also provide recent observations regarding their use of AI tools. Finally, we share detailed guidance on how to investigate, monitor, and remediate possible North Korean remote IT worker activity, as well as detections and hunting capabilities to surface this threat.

    From North Korea to the world: The remote IT workforce

    Since at least early 2020, Microsoft has tracked a global operation conducted by North Korea in which skilled IT workers apply for remote job opportunities to generate revenue and support state interests. These workers present themselves as foreign (non-North Korean) or domestic-based teleworkers and use a variety of fraudulent means to bypass employment verification controls.

    North Korea’s fraudulent remote worker scheme has since evolved, establishing itself as a well-developed operation that has allowed North Korean remote workers to infiltrate technology-related roles across various industries. In some cases, victim organizations have even reported that remote IT workers were some of their most talented employees. Historically, this operation has focused on applying for IT, software development, and administrator positions in the technology sector. Such positions provide North Korean threat actors access to highly sensitive information to conduct information theft and extortion, among other operations.

    North Korean IT workers are a multifaceted threat because not only do they generate revenue for the North Korean regime, which violates international sanctions, they also use their access to steal sensitive intellectual property, source code, or trade secrets. In some cases, these North Korean workers even extort their employer into paying them in exchange for not publicly disclosing the company’s data.

    Between 2020 and 2022, the US government found that over 300 US companies in multiple industries, including several Fortune 500 companies, had unknowingly employed these workers, indicating the magnitude of this threat. The workers also attempted to gain access to information at two government agencies. Since then, the cybersecurity community has continued to detect thousands of North Korean workers. On January 3, 2025, the Justice Department released an indictment identifying two North Korean nationals and three facilitators responsible for conducting fraudulent work between 2018 and 2024. The indicted individuals generated a revenue of at least US$866,255 from only ten of the at least 64 infiltrated US companies.

    North Korean threat actors are evolving across the threat landscape to incorporate more sophisticated tactics and tools to conduct malicious employment-related activity, including the use of custom and AI-enabled software.

    Tactics and techniques

    The tactics and techniques employed by North Korean remote IT workers involve a sophisticated ecosystem of crafting fake personas, performing remote work, and securing payments. North Korean IT workers apply for remote roles, in various sectors, at organizations across the globe.

    They create, rent, or procure stolen identities that match the geo-location of their target organizations (for example, they would establish a US-based identity to apply for roles at US-based companies), create email accounts and social media profiles, and establish legitimacy through fake portfolios and profiles on developer platforms like GitHub and LinkedIn. Additionally, they leverage AI tools to enhance their operations, including image creation and voice-changing software. Facilitators play a crucial role in validating fraudulent identities and managing logistics, such as forwarding company hardware and creating accounts on freelance job websites. To evade detection, these workers use VPNs, virtual private servers (VPSs), and proxy services as well as RMM tools to connect to a device housed at a facilitator’s laptop farm located in the country of the job.

    Figure 1. The North Korean IT worker ecosystem

    Crafting fake personas and profiles

    The North Korean remote IT worker fraud scheme begins with the procurement of identities for the workers. These identities, which can be stolen or “rented” from witting individuals, include names, national identification numbers, and dates of birth. The workers might also leverage services that generate fraudulent identities, complete with seemingly legitimate documentation, to fabricate their personas. They then create email accounts and social media pages they use to apply for jobs, often indirectly through staffing or contracting companies. They also apply for freelance opportunities through freelancer sites as an additional avenue for revenue generation. Notably, they often use the same names/profiles repeatedly rather than creating unique personas for each successful infiltration.

    Additionally, the North Korean IT workers have used fake profiles on LinkedIn to communicate with recruiters and apply for jobs.

    Figure 2. An example of a North Korean IT worker LinkedIn profile that has since been taken down.

    The workers tailor their fake resumes and profiles to match the requirements for specific remote IT positions, thus increasing their chances of getting selected. Over time, we’ve observed these fake resumes and employee documents noticeably improving in quality, now appearing more polished and lacking grammatical errors facilitated by AI.

    After creating their fake personas, the North Korean IT workers then attempt to establish legitimacy by creating digital footprints for these fake personas. They typically leverage communication, networking, and developer platforms, (for example, GitHub) to showcase their supposed portfolio of previous work samples:

    Figure 3. Example profile used by a North Korean IT worker that has since been taken down.

    Using AI to improve operations

    Microsoft Threat intelligence has observed North Korean remote IT workers leveraging AI to improve the quantity and quality of their operations. For example, in October 2024, we found a public repository containing actual and AI-enhanced images of suspected North Korean IT workers:

    Figure 4. Photos of potential North Korean IT workers

    The repository also contained the resumes and email accounts used by the said workers, along with the following tools and resources they can use to secure employment and to do their work:

    • VPS and VPN accounts, along with specific VPS IP addresses
    • Playbooks on conducting identity theft and creating and bidding jobs on freelancer websites
    • Wallet information and suspected payments made to facilitators
    • LinkedIn, GitHub, Upwork, TeamViewer, Telegram, and Skype accounts
    • Tracking sheet of work performed, and payments received by the IT workers

    Image creation

    Based on our review of the repository mentioned previously, North Korean IT workers appear to conduct identity theft and then use AI tools like Faceswap to move their pictures over to the stolen employment and identity documents. The attackers also use these AI tools to take pictures of the workers and move them to more professional looking settings. The workers then use these AI-generated pictures on one or more resumes or profiles when applying for jobs.

    Figure 5. Use of AI apps to modify photos used for North Korean IT workers’ resumes and profiles
    Figure 6. Examples of resumes for North Korean IT workers. These two resumes use different versions of the same photo.

    Communications

    Microsoft Threat Intelligence has observed that North Korean IT workers are also experimenting with other AI technologies such as voice-changing software. While we haven’t observed threat actors using combined AI voice and video products as a tactic first hand, we do recognize that combining these technologies could allow future threat actor campaigns to trick interviewers into thinking they aren’t communicating with a North Korean IT worker. If successful, this tactic could allow the North Korean IT workers to do interviews directly and no longer rely on facilitators standing in for them on interviews or selling them account access.

    Facilitators for initial access

    North Korean Remote IT workers require assistance from a witting facilitator to help find jobs, pass the employment verification process, and once hired, successfully work remotely. We’ve observed Jasper Sleet advertising job opportunities for facilitator roles under the guise of partnering with a remote job candidate to help secure an IT role in a competitive market:

    Figure 7. Example of a job opportunity for a facilitator role

    The IT workers may have the facilitators assist in creating accounts on remote and freelance job websites. They might also ask the facilitator to perform the following tasks as their relationship builds:

    • Create a bank account for the North Korean IT worker, or lend their (the facilitator’s) own account to the worker
    • Purchase mobile phone numbers or SIM cards

    During the employment verification process, the witting accomplice helps the North Korean IT workers validate the latter’s fraudulent identities using online background check service providers. The documents submitted by the workers include fake or stolen drivers’ licenses, social security cards, passports, and permanent resident identification cards. Workers train using interview scripts, which include a justification for why the employee must work remotely.

    Once hired, the remote workers direct company laptops and hardware to be sent to the address of the accomplice. The accomplice then either runs a laptop farm that provides the laptops with an internet connection at the geo-location of the role or forwards the items internationally. For hardware that remain in the country of the role, the accomplice signs into the computers and installs software that enables the workers to connect remotely. Remote IT workers might also access devices remotely using IP-based KVM devices, like PiKVM or TinyPilot.

    Defense evasion and persistence

    To conceal their physical location as well as maintain persistence and blend into the target organization’s environment, the workers typically use VPNs (particularly Astrill VPN), VPSs, proxy services, and RMM tools. Microsoft Threat Intelligence has observed the persistent use of JumpConnect, TinyPilot, Rust Desk, TeamViewer, AnyViewer, and Anydesk. When an in-person presence or face-to-face meeting is required, for example to confirm banking information or attend a meeting, the workers have been known to pay accomplices to stand in for them. When possible, however, the workers eliminate all face-to-face contact, offering fraudulent excuses for why they are not on camera during video teleconferencing calls or speaking.

    Attribution

    Microsoft Threat Intelligence uses the name Jasper Sleet (formerly known as Storm-0287) to represent activity associated with North Korean’s remote IT worker program. These workers are primarily focused on revenue generation, use remote access tools, and likely fall under a particular leadership structure in North Korea. We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet.

    How Microsoft disrupts North Korean remote IT worker operations with machine learning

    Microsoft has successfully scaled analyst tradecraft to accelerate the identification and disruption of North Korean IT workers in customer environments by developing a custom machine learning solution. This has been achieved by leveraging Microsoft’s existing threat intelligence and weak signals generated by monitoring for many of the red flags listed in this blog, among others. For example, this solution uses impossible time travel risk detections, most commonly between a Western nation and China or Russia. The machine learning workflow uses these features to surface suspect accounts most likely to be North Korean IT workers for assessment by Microsoft Threat Intelligence analysts.

    Once Microsoft Threat Intelligence reviews and confirms that an account is indeed associated with a North Korean IT worker, customers are then notified with a Microsoft Entra ID Protection risk detection warning of a risky sign-in based on Microsoft’s threat intelligence. Microsoft Defender XDR customers also receive the alert Sign-in activity by a suspected North Korean entity in the Microsoft Defender portal.

    Defending against North Korean remote IT worker infiltration

    Defending against the threats from North Korean remote IT workers involves a threefold strategy:

    • Ensuring a proper vetting approach is in place for freelance workers and vendors
    • Monitoring for anomalous user activity
    • Responding to suspected Jasper Sleet signals in close coordination with your insider risk team

    Investigate

    How can you identify a North Korean remote IT worker in the hiring process?

    To protect your organization against a potential North Korean insider threat, it is important for your organization to prioritize a process for verifying employees to identify potential risks. The following can be used to assess potential employees:

    • Confirm the potential employee has a digital footprint and look for signs of authenticity. This includes a real phone number (not VoIP), a residential address, and social media accounts. Ensure the potential employee’s social media/professional accounts are not highly similar to the accounts of other individuals. In addition, check that the contact phone number listed on the potential employee’s account is unique and not also used by other accounts.
    • Scrutinize resumes and background checks for consistency of names, addresses, and dates. Consider contacting references by phone or video-teleconference rather than email only.
    • Exercise greater scrutiny for employees of staffing companies, since this is the easiest avenue for North Korean workers to infiltrate target companies.
    • Search whether a potential employee is employed at multiple companies using the same persona.
    • Ensure the potential employee is seen on camera during multiple video telecommunication sessions. If the potential employee reports video and/or microphone issues that prohibit participation, this should be considered a red flag.
    • During video verification, request individuals to physically hold driver’s licenses, passports, or identity documents up to camera.
    • Keep records, including recordings of video interviews, of all interactions with potential employees.
    • Require notarized proof of identity.

    Monitor

    How can your organization prevent falling victim to the North Korean remote IT worker technique?

    To prevent the risks associated with North Korean insider threats, it’s vital to monitor for activity typically associated with this fraudulent scheme.

    Monitor for identifiable characteristics of North Korean remote workers

    Microsoft has identified the following characteristics of a North Korean remote worker. Note that not all the criteria are necessarily required, and further, a positive identification of a remote worker doesn’t guarantee that the worker is North Korean.

    • The employee lists a Chinese phone number on social media accounts that is used by other accounts.
    • The worker’s work-issued laptop authenticates from an IP address of a known North Korean IT worker laptop farm, or from foreign—most commonly Chinese or Russian—IP addresses even though the worker is supposed to have a different work location.
    • The worker is employed at multiple companies using the same persona. Employees of staffing companies require heightened scrutiny, given this is the easiest way for North Korean workers to infiltrate target companies.
    • Once a laptop is issued to the worker, RMM software is immediately downloaded onto it and used in combination with a VPN.
    • The worker has never been seen on camera during a video telecommunication session or is only seen a few times. The worker may also report video and/or microphone issues that prohibit participation from the start.
    • The worker’s online activity doesn’t align with routine co-worker hours, with limited engagement across approved communication platforms.

    Monitor for activity associated with Jasper Sleet access

    • If RMM tools are used in your environment, enforce security settings where possible, to implement MFA:
      • If an unapproved installation is discovered, reset passwords for accounts used to install the RMM services. If a system-level account was used to install the software, further investigation may be warranted.
    • Monitor for impossible travel—for example, a supposedly US-based employee signing in from China or Russia.
    • Monitor for use of public VPNs such as Astrill. For example, IP addresses associated with VPNs known to be used by Jasper Sleet can be added to Sentinel watchlists. Or, Microsoft Defender for Identity can integrate with your VPN solution to provide more information about user activity, such as extra detection for abnormal VPN connections.
    • Monitor for signals of insider threats in your environment. Microsoft Purview Insider Risk Management can help identify potentially malicious or inadvertent insider risks.
    • Monitor for consistent user activity outside of typical working hours.

    Remediate

    What are the next steps if you positively identify a North Korean remote IT worker employed at your company?

    Because Jasper Sleet activity follows legitimate job offers and authorized access, Microsoft recommends approaching confirmed or suspected Jasper Sleet intrusions with an insider risk approach using your organization’s insider risk response plan or incident response provider like Microsoft Incident Response. Some steps might include:

    • Restrict response efforts to a small, trusted insider risk working group, trained in operational security (OPSEC) to avoid tipping off subjects and potential collaborators.
    • Rapidly evaluate the subject’s proximity to critical assets, such as:
      • Leadership or sensitive teams
      • Direct reports or vendor staff the subject has influence over
      • Suppliers or vendors
      • People/non-people accounts, production/pre-production environments, shared accounts, security groups, third-party accounts, security groups, distribution groups, data clusters, and more
    • Conduct preliminary link analysis to:
      • Detect relationships with potential collaborators, supporters, or other potential aliases operated by the same actor
      • Identify shared indicators (for example, shared IP addresses, behavioral overlap)
      • Avoid premature action that might alert other Jasper Sleet operators
    • Conduct a risk-based prioritization of efforts, informed by:
      • Placement and access to critical assets (not necessarily where you identified them)
      • Stakeholder insight from potentially impacted business units
      • Business impact considerations of containment (which might support additional collection/analysis) or mitigation (for example, eviction)
    • Conduct open-source intelligence (OSINT) collection and analysis to:
      • Determine if the identity associated with the threat actor is associated with a real person. For example, North Korean IT workers have leveraged stolen identities of real US persons to facilitate their fraud. Conduct OSINT on all available personally identifiable information (PII) provided by the actor (name, date of birth, SSN, home of record, phone number, emergency contact, and others) and determine if these items are linked to additional North Korean actors, and/or real persons’ identities.
      • Gather all known external accounts operated by the alias/persona (for example, LinkedIn, GitHub, freelance working sites, bug bounty programs).
      • Perform analysis on account images using open-source tools such as FaceForensics++ to determine prevalence of AI-generated content. Detection opportunities within video and imagery include: 
        • Temporal consistency issues: Rapid movements cause noticeable artifacts in video deepfakes as the tracking system struggles to maintain accurate landmark positioning. 
        • Occlusion handling: When objects pass over the AI-generated content such as the face, deepfake systems tend to fail at properly reconstructing the partially obscured face.
        • Lighting adaptation: Changes in lighting conditions might reveal inconsistencies in the rendering of the face
        • Audio-visual synchronization: Slight delays between lip movements and speech are detectable under careful observation
          • Exaggerated facial expressions. 
          • Duplicative or improperly placed appendages.
          • Pixelation or tearing at edges of face, eyes, ears, and glasses.
    • Engage counterintelligence or insider risk/threat teams to:
      • Understand tradecraft and likely next steps
      • Gain national-level threat context, if applicable
    • Make incremental, risk-based investigative and response decisions with the support of your insider threat working group and your insider threat stakeholder group; one providing tactical feedback and the other providing risk tolerance feedback.
    • Preserve evidence and document findings.
    • Share lessons learned and increase awareness.
    • Educate employees on the risks associated with insider threats and provide regular security training for employees to recognize and respond to threats, including a section on the unique threat posed by North Korean IT workers.

    After an insider risk response to Jasper Sleet, it might be necessary to also conduct a thorough forensic investigation of all systems that the employee had access to for indicators of persistence, such as RMM tools or system/resource modifications.

    For additional resources, refer to CISA’s Insider Threat Mitigation Guide. If you suspect your organization is being targeted by nation-state cyber activity, report it to the appropriate national authority. For US-based organizations, the Federal Bureau of Investigation (FBI) recommends reporting North Korean remote IT worker activity to the Internet Crime Complaint Center (IC3).

    Microsoft Defender XDR detections

    Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, apps to provide integrated protection against attacks like the threat discussed in this blog.

    Customers with provisioned access can also use Microsoft Security Copilot in Microsoft Defender to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.

    Microsoft Defender XDR

    Alerts with the following titles in the security center can indicate threat activity on your network:

    • Sign-in activity by a suspected North Korean entity

    Microsoft Defender for Endpoint

    Alerts with the following titles in the security center can indicate Jasper Sleet RMM activity on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Suspicious usage of remote management software
    • Suspicious connection to remote access software

    Microsoft Defender for Identity

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Atypical travel
    • Suspicious behavior: Impossible travel activity

    Microsoft EntraID Protection

    Microsoft Entra ID Protection risk detections inform Entra ID user risk events and can indicate associated threat activity, including unusual user activity consistent with known patterns identified by Microsoft Threat Intelligence research. Note, however, that these alerts can be also triggered by unrelated threat activity.

    • Microsoft Entra threat intelligence (sign-in): (RiskEventType: investigationsThreatIntelligence)

    Microsoft Defender for Cloud Apps

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Impossible travel activity

    Microsoft Security Copilot

    Security Copilot customers can use the standalone experience to create their own prompts or run the following pre-built promptbooks to automate incident response or investigation tasks related to this threat:

    • Incident investigation
    • Microsoft User analysis
    • Threat actor profile

    Note that some promptbooks require access to plugins for Microsoft products such as Microsoft Defender XDR or Microsoft Sentinel.

    Hunting queries

    Microsoft Defender XDR

    Because organizations might have legitimate and frequent uses for RMM software, we recommend using the Microsoft Defender XDR advanced hunting queries available on GitHub to locate RMM software that hasn’t been endorsed by your organization for further investigation. In some cases, these results might include benign activity from legitimate users. Regardless of use case, all newly installed RMM instances should be scrutinized and investigated.

    If any queries have high fidelity for discovering unsanctioned RMM instances in your environment, and don’t detect benign activity, you can create a custom detection rule from the advanced hunting query in the Microsoft Defender portal. 

    Microsoft Sentinel

    The alert Insider Risk Sensitive Data Access Outside Organizational Geo-locationjoins Azure Information Protection logs (InformationProtectionLogs_CL) with Microsoft Entra ID sign-in logs (SigninLogs) to provide a correlation of sensitive data access by geo-location. Results include:

    • User principal name
    • Label name
    • Activity
    • City
    • State
    • Country/Region
    • Time generated

    The recommended configuration is to include (or exclude) sign-in geo-locations (city, state, country and/or region) for trusted organizational locations. There is an option for configuration of correlations against Microsoft Sentinel watchlists. Accessing sensitive data from a new or unauthorized geo-location warrants further review.

    References

    Acknowledgments

    For more information on North Korean remote IT worker operations, we recommend reviewing DTEX’s in-depth analysis in the report Exposing DPRK’s Cyber Syndicate and IT Workforce.

    Learn more

    Meet the experts behind Microsoft Threat Intelligence, Incident Response, and the Microsoft Security Response Center at our VIP Mixer at Black Hat 2025. Discover how our end-to-end platform can help you strengthen resilience and elevate your security posture.

    For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog. 

    To get notified about new publications and to join discussions on social media, follow us on LinkedIn, X (formerly Twitter), and Bluesky. 

    To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast. 

    MIL OSI Economics

  • MIL-OSI USA: Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes

    Source: US State of North Dakota

    Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers

    The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.

    According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.

    As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.

    “These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”

    “North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”

    “North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”

    Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts

    Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme. 

    “The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”

    According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).

    Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.

    IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files  containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.

    Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.

    Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.

    The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.

    Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.

    Kim Kwang Jin et al. Indictment – Northern District of Georgia

    Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.

    “The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”

    According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

    After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

    To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.

    The FBI Atlanta Field Office is investigating the case.

    Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.

    21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District

    Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.

    Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.

    ***

    The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.

    As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.

    Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.

    The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.

    The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI USA: Canadian Man Arrested and Detained for Role in Deadly Alien Smuggling Conspiracy at the U.S.’s Northern Border

    Source: US State of North Dakota

    Note: View the indictment here and detention letter here.

    WASHINGTON — A dual Canadian American citizen was arrested on Sunday, June 15, for his role in a deadly human smuggling conspiracy that left a family of four, including two children under the age of three, dead in the St. Lawrence River. Oakes was arrested as he attempted to enter the United States via the Massena, New York, Port of Entry.

    Timothy Oakes, 34, from the Akwesasne Mohawk Indian Reservation (AMIR), Canada, was previously arraigned on numerous human smuggling offenses in the Northern District of New York District Court and had his detention hearing earlier today and will remain detained. Oakes was indicted on April 9 for conspiring with others to engage in alien smuggling, four counts of alien smuggling for profit, and four counts of alien smuggling resulting in death. United States based co-conspirators Dakota Montour, 31, and Kawisiiostha Celecia Sharrow, 43, both of Akwesasne-Mohawk, New York, and Janet Terrance, 45, of Hogansburg, New York, entered guilty pleas on Jan. 23, Oct. 8, 2024, and March 6, respectively.

    “As alleged, Oakes and his co-conspirators profited from a human smuggling operation with a singular, cold-hearted aim: making money by bringing illegal aliens into the United States, regardless of the danger to human life involved,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “Their greed resulted in the deaths of a mother, a father, and two small children, as well as one of the defendants’ own brothers. The Criminal Division will continue to disrupt and dismantle these organizations and bring justice to smugglers whose actions result in senseless deaths.”

    “This case shows the terrible perils of illegally crossing the border,” said U.S. Attorney John A. Sarcone III for the Northern District of New York. “Four family members died because a smuggling network put them in harm’s way. My office is proud to partner with Joint Task Force Alpha to continue to combat dangerous human smuggling and trafficking organizations that operate on our northern border.”

    “Oakes’ arrest comes as part of our nearly two-year long investigation into a transnational criminal organization responsible for the large-scale smuggling of aliens from Canada into the United States,” said U.S. Immigration and Customs Enforcement Homeland Security Investigations (ICE HSI) Buffalo Special Agent in Charge Erin Keegan. “ICE HSI leverages its full range of authorities to combat and dismantle the heinous networks of greedy criminals who illicitly sell dangerous, sometimes fatal, passage through our nation’s northern border. We are extremely grateful for a multitude of law enforcement agency partners on the Border Enforcement Security Taskforce who join us in this fight to bring smugglers to justice.”

    “Two toddler aged children and their parents were the tragic victims of an alien smuggling attempt gone horribly wrong,” said Chief Patrol Agent Robert Garcia of the U.S. Border Patrol’s Swanton Sector. “Their deaths were a direct result of callous smugglers who exploited the vulnerable. Due to unrelenting perseverance and investigative efforts by multiple law enforcement agencies, those responsible will be held accountable. Our pursuit of justice persists until justice is served.”

    According to court documents, Oakes was a key facilitator in a human smuggling organization (HSO) that smuggled aliens from Canada into northern New York. Oakes, working with the HSO, routinely smuggled aliens into the United States by piloting boats across the St. Lawrence River. Additionally, Oakes used his home as a staging area for aliens before the HSO smuggled them into the United States. Oakes earned approximately $1,000 for every alien whom he smuggled across the St. Lawrence River into the United States.

    In March 2023, Oakes housed a Romanian family of four, together with other aliens, for about 24 hours. He then transported the family and a boat to a public boat launch. His brother, Casey Oakes, attempted to use the boat to smuggle the Romanian family into the United States, but the boat capsized, killing all four members of the family, as well as Casey Oakes.    

    Terrance, Montour, and Sharrow admitted in their plea agreements that in late March 2023, they were employed to illegally transport a Romanian family of four — a mother, father, one-year-old boy, and two-year-old girl — from Canada into New York. Specifically, Montour admitted that he was aware of the dangerous weather conditions on the day of the tragedy — high winds, freezing temperatures, and limited visibility — yet another co-conspirator still loaded the family of four into the small boat to attempt to cross the St. Lawrence River.

    HSI Massena engaged in an extensive years-long investigation of the case, with assistance from the U.S. Border Patrol, U.S. Customs and Border Protection (CBP), HSI’s Human Smuggling Unit in Washington, D.C., CBP’s National Targeting Center International Interdiction Task Force, New York State Police, Canada Border Services Agency, Akwesasne Mohawk Police Service, St. Regis Mohawk Tribal Police Department, Ontario Provincial Police, Sûreté du Québec, St. Lawrence County Sheriff’s Department, Royal Canadian Mounted Police, and the Cornwall Police Service. The Justice Department’s Office of International Affairs provided significant support with foreign legal assistance requests.

    The defendant’s vehicle with light blue boat in tow on March 29, 2023, at 9:29 p.m., consistent with the boat found in the river during recovery efforts.

    The investigation is a result of the coordinated efforts of Joint Task Force Alpha (JTFA). JTFA, a partnership with the Department of Homeland Security (DHS), has been elevated and expanded by the Attorney General with a mandate to target cartels and other transnational criminal organizations and eliminate human smuggling and trafficking networks operating within the Americas that impact public safety and the security of our borders. JTFA currently comprises detailees from U.S. Attorneys’ Offices along the border, including the Northern District of New York. Dedicated support is provided by numerous components of the Justice Department’s Criminal Division, led by the Human Rights and Special Prosecutions Section (HRSP) and supported by the Money Laundering and Asset Recovery Section, the Office of Enforcement Operations and the Office of International Affairs, among others. JTFA also relies on substantial law enforcement investment from DHS, FBI, and the Drug Enforcement Administration, and other partners. To date, JTFA’s work has resulted in more than 380 domestic and international arrests of leaders, organizers, and significant facilitators of alien smuggling; more than 340 U.S. convictions; more than 290 significant jail sentences imposed; and forfeitures of substantial assets.

    The investigation is being conducted under the Extraterritorial Criminal Travel Strike Force (ECT) program, a joint partnership between the Justice Department’s Criminal Division and HSI. The ECT program focuses on human smuggling networks that may present particular national security or public safety risks, or present grave humanitarian concerns. ECT has dedicated investigative, intelligence and prosecutorial resources. ECT coordinates and receives assistance from other U.S. government agencies and foreign law enforcement authorities.

    Trial Attorney Jenna E. Reed of the Criminal Division’s HRSP and Assistant U.S. Attorney Jeffrey Stitt for the Northern District of New York are prosecuting the case.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces and Project Safe Neighborhoods.

    MIL OSI USA News

  • MIL-OSI USA: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: US State of California

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: Foreign National Indicted in Wire Fraud Scheme

    Source: US FBI

    Orlando, Florida – United States Attorney Gregory W. Kehoe announces the return of an indictment charging Ken-ichi Larroza Hatakama (36, Philippines), with wire fraud. If convicted, Hatakama faces a maximum penalty of 20 years in federal prison. The indictment also notifies Hatakama that the United States intends to forfeit $562,569.37, which are alleged to be the proceeds of the offense.

    According to the indictment, Hatakama, a citizen and national of the Philippines, worked remotely assisting Victim Company (“VC”) with their computer coding. While working on VC’s computer coding, Hatakama embedded malicious code into VC’s computer coding, causing payments intended for VC’s partners to be rerouted to dozens of fraudulent PayPal accounts he controlled. Through this scheme, Hatakama stole over $500,000 from VC.

    An indictment is merely a formal charge that a defendant has committed one or more violations of federal criminal law, and every defendant is presumed innocent unless, and until, proven guilty.

    This case was investigated by the Federal Bureau of Investigation. It will be prosecuted by Assistant United States Attorney Noah P. Dorman.

    MIL Security OSI

  • MIL-OSI Security: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: United States Attorneys General

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: United States Attorneys General

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes

    Source: United States Attorneys General

    Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers

    The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.

    According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.

    As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.

    “These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”

    “North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”

    “North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”

    Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts

    Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme. 

    “The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”

    According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).

    Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.

    IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files  containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.

    Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.

    Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.

    The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.

    Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.

    Kim Kwang Jin et al. Indictment – Northern District of Georgia

    Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.

    “The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”

    According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

    After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

    To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.

    The FBI Atlanta Field Office is investigating the case.

    Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.

    21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District

    Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.

    Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.

    ***

    The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.

    As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.

    Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.

    The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.

    The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Canadian Man Arrested and Detained for Role in Deadly Alien Smuggling Conspiracy at the U.S.’s Northern Border

    Source: United States Attorneys General

    Note: View the indictment here and detention letter here.

    WASHINGTON — A dual Canadian American citizen was arrested on Sunday, June 15, for his role in a deadly human smuggling conspiracy that left a family of four, including two children under the age of three, dead in the St. Lawrence River. Oakes was arrested as he attempted to enter the United States via the Massena, New York, Port of Entry.

    Timothy Oakes, 34, from the Akwesasne Mohawk Indian Reservation (AMIR), Canada, was previously arraigned on numerous human smuggling offenses in the Northern District of New York District Court and had his detention hearing earlier today and will remain detained. Oakes was indicted on April 9 for conspiring with others to engage in alien smuggling, four counts of alien smuggling for profit, and four counts of alien smuggling resulting in death. United States based co-conspirators Dakota Montour, 31, and Kawisiiostha Celecia Sharrow, 43, both of Akwesasne-Mohawk, New York, and Janet Terrance, 45, of Hogansburg, New York, entered guilty pleas on Jan. 23, Oct. 8, 2024, and March 6, respectively.

    “As alleged, Oakes and his co-conspirators profited from a human smuggling operation with a singular, cold-hearted aim: making money by bringing illegal aliens into the United States, regardless of the danger to human life involved,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “Their greed resulted in the deaths of a mother, a father, and two small children, as well as one of the defendants’ own brothers. The Criminal Division will continue to disrupt and dismantle these organizations and bring justice to smugglers whose actions result in senseless deaths.”

    “This case shows the terrible perils of illegally crossing the border,” said U.S. Attorney John A. Sarcone III for the Northern District of New York. “Four family members died because a smuggling network put them in harm’s way. My office is proud to partner with Joint Task Force Alpha to continue to combat dangerous human smuggling and trafficking organizations that operate on our northern border.”

    “Oakes’ arrest comes as part of our nearly two-year long investigation into a transnational criminal organization responsible for the large-scale smuggling of aliens from Canada into the United States,” said U.S. Immigration and Customs Enforcement Homeland Security Investigations (ICE HSI) Buffalo Special Agent in Charge Erin Keegan. “ICE HSI leverages its full range of authorities to combat and dismantle the heinous networks of greedy criminals who illicitly sell dangerous, sometimes fatal, passage through our nation’s northern border. We are extremely grateful for a multitude of law enforcement agency partners on the Border Enforcement Security Taskforce who join us in this fight to bring smugglers to justice.”

    “Two toddler aged children and their parents were the tragic victims of an alien smuggling attempt gone horribly wrong,” said Chief Patrol Agent Robert Garcia of the U.S. Border Patrol’s Swanton Sector. “Their deaths were a direct result of callous smugglers who exploited the vulnerable. Due to unrelenting perseverance and investigative efforts by multiple law enforcement agencies, those responsible will be held accountable. Our pursuit of justice persists until justice is served.”

    According to court documents, Oakes was a key facilitator in a human smuggling organization (HSO) that smuggled aliens from Canada into northern New York. Oakes, working with the HSO, routinely smuggled aliens into the United States by piloting boats across the St. Lawrence River. Additionally, Oakes used his home as a staging area for aliens before the HSO smuggled them into the United States. Oakes earned approximately $1,000 for every alien whom he smuggled across the St. Lawrence River into the United States.

    In March 2023, Oakes housed a Romanian family of four, together with other aliens, for about 24 hours. He then transported the family and a boat to a public boat launch. His brother, Casey Oakes, attempted to use the boat to smuggle the Romanian family into the United States, but the boat capsized, killing all four members of the family, as well as Casey Oakes.    

    Terrance, Montour, and Sharrow admitted in their plea agreements that in late March 2023, they were employed to illegally transport a Romanian family of four — a mother, father, one-year-old boy, and two-year-old girl — from Canada into New York. Specifically, Montour admitted that he was aware of the dangerous weather conditions on the day of the tragedy — high winds, freezing temperatures, and limited visibility — yet another co-conspirator still loaded the family of four into the small boat to attempt to cross the St. Lawrence River.

    HSI Massena engaged in an extensive years-long investigation of the case, with assistance from the U.S. Border Patrol, U.S. Customs and Border Protection (CBP), HSI’s Human Smuggling Unit in Washington, D.C., CBP’s National Targeting Center International Interdiction Task Force, New York State Police, Canada Border Services Agency, Akwesasne Mohawk Police Service, St. Regis Mohawk Tribal Police Department, Ontario Provincial Police, Sûreté du Québec, St. Lawrence County Sheriff’s Department, Royal Canadian Mounted Police, and the Cornwall Police Service. The Justice Department’s Office of International Affairs provided significant support with foreign legal assistance requests.

    The defendant’s vehicle with light blue boat in tow on March 29, 2023, at 9:29 p.m., consistent with the boat found in the river during recovery efforts.

    The investigation is a result of the coordinated efforts of Joint Task Force Alpha (JTFA). JTFA, a partnership with the Department of Homeland Security (DHS), has been elevated and expanded by the Attorney General with a mandate to target cartels and other transnational criminal organizations and eliminate human smuggling and trafficking networks operating within the Americas that impact public safety and the security of our borders. JTFA currently comprises detailees from U.S. Attorneys’ Offices along the border, including the Northern District of New York. Dedicated support is provided by numerous components of the Justice Department’s Criminal Division, led by the Human Rights and Special Prosecutions Section (HRSP) and supported by the Money Laundering and Asset Recovery Section, the Office of Enforcement Operations and the Office of International Affairs, among others. JTFA also relies on substantial law enforcement investment from DHS, FBI, and the Drug Enforcement Administration, and other partners. To date, JTFA’s work has resulted in more than 380 domestic and international arrests of leaders, organizers, and significant facilitators of alien smuggling; more than 340 U.S. convictions; more than 290 significant jail sentences imposed; and forfeitures of substantial assets.

    The investigation is being conducted under the Extraterritorial Criminal Travel Strike Force (ECT) program, a joint partnership between the Justice Department’s Criminal Division and HSI. The ECT program focuses on human smuggling networks that may present particular national security or public safety risks, or present grave humanitarian concerns. ECT has dedicated investigative, intelligence and prosecutorial resources. ECT coordinates and receives assistance from other U.S. government agencies and foreign law enforcement authorities.

    Trial Attorney Jenna E. Reed of the Criminal Division’s HRSP and Assistant U.S. Attorney Jeffrey Stitt for the Northern District of New York are prosecuting the case.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces and Project Safe Neighborhoods.

    MIL Security OSI

  • MIL-OSI Banking: RBI appoints Shri Kesavan Ramachandran as new Executive Director

    Source: Reserve Bank of India

    The Reserve Bank of India (RBI) has appointed Shri Kesavan Ramachandran as Executive Director (ED) with effect from July 01, 2025.

    Prior to being promoted as ED, Shri Kesavan Ramachandran was serving as Principal Chief General Manager in Risk Monitoring Department.

    Shri Kesavan Ramachandran has experience of over three decades in areas relating to currency management, Banking and Non-Banking supervision, training and administration. He also served as Principal of the Reserve Bank Staff College during his career. He served as, RBI’s nominee on the Board of Canara Bank for over five years and on the Auditing and Assurance Standards Board of ICAI for two years.

    As Executive Director, Shri Kesavan Ramachandran will look after Department of Regulation (Prudential Regulation Division).

    Shri Kesavan Ramachandran is a post-graduate with an MBA in Banking and Finance and holds a diploma in International Financial Reporting from ACCA, UK. He is also a Certified Associate of the IIBF.

    (Puneet Pancholy)  
    Chief General Manager

    Press Release: 2025-2026/639

    MIL OSI Global Banks

  • MIL-OSI: Combined General Meeting of July 22, 2025 Conditions for Obtaining the Preparatory Documents

    Source: GlobeNewswire (MIL-OSI)

    COMBINED GENERAL MEETING
    OF JULY 22, 2025

    CONDITIONS FOR OBTAINING THE PREPARATORY DOCUMENTS

    Bernin (Grenoble), France, on July 1, 2025 – Soitec (Euronext Paris) reminds that the Company’s shareholders are invited to attend the Annual General Meeting to be held on Tuesday July 22, 2025 at 9:30 a.m. (Paris time), in the Auditorium of the VERSO conference Center located at 52 rue de la Victoire, 75009 Paris, France.

    The preliminary meeting notice serving as convening notice as provided for in Article R. 225-73 of the French Commercial Code, including the agenda and the draft resolutions to be submitted to the shareholders’ vote during this Annual General Meeting as well as the information on how to attend and vote at the Annual General Meeting, has been published in the French legal gazette (Bulletin des Annonces Légales Obligatoires (BALO)) of June 13, 2025, bulletin No 71.

    The convening notice for this Annual General Meeting will be published in the French legal gazette “Les Affiches de Grenoble et du Dauphiné” on July 4, 2025.

    All the documents related to this Annual General Meeting are available on the Company’s website (www.soitec.com), in the section Investors/Shareholders & Analysts/Shareholders’ General Meetings/ 2025 Annual General Meeting, in accordance with laws and regulations in force.

    In accordance with article R. 225-88 of the French Commercial Code, shareholders may also obtain the documents provided for in articles R. 225-81 and R. 225-83 of the French Commercial Code, on written request made no later than five days before the date of the General Meeting, i.e. no later than Thursday July 17, 2025. This request shall be sent to the Company’s registered office by post, to the attention of the General Secretary, “AG 22 juillet 2025” Parc Technologique des Fontaines – Chemin des Franques – 38190 Bernin – France, or by e-mail to the following address: shareholders-gm@soitec.com. Requests from bearer shareholders must be accompanied by a shareholding certificate delivered by their financial intermediary mentioned in Article L. 211-3 of the French Monetary and Financial Code.
        
    Shareholders are invited to consult regularly the section dedicated to the 2025 Annual General Meeting on the Company’s website.

    This General Meeting will be broadcast live on Soitec’s website and will also be available for replay.

    # # #

     

    Agenda

    First-quarter 2025-2026 revenue: July 22, 2025, after market close.

    # # #

    About Soitec

    Soitec (Euronext – Tech 40 Paris), a world leader in innovative semiconductor materials, has for more than 30 years developed cutting-edge products that combine technological performance and energy efficiency. From its global headquarters in France, Soitec is expanding internationally with its unique solutions. The company occupies a key position in the semiconductor value chain, serving three strategic markets: mobile communications, automotive and industry, and smart devices. Soitec draws on the talent and diversity of its 2,300 employees, of 50 different nationalities, across its sites in Europe, the United States and Asia. More than 4,100 patents have been registered by Soitec.

    Soitec, SmartSiC™ and Smart Cut™ are registered trademarks of Soitec.

    For more information: https://www.soitec.com/en/

    # # #

                             

    Investor Relations: Media contacts:

    Attachment

    The MIL Network

  • MIL-OSI USA: ICYMI: Bipartisan Warren, Scott (Fla.) Letter Questions Biden Defense Secretary’s Decision to Launch Lobbying Firm

    US Senate News:

    Source: United States Senator for Massachusetts – Elizabeth Warren
    July 01, 2025
    Austin publicly promised Warren in 2021 he would not become a lobbyist after leaving government service
    “When our highest-ranking government officials and military officers treat their positions as steppingstones to personal enrichment, they corrupt the very institution they swore to defend.” 
    Text of Letter (PDF)
    Washington, D.C. — U.S. Senators Elizabeth Warren (D-Mass.) and Rick Scott (R-Fla.), both members of the Senate Armed Services Committee, wrote to former Secretary of Defense Lloyd Austin seeking an explanation and further information on his recent decision to start a strategic advisory firm. Austin had publicly promised Senator Warren during his 2021 confirmation process that he would not become a lobbyist after his government service ended. 
    On June 3, 2025, Politico reported that Austin was launching Clarion Strategies, along with other former Biden defense and national security officials, to help clients “navigate geopolitical upheaval…, advancements in defense technology…, [and] global trade shifts and emerging alliances among U.S. adversaries like Russia, China, North Korea and China.” This new venture undermines his promises to Senator Warren to “ensure that the public has no reason to question my impartiality” and “[had] no intent to be a lobbyist.” 
    “The revolving door between the Pentagon and K Street has been spinning for years during both Democratic and Republican administrations. In your case, this move is particularly disappointing because you made a clear promise during your nomination hearing to uphold the public trust,” wrote the senators. 
    Austin’s pledges helped secure similar commitments from other defense nominees, including Air Force Secretary Frank Kendall, Under Secretary of Defense for Research and Engineering Heidi Shyu, and Under Secretary of the Army Gabriel Camarillo. 
    Austin appears to have found a loophole by serving as an “adviser” rather than a registered lobbyist. 
    “[That] undermines the very purpose of the promise that you made to the American people: to close the revolving door of government officials cashing in on their public service by lobbying, advising…” wrote the lawmakers.
    The senators demanded clarity on Austin’s new role by July 14, 2025, including whether he’ll register to lobby on behalf of any company; if any current or prospective clients have contracts with the Defense Department; if he’ll work on behalf of any foreign government; if he’ll recuse from any matters involving any companies he worked with as Defense Secretary; and whether any clients would benefit from his security clearance. 
    As leaders of the Senate Armed Services Subcommittee on Personnel, Senators Warren and Scott held a hearing on the dangers of the revolving door. Both have also introduced legislation to tackle the revolving door, with Senator Warren introducing the Department of Defense Ethics and Anti-Corruption Act and Senator Scott introducing the Banning Lobbying and Safeguarding Trust (BLAST) Act to ban members of Congress from lobbying.
    Senator Warren has long sought to protect servicemembers and national security by pushing defense nominees to resolve their conflicts of interest: 
    In May 2025, Senator Warren pressed Mr. Michael Obadal, nominee for Under Secretary of the Army, on his refusal to divest from major defense contractors.
    In April 2025, Senator Warren secured a commitment from Lieutenant General John D. Caine, President Trump’s nominee to be the next Chairman of the Joint Chiefs of Staff, not to work for any major defense contractors—or companies affected by his official actions—after leaving government service. 
    In March 2025, ahead of his confirmation vote, Senator Elizabeth Warren wrote to Deputy Defense Secretary Nominee Stephen Feinberg, urging him to recuse himself from all matters related to Ligado Networks, which has a pending $39 billion lawsuit against the DoD. 
    In March 2025, Senator Elizabeth Warren wrote to Mr. Emil Michael, nominee for Under Secretary of Defense for Research and Engineering, with concern over his history of inappropriate behavior at work, his attacks on journalists and public accountability, and his ties to technology companies that may seek contracts with the Department of Defense. 
    In February 2025, ahead of his confirmation hearing before the Senate Armed Services Committee, Senator Elizabeth Warren wrote to Mr. Stephen Feinberg, nominee for Deputy Secretary of the Department of Defense, pressing him to explain his “serious conflicts of interest” and his track record of mismanagement.
    In January 2025, Senator Elizabeth Warren wrote to Mr. Michael Duffey, nominee for Under Secretary of Defense for Acquisition and Sustainment of the Department of Defense, ahead of his confirmation hearing, with serious concerns about his record, which include violating the law, disregarding Congressional authority, and his involvement in Project 2025. 
    In January 2025, Senator Elizabeth Warren wrote to Mr. Pete Hegseth, nominee for Secretary of the Department of Defense, regarding his ethics conflicts ahead of the Senate’s consideration of his nomination. Mr. Hegseth’s household’s ownership of stock in several defense contractors and his unwillingness to commit to the same post-employment restrictions he previously advocated for were particularly troubling for a prospective Secretary of Defense.
    In March 2024, Senator Elizabeth Warren secured ethics commitments from Douglas Schmidt, ahead of his confirmation to be the Director of Operational Test and Evaluation (DOT&E) for the Department of Defense.
    In July 2023, Senator Elizabeth Warren secured a commitment from General Charles Q. Brown, Jr., President Biden’s nominee to be the next Chairman of the Joint Chiefs of Staff, not to become a defense industry lobbyist or receive compensation from a defense contractor for four years after leaving government service. 
    In June 2023, Senator Elizabeth Warren and representative Andy Kim reintroduced the Department of Defense Ethics and Anti-Corruption Act, to limit the influence of contractors on the military, constrain foreign influence on retired senior military officers, and assert greater transparency over contractors and their interaction with DoD.
    In July 2021, Senator Elizabeth Warren secured agreements to four-year recusals from former clients’ and employers’ party matters from then-Secretary of the Air Force Frank Kendall and then-USD(R&E) Heidi Shyu.

    MIL OSI USA News

  • MIL-OSI: Ageas completes the acquisition of Saga’s Underwriting Business

    Source: GlobeNewswire (MIL-OSI)

    Ageas announced today that all necessary regulatory approvals for the acquisition of Acromas Insurance Company Limited (AICL), Saga’s Underwriting Business, have been obtained and the transaction has been completed.

    The completion of the acquisition of AICL represents the first milestone towards the establishment of a 20-year partnership with Saga Services Limited (SSL) for the distribution of personal lines Motor and Home insurance products to Saga’s customers, as communicated on 16 December 2024 (read the press release).

    The acquisition and the distribution agreement with Saga, the UK specialist provider of products and services to people aged over 50, aligns perfectly with Ageas’s Elevate27 strategy, to capitalise on its robust Non-Life presence across Europe, while accelerating solutions targeted at an ageing population, a rapidly expanding customer segment where the Group and Ageas UK already have real strength and expertise. Furthermore, it presents Ageas with the opportunity to enhance its position as a leading personal lines insurer in the UK.

    The overall consideration for the acquisition is approximately GBP 67 million – consistent with prior communications, and to be paid out between acquisition and the operational start date of the partnership. The overall Solvency II impact, including the Affinity Partnership, remains aligned with the previously communicated – 5%.

    Ageas is a Belgian rooted listed international insurance Group with a heritage spanning of 200 years. It offers Retail and Business customers Life and Non-Life insurance products designed to suit their specific needs, today and tomorrow, and is also engaged in reinsurance activities. As one of Europe’s larger insurance companies, Ageas concentrates its activities in Europe and Asia, which together make up the major part of the global insurance market. It operates successful insurance businesses in Belgium, the UK, Portugal, Türkiye, China, Malaysia, India, Thailand, Vietnam, Laos, Cambodia, Singapore, and the Philippines through a combination of wholly owned subsidiaries and long-term partnerships with strong financial institutions and key distributors. Ageas ranks among the market leaders in the countries in which it operates. It represents a staff force of about 50,000 people and reported annual inflows of EUR 18.5 billion in 2024.

    Attachment

    The MIL Network

  • MIL-OSI: Ageas completes the acquisition of Saga’s Underwriting Business

    Source: GlobeNewswire (MIL-OSI)

    Ageas announced today that all necessary regulatory approvals for the acquisition of Acromas Insurance Company Limited (AICL), Saga’s Underwriting Business, have been obtained and the transaction has been completed.

    The completion of the acquisition of AICL represents the first milestone towards the establishment of a 20-year partnership with Saga Services Limited (SSL) for the distribution of personal lines Motor and Home insurance products to Saga’s customers, as communicated on 16 December 2024 (read the press release).

    The acquisition and the distribution agreement with Saga, the UK specialist provider of products and services to people aged over 50, aligns perfectly with Ageas’s Elevate27 strategy, to capitalise on its robust Non-Life presence across Europe, while accelerating solutions targeted at an ageing population, a rapidly expanding customer segment where the Group and Ageas UK already have real strength and expertise. Furthermore, it presents Ageas with the opportunity to enhance its position as a leading personal lines insurer in the UK.

    The overall consideration for the acquisition is approximately GBP 67 million – consistent with prior communications, and to be paid out between acquisition and the operational start date of the partnership. The overall Solvency II impact, including the Affinity Partnership, remains aligned with the previously communicated – 5%.

    Ageas is a Belgian rooted listed international insurance Group with a heritage spanning of 200 years. It offers Retail and Business customers Life and Non-Life insurance products designed to suit their specific needs, today and tomorrow, and is also engaged in reinsurance activities. As one of Europe’s larger insurance companies, Ageas concentrates its activities in Europe and Asia, which together make up the major part of the global insurance market. It operates successful insurance businesses in Belgium, the UK, Portugal, Türkiye, China, Malaysia, India, Thailand, Vietnam, Laos, Cambodia, Singapore, and the Philippines through a combination of wholly owned subsidiaries and long-term partnerships with strong financial institutions and key distributors. Ageas ranks among the market leaders in the countries in which it operates. It represents a staff force of about 50,000 people and reported annual inflows of EUR 18.5 billion in 2024.

    Attachment

    The MIL Network

  • Rajnath Singh, US Defence Secretary discuss ways to strengthen defence ties, expand industry collaboration

    Source: Government of India

    Source: Government of India (4)

    Defence Minister Rajnath Singh and United States Secretary of Defense Mr Pete Hegseth held a telephonic conversation on Monday to discuss avenues for deepening defence cooperation between India and the United States.

    The discussion covered a wide range of issues, including long-term collaboration in the defence sector, expanded industry partnerships, and enhanced training and military exchanges. Both leaders agreed to build upon the momentum of this critical and mutually beneficial partnership, with a focus on interoperability, integration of defence industrial supply chains, logistics sharing, increased joint military exercises, and cooperation with other like-minded partners.

    During the conversation, Singh expressed appreciation for the consistent support extended by the United States to India in its fight against terrorism. Highlighting Pakistan’s track record, he said, “Pakistan’s long track record of cross-border terrorism is well known globally. It has become a safe haven for internationally banned terrorists who enjoy immunity there.”

    Referring to India’s recent counterterrorism operation, Operation Sindoor, the defence minister said, “India’s actions during Operation Sindoor were measured, non-escalatory, proportionate, and focused on disabling terrorist infrastructure.” He underlined that India reserves the right to respond and defend itself against terrorism, and to pre-empt and deter any further cross-border attacks.

    Singh also lauded Mr Hegseth for his leadership, which he said has helped elevate India–US defence ties to new levels. In turn, Secretary Hegseth invited Singh for an in-person meeting in the United States to further advance the bilateral partnership.

    In a post on X, Singh said the discussion aimed to review ongoing and new initiatives to deepen the defence partnership and strengthen capacity-building cooperation. He added that he looks forward to meeting the US Secretary of Defense at an early date.

    This was the third telephonic conversation between Rajnath Singh and Secretary Hegseth since January 2025, when Mr Hegseth assumed office as the US Secretary of Defense.

  • MIL-OSI Security: Two Convicted for Their Roles in Multimillion-Dollar Transnational Telephone Scam

    Source: US FBI

    ATLANTA – Pradip Parikh, 67, of Valley Stream, New York, and Alpesh Patel, 40, of Louisa, Virginia, have been convicted for their roles in a scam that defrauded unsuspecting Americans out of millions of dollars after a five-day jury trial.                                                                                                                                         

    “This case involved a scheme to defraud multiple victims – many of whom were elderly – and to callously rob them of their hard-earned savings,” said U.S. Attorney Theodore S. Hertzberg. “The defendants and their conspirators within and outside the United States enriched themselves through government-imposter scams designed to exploit the public’s inherent trust in federal institutions. The jury has spoken, and Parikh and Patel will now be held accountable for their crimes.”

    “These defendants deliberately preyed on some of our most vulnerable citizens—particularly the elderly—by impersonating Social Security officials and exploiting their trust,” said Michelle L. Anderson, Assistant Inspector General for Audit performing the duties of the Social Security Administration (SSA), Inspector General. “This telephone imposter scheme defrauded millions of Americans and caused real harm to individuals who believed they were protecting their benefits. Today’s convictions send a clear message: we will relentlessly pursue those who weaponize fear and deceit to commit fraud, and we thank our law enforcement partners for helping bring these perpetrators to justice.”

    “These defendants targeted mostly older adults to cheat them out of their savings,” said FBI Atlanta Special Agent in Charge Paul Brown. “This sentencing should make it known to individuals that protecting our most vulnerable community members is critically important, and we will hold accountable those who engage in these sorts of egregious fraud schemes.”

    According to U.S. Attorney Hertzberg, the charges, and other information presented in court: In 2022, Pradip Parikh, Alpesh Patel, and eight others were indicted for running, promoting, and profiting from an India-based call center scam targeting Americans. The fraudsters typically identified themselves as Social Security Administration employees, telling the victims that their Social Security Numbers had been compromised in connection with criminal activity and promising to help “protect” their assets. Upon luring the victims to agree to this offer, the fraudsters directed the victims to send money to bank accounts controlled by Parikh, Patel, and other conspirators. 

    During the defendants’ trial, a 70-year-old victim from New Jersey testified that one of the conspirators told her that she would be arrested and lose all her assets if she did not transfer funds to accounts that the caller designated. In response, the victim transferred more than $600,000 of her lifesavings to multiple banks accounts, including $150,000 to an account called “JDM Management” that Parikh controlled.

    A recently widowed mother of eight testified that she transferred over $300,000 to JDM Management’s account as part of the scheme. Parikh then laundered the funds, retaining thousands for himself and transferring the balance to a conspirator. 

    Other victims testified that they wired money to an account called “Seven Points Agency” that Patel controlled. Evidence admitted during trial revealed that the Seven Points Agency account was opened just before scam victims began wiring money into it. More than $100,000 was deposited into the account in the span of two days, and Patel immediately diverted those funds to a conspirator after keeping approximately $10,000 for himself. 

    Pradip Parikh and Alpesh Patel were charged with conspiracy to commit wire fraud, conspiracy to commit money laundering, and two substantive counts of money laundering. The jury convicted Patel of all the counts. Parikh was convicted of conspiracy to commit money laundering and two substantive counts of money laundering. 

    The conspiracy to commit wire fraud count carries a maximum penalty of 20 years of imprisonment, and the money laundering counts each carry a maximum penalty of ten years of incarceration. In determining the actual sentence, the court will consider the United States Sentencing Guidelines, which are not binding but provide appropriate sentencing ranges for most offenders.

    Sentencing hearings for the defendants will be scheduled at a future date before United States District Judge William M. Ray II.

    This case is being investigated by the Social Security Administration – Office of the Inspector General and the Federal Bureau of Investigation.

    Assistant United States Attorney Angela Adams and Special Assistant United States Attorney Diane C. Schulman are prosecuting the case.

    The U.S. Attorney’s Office for the Northern District of Georgia is part of the Department of Justice Transnational Elder Fraud Strike Force. The Strike Force focuses on investigating and prosecuting defendants associated with foreign-based fraud schemes that disproportionately affect American seniors. These include romance scams, phone scams, mass-mailing fraud schemes, and tech-support fraud schemes. For further information on these scams, see https://www.justice.gov/elderjustice/senior-scam-alert.

    For further information please contact the U.S. Attorney’s Public Affairs Office at USAGAN.PressEmails@usdoj.gov or (404) 581-6185. The Internet address for the U.S. Attorney’s Office for the Northern District of Georgia is http://www.justice.gov/usao-ndga.

    MIL Security OSI

  • MIL-OSI Security: Two Convicted for Their Roles in Multimillion-Dollar Transnational Telephone Scam

    Source: US FBI

    ATLANTA – Pradip Parikh, 67, of Valley Stream, New York, and Alpesh Patel, 40, of Louisa, Virginia, have been convicted for their roles in a scam that defrauded unsuspecting Americans out of millions of dollars after a five-day jury trial.                                                                                                                                         

    “This case involved a scheme to defraud multiple victims – many of whom were elderly – and to callously rob them of their hard-earned savings,” said U.S. Attorney Theodore S. Hertzberg. “The defendants and their conspirators within and outside the United States enriched themselves through government-imposter scams designed to exploit the public’s inherent trust in federal institutions. The jury has spoken, and Parikh and Patel will now be held accountable for their crimes.”

    “These defendants deliberately preyed on some of our most vulnerable citizens—particularly the elderly—by impersonating Social Security officials and exploiting their trust,” said Michelle L. Anderson, Assistant Inspector General for Audit performing the duties of the Social Security Administration (SSA), Inspector General. “This telephone imposter scheme defrauded millions of Americans and caused real harm to individuals who believed they were protecting their benefits. Today’s convictions send a clear message: we will relentlessly pursue those who weaponize fear and deceit to commit fraud, and we thank our law enforcement partners for helping bring these perpetrators to justice.”

    “These defendants targeted mostly older adults to cheat them out of their savings,” said FBI Atlanta Special Agent in Charge Paul Brown. “This sentencing should make it known to individuals that protecting our most vulnerable community members is critically important, and we will hold accountable those who engage in these sorts of egregious fraud schemes.”

    According to U.S. Attorney Hertzberg, the charges, and other information presented in court: In 2022, Pradip Parikh, Alpesh Patel, and eight others were indicted for running, promoting, and profiting from an India-based call center scam targeting Americans. The fraudsters typically identified themselves as Social Security Administration employees, telling the victims that their Social Security Numbers had been compromised in connection with criminal activity and promising to help “protect” their assets. Upon luring the victims to agree to this offer, the fraudsters directed the victims to send money to bank accounts controlled by Parikh, Patel, and other conspirators. 

    During the defendants’ trial, a 70-year-old victim from New Jersey testified that one of the conspirators told her that she would be arrested and lose all her assets if she did not transfer funds to accounts that the caller designated. In response, the victim transferred more than $600,000 of her lifesavings to multiple banks accounts, including $150,000 to an account called “JDM Management” that Parikh controlled.

    A recently widowed mother of eight testified that she transferred over $300,000 to JDM Management’s account as part of the scheme. Parikh then laundered the funds, retaining thousands for himself and transferring the balance to a conspirator. 

    Other victims testified that they wired money to an account called “Seven Points Agency” that Patel controlled. Evidence admitted during trial revealed that the Seven Points Agency account was opened just before scam victims began wiring money into it. More than $100,000 was deposited into the account in the span of two days, and Patel immediately diverted those funds to a conspirator after keeping approximately $10,000 for himself. 

    Pradip Parikh and Alpesh Patel were charged with conspiracy to commit wire fraud, conspiracy to commit money laundering, and two substantive counts of money laundering. The jury convicted Patel of all the counts. Parikh was convicted of conspiracy to commit money laundering and two substantive counts of money laundering. 

    The conspiracy to commit wire fraud count carries a maximum penalty of 20 years of imprisonment, and the money laundering counts each carry a maximum penalty of ten years of incarceration. In determining the actual sentence, the court will consider the United States Sentencing Guidelines, which are not binding but provide appropriate sentencing ranges for most offenders.

    Sentencing hearings for the defendants will be scheduled at a future date before United States District Judge William M. Ray II.

    This case is being investigated by the Social Security Administration – Office of the Inspector General and the Federal Bureau of Investigation.

    Assistant United States Attorney Angela Adams and Special Assistant United States Attorney Diane C. Schulman are prosecuting the case.

    The U.S. Attorney’s Office for the Northern District of Georgia is part of the Department of Justice Transnational Elder Fraud Strike Force. The Strike Force focuses on investigating and prosecuting defendants associated with foreign-based fraud schemes that disproportionately affect American seniors. These include romance scams, phone scams, mass-mailing fraud schemes, and tech-support fraud schemes. For further information on these scams, see https://www.justice.gov/elderjustice/senior-scam-alert.

    For further information please contact the U.S. Attorney’s Public Affairs Office at USAGAN.PressEmails@usdoj.gov or (404) 581-6185. The Internet address for the U.S. Attorney’s Office for the Northern District of Georgia is http://www.justice.gov/usao-ndga.

    MIL Security OSI

  • MIL-OSI Africa: World Bank Group Appoints New Division Director for Mozambique, Madagascar, Mauritius, Comoros and Seychelles


    Download logo

    The World Bank Group has appointed Fily Sissoko as the new Division Director for Mozambique, Madagascar, Mauritius, Comoros, and Seychelles, effective today. He succeeds Idah Pswarayi-Riddihough, who held the position for the past four and a half years.

    In this new role, Mr. Sissoko will lead the World Bank Group’s engagement with government counterparts, development partners, and other stakeholders, advancing initiatives aligned with national priorities and the World Bank’s vision of a world free of poverty on a livable planet.

    An Ivorian national, Mr. Sissoko brings over 23 years of development experience across Africa, East Asia, South Asia, and the Pacific. Most recently, he served as the World Bank Country Manager for Togo, based in Lome. Prior to that, he was  the manager for the Governance Global Practice for the East Asia and Pacific region. He began his career at the World Bank in 2002 as a Financial Management Specialist in Dakar, Senegal, and has since held several leadership roles in financial management.

    Based in Maputo, Mr. Sissoko will oversee a portfolio of 63 projects totaling $8.5 billion in commitments across the five countries. This support spans key sectors including education, energy, health, social protection, infrastructure, agriculture, governance, and private sector development.

    Distributed by APO Group on behalf of The World Bank Group.

    MIL OSI Africa

  • MIL-OSI: Neptune Maritime Leasing Completes Refinancing of Golden Energy Offshore Services ASA Fleet

    Source: GlobeNewswire (MIL-OSI)

    The GEOS vessel ENERGY SWAN

    ST HELIER, Jersey, July 01, 2025 (GLOBE NEWSWIRE) — Neptune Maritime Leasing Limited (“Neptune Leasing” or the “Company”) is delighted to announce that it has entered into a new USD 95,000,000 sale and leaseback facility for the seven-vessel fleet of Golden Energy Offshore Services ASA (“GEOS”) (OSLO: GEOS) in June 2025. Neptune Leasing is pleased to announce that yesterday GEOS drew six of the seven tranches available under the facility for each of the vessels Energy Duchess, Energy Empress, Energy Pace, Energy Passion, Energy Partner and Energy Paradise. Financing of the 7th vessel is expected to be completed in July 2025.

    Harris Antoniou, Founder and CEO of Neptune Leasing stated: “We are very pleased that this facility is a major step forward in strengthening Golden Energy Offshore Services’ position within the offshore industry and will allow GEOS to actively pursue its stated objective of growth and shareholder value creation. This year 2025 is yet another year of growth for Neptune Leasing. As communicated in the past, we continue to expand our fleet, as well as to grow our sector coverage to include offshore vessels and our geographic coverage to include Norway, the Middle East and Asia.”

    About Golden Energy Offshore Services ASA

    www.geoff.no/investors-geos

    GEOS ASA is an offshore service company based in Ålesund, Norway. The Company operates supply and service vessels to the offshore industry. The Company fleet is used within the Oil & Gas and Renewable Offshore industry. The Company is listed on Euronext Growth in Oslo Stock Exchange under the ticker “GEOS”.

    About Neptune Maritime Leasing

    www.neptuneleasing.com

    Neptune Maritime Leasing was established in 2021. It is a growth-oriented maritime leasing platform with the mission to providing shipowners with access to a flexible financing tool and investors with secure access to an under-invested asset class with attractive real yield. Our strategy is to buy high quality assets and build a portfolio of long-term contracts through sale and leaseback transactions in diverse maritime sectors. We are committed to delivering attractive, long-term, risk-adjusted, and responsible returns to our investors, by advancing global trade and economic growth through supporting the maritime industry, and by making a positive contribution to the environment and to society as a whole.

    For more information please contact:

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/dc90c6b9-e56e-487c-a7e1-ecf9bce7e1af

    The MIL Network

  • MIL-OSI: GRANDE GROUP LIMITED ANNOUNCES PRICING OF INITIAL PUBLIC OFFERING

    Source: GlobeNewswire (MIL-OSI)

    Hong Kong, July 01, 2025 (GLOBE NEWSWIRE) — GRANDE GROUP LIMITED (“GRAN” or the “Company”), a Hong Kong-based financial services provider which principally engages in the provision of corporate finance advisory services and IPO sponsor services through its Hong Kong subsidiary, Grande Capital Limited, today announced the pricing of its initial public offering (the “Offering”) of 1,875,000 Class A ordinary shares (the “Class A Ordinary Shares”) at the price of $5.00 per Class A Ordinary Shares (the “Offering Price”).

    The Class A Ordinary Shares are expected to commence trading on the Nasdaq Capital Market on July 1, 2025 under the ticker symbol “GRAN.” The Offering is expected to close on July 2, 2025, subject to the satisfaction of customary closing conditions.

    The Company expects to receive gross proceeds of approximately US$9.375 million from the Offering, before deducting underwriting discounts and other offering expenses. In addition, the Company has granted the underwriters a 45-day option (the “Over-Allotment Option”) to purchase up to an additional 281,250 Class A Ordinary Shares at the Offering Price, representing 15% of the Class A Ordinary Shares sold in the Offering (the “Over-allotment”). 

    The Company intends to use the net proceeds from the Offering for strengthening the corporate finance advisory business, developing the asset management business, establishing equity capital market services, and general working capital purposes.

    The Offering is conducted on a firm commitment basis. Cathay Securities, Inc. is acting as the underwriter (the “Underwriter”) for the Offering. Ortoli Rosenstadt LLP is acting as the U.S. securities counsel to the Company. Ogier is acting as the British Virgin Islands legal counsel to the Company. Loong & Yeung and David Fong & Co. are acting as the Hong Kong legal counsels to the Company. WWC, P.C. is acting as the independent registered public accounting firm of the Company.  Hunter Taubman Fischer & Li LLC is acting as the U.S. securities counsel to the Underwriter, in connection with the Offering.

    The Offering is being conducted pursuant to the Company’s Registration Statement on Form F-1 (File No. 333-283705) previously filed with, and subsequently declared effective on June 30, 2025 by the U.S. Securities and Exchange Commission (the “SEC”). The Offering is being made only by means of a prospectus. Copies of the final prospectus related to the Offering may be obtained, when available, from Cathay Securities, Inc.: 40 Wall St Suite 3600, New York, NY 10005, United States, Attention: Shell Li, or via email at service@cathaysecurities.com or telephone at +1 (855) 939-3888, or via the SEC’s website at www.sec.gov.
     
    Before you invest, you should read the prospectus and other documents the Company has filed or will file with the SEC for more information about the Company and the Offering. This press release has been prepared for informational purposes only and shall not constitute an offer to sell or the solicitation of an offer to buy any securities, and no sale of these securities may be made in any state or jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of any such state or other jurisdiction.

    About Grande Group Limited

    Through its Hong Kong subsidiary, Grande Capital Limited, Grande Group Limited is a Hong Kong-based financial services provider which principally engages in the provision of corporate finance advisory services and IPO sponsor services. Grande Capital Limited is licensed with the Securities and Futures Commission of Hong Kong (“HKSFC”) to engage in Type 1 (dealing in securities) and Type 6 (advising on corporate finance) regulated activities in Hong Kong. For more information, please visit: https://grande-capital.com/ 

    Forward-Looking Statement

    This press release contains forward-looking statements. Forward-looking statements include statements concerning plans, objectives, goals, strategies, future events or performance, and underlying assumptions and other statements that are other than statements of historical facts. When the Company uses words such as “may, “will, “intend,” “should,” “believe,” “expect,” “anticipate,” “project,” “estimate” or similar expressions that do not relate solely to historical matters, it is making forward-looking statements. These forward-looking statements include, without limitation, the Company’s statements regarding the expected trading of its Class A Ordinary Shares on the Nasdaq Capital Market, its intended use of proceeds and the closing of the Offering. Forward-looking statements are not guarantees of future performance and involve risks and uncertainties that may cause the actual results to differ materially from the Company’s expectations discussed in the forward-looking statements. These statements are subject to uncertainties and risks including, but not limited to, the uncertainties related to market conditions and the completion of the initial public offering on the anticipated terms or at all, and other factors discussed in the “Risk Factors” section of the registration statement filed with the SEC. For these reasons, among others, investors are cautioned not to place undue reliance upon any forward-looking statements in this press release. Additional factors are discussed in the Company’s filings with the SEC, which are available for review at www.sec.gov. The Company undertakes no obligation to publicly revise these forward-looking statements to reflect events or circumstances that arise after the date hereof.

    For more information, please contact:

    Grande Group Limited Investor Relations Contact:
    Christensen Advisory
    Joanna Quan
    Email:grande.capital@christensencomms.com 
    Tel: +86-10-5900-1548

    The MIL Network

  • Trump to discuss Gaza, Iran with Netanyahu at Monday meeting

    Source: Government of India

    Source: Government of India (4)

    U.S. President Donald Trump said on Tuesday he will discuss the situations in Gaza and Iran when he meets with Israeli Prime Minister Benjamin Netanyahu at the White House next week, adding that he hopes to achieve a ceasefire in Gaza soon.

    Trump plans to meet Netanyahu on Monday. A senior Israeli official, Ron Dermer, has been in Washington this week holding talks ahead of the meeting.

    Trump and Netanyahu worked together on a military operation against Iran’s nuclear sites in June that culminated with American B-2 bombing raids. Trump said the strikes “obliterated” Tehran’s nuclear capability, although there remains a debate about the degree of damage done to the Iranian nuclear program.

    Trump said he is hopeful that a ceasefire-for-hostages agreement can be achieved next week between Israel and Iran-backed Hamas militants in Gaza.

    “We hope it’s going to happen. And we’re looking forward to it happening sometime next week,” he told reporters as he departed the White House for a day trip to Florida. “We want to get the hostages out.”

    Hamas has said it is willing to free remaining hostages in Gaza under any deal to end the war, while Israel says it can only end if Hamas is disarmed and dismantled. Hamas refuses to lay down its arms.

    The war in Gaza was triggered when Hamas-led militants attacked Israel on October 7, 2023, killing 1,200 people and taking 251 hostages, according to Israeli tallies.

    Gaza’s health ministry says Israel’s post-Oct. 7 military assault has killed over 56,000 Palestinians. The assault has also caused a hunger crisis, internally displaced Gaza’s entire population and prompted accusations of genocide at the International Court of Justice and of war crimes at the International Criminal Court. Israel denies the accusations.

    A White House official, asked about Dermer’s scheduled meetings and agenda, said: “Ron Dermer visits the White House regularly.”

    “This will continue as President Trump pursues a path to peace for Israel and Gaza,” the official added. The official did not immediately identify the Trump aides Dermer would see during his visit.

    -REUTERS

  • MIL-OSI: Unlock 100x Leverage Crypto Futures Trading – No KYC, Double Deposit Bonus and $50 Welcome Bonus for All on BexBack

    Source: GlobeNewswire (MIL-OSI)

    SINGAPORE, July 01, 2025 (GLOBE NEWSWIRE) — BexBack Exchange is offering an exciting new promotion: a 100% deposit bonus, a $50 welcome bonus for new users, and 100x leverage on cryptocurrency futures trading – all with no KYC required! This is your chance to maximize potential returns in a high-volatility market.

    What Is 100x Leverage and How Does It Work?

    Simply put, 100x leverage allows you to open larger trading positions with less capital. For example:

    Suppose the Bitcoin price is $100,000 that day, and you open a long contract with 1 BTC. After using 100x leverage, the transaction amount is equivalent to 100 BTC.

    One day later, if the price rises to $105,000, your profit will be (105,000 – 100,000) * 100 BTC / 100,000 = 5 BTC, a yield of up to 500%.

    With BexBack’s deposit bonus

    BexBack offers a 100% deposit bonus. If the initial investment is 2 BTC, the profit will increase to 10 BTC, and the return on investment will double to 1000%.

    Note: Although leveraged trading can magnify profits, you also need to be wary of liquidation risks.

    How Does the 100% Deposit Bonus Work?
    The deposit bonus from BexBack cannot be directly withdrawn but can be used to open larger positions and increase potential profits. Additionally, during significant market fluctuations, the bonus can serve as extra margin, effectively reducing the risk of liquidation.

    About BexBack?

    BexBack is a top-tier cryptocurrency derivatives platform offering up to 100x leverage on BTC, ETH, ADA, SOL, XRP, and over 50 other futures contracts. Headquartered in Singapore, with additional offices in Hong Kong, Japan, the United States, the UK, and Argentina, BexBack is licensed as a US MSB (Money Services Business). Trusted by more than 500,000 traders globally, the platform welcomes users from the US, Canada, and Europe. BexBack offers zero deposit fees and provides comprehensive customer service available 24/7 to ensure an exceptional trading experience.

    Why recommend BexBack?

    No KYC Required: Start trading immediately without complex identity verification.

    100% Deposit Bonus: Double your funds, double your profits.

    High-Leverage Trading: Offers up to 100x leverage, maximizing investors’ capital efficiency.

    Demo Account: Comes with 10 BTC and 1M USDT in virtual funds, ideal for beginners to practice risk-free trading.

    Comprehensive Trading Options: Feature-rich trading available via Web and mobile applications.

    Convenient Operation: No slippage, no spread, and fast, precise trade execution.

    Global User Support: Enjoy 24/7 customer service, no matter where you are.

    Lucrative Affiliate Rewards: Earn up to 50% commission, perfect for promoters.

    Take Action Now—Don’t Miss Another Opportunity!

    If you missed the previous crypto bull run, this could be your chance. With BexBack’s 100x leverage and 100% deposit bonus and $50 bonus for new users (Deposit greater than 0.001BTC or 100 USDT, complete one trade within one week of registration), you can be a winner in the new bull run.

    Sign up on BexBack now, claim your exclusive bonus and start accumulating more BTC today!

    Website: www.bexback.com

    Contact: business@bexback.com

    Contact:
    Amanda
    business@bexback.com

    Disclaimer: This content is provided by BexBack. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice. Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed. Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    Photos accompanying this announcement are available at:

    https://www.globenewswire.com/NewsRoom/AttachmentNg/2d03f49f-d7b3-401a-9988-053590cfda63

    https://www.globenewswire.com/NewsRoom/AttachmentNg/daf8914e-2079-4717-8d36-efa1a566697a

    https://www.globenewswire.com/NewsRoom/AttachmentNg/2eb23df0-ddbf-4ac4-a662-c5d31021ecee

    https://www.globenewswire.com/NewsRoom/AttachmentNg/a25922c5-f7e3-44f2-8c54-7532303d83c4

    The MIL Network

  • MIL-OSI Video: Gaza: “Level of suffering and brutality is unbearable” – Briefing to the UN Security Council

    Source: United Nations (video statements)

    Briefing by Khaled Khiari, Assistant Secretary-General for the Middle East, Asia and the Pacific, on the situation in the Middle East, including the Palestinian question.

    Assistant Secretary-General Khaled Khiari today (30 Jun) told the Security Council that “the level of suffering and brutality in Gaza is unbearable,” and “the continued collective punishment of the Palestinian people is unjustifiable.”

    Khiari expressed deep concern at “Israeli military operations in Gaza that render large areas of Gaza uninhabitable,” and rejected “the forced displacement of the Palestinian population from any part of the Occupied Palestinian Territory, which would constitute a breach of international law obligations.”

    He mourned the United Nations personnel killed in Gaza and “strongly” condemned “the killing of all health and humanitarian personnel and journalists.”

    Khiari also condemned “the loss of lives and injuries of Palestinians seeking aid in Gaza” and called for “an immediate and independent investigation into these events and for perpetrators to be held accountable.”

    He stressed that the United Nations “will not participate in any aid delivery modality that does not comply with the fundamental humanitarian principles of humanity, impartiality, independence, and neutrality.”

    https://www.youtube.com/watch?v=IuslSimvhqg

    MIL OSI Video

  • India–Ghana relations to get fresh push with PM Modi’s landmark two-day visit

    Source: Government of India

    Source: Government of India (4)

    Prime Minister Narendra Modi’s two-day visit to Ghana from July 2, marks a landmark moment in India–Ghana relations. This will be the first visit by an Indian Prime Minister to Ghana in more than three decades and PM Modi’s first bilateral engagement with the West African nation. The visit is expected to deepen cooperation in trade, development partnership, capacity building and cultural exchange, strengthening a warm relationship that has endured since Ghana’s independence.

    Historical Context

    India and Ghana share historical ties rooted in anti-colonial solidarity and a shared vision for the Global South. India established its representative office in Accra in 1953, four years before Ghana gained independence in 1957. Diplomatic relations were formally established the same year, laying the foundation for a close and friendly partnership.

    Political Engagement and High-Level Visits

    High-level exchanges have played a crucial role in nurturing this bond. From the Ghanaian side, President Nana Addo Dankwa Akufo-Addo visited India in March 2018 for the International Solar Alliance Founding Conference and later addressed the Voice of Global South Summit hosted by Prime Minister Modi in January 2023. Before him, President John Dramani Mahama travelled to India in October 2015 to attend the third India-Africa Forum Summit. Other notable visits include President Kufuor’s trips in 2002 and 2008, President Rawlings’ visit in 1993, President Limann’s in 1981 and President Kwame Nkrumah’s historic visit in 1961.

    From the Indian side, President Pranab Mukherjee visited Ghana in June 2016. Before that, Prime Minister P.V. Narasimha Rao’s visit in November 1995 was the last by an Indian Prime Minister, making PM Modi’s upcoming trip especially significant. Recent engagements have kept the momentum alive, with External Affairs Minister Dr. S. Jaishankar meeting President Akufo-Addo in September 2022 and Minister of State V. Muraleedharan attending the Ghanaian Presidential inauguration in January 2021.

    Institutional Mechanisms

    India and Ghana have built robust institutional mechanisms to sustain regular dialogue. The Joint Commission was established in 1995 and reinforced in 2016, while a protocol for Foreign Office Consultations was signed in 2002. Three rounds of consultations have been held since then, with the latest in New Delhi in 2022. The Joint Trade Committee, operational since 1981, held its fourth meeting in Accra in May 2024. Ghana’s Parliamentary Friendship Association also contributes to exchanges at the legislative level.

    Commercial Partnership

    India is among Ghana’s top trading partners and the largest destination for Ghanaian exports. Bilateral trade crossed two billion US dollars in 2022–23, with Ghana enjoying a positive trade balance due to substantial gold exports. Indian investments in Ghana are valued at over 1.2 billion dollars, spanning sectors such as pharmaceuticals, agro-processing, construction, manufacturing and ICT. Platforms like the CII-Exim Bank Conclave on India–Africa Project Partnership continue to play an important role in strengthening commercial ties. Ghana has been an active participant, with the 19th edition of the conclave in August 2024 witnessing the participation of four Ghanaian ministers and senior regulatory officials.

    Development Partnership

    India has been a committed development partner for Ghana, extending around 450 million US dollars in concessional credit and grants for infrastructure and capacity-building projects. Landmark initiatives include the India-Ghana Kofi Annan ICT Centre of Excellence established in 2003, the Rural Electrification Project, the Jubilee House Presidential Complex which was rehabilitated in 2017, and industrial ventures like the Komenda Sugar Plant and Elmina Fish Processing Plant inaugurated in 2016. Under Buyer’s Credit, India supported the construction of the Tema-Mpakadan Standard Gauge Railway Line, which was inaugurated in November 2024 and is expected to boost regional connectivity by linking Ghana’s main port city to its hinterland and neighbouring Burkina Faso. Other key projects include the Tamale-Walewale Road and an assembly plant for agricultural machinery.

    Capacity Building & Human Resource Development

    Ghana is also one of the largest beneficiaries of India’s flagship capacity-building programmes. Over 1,600 scholarships have been offered under the e-Vidya Bharati and e-Arogya Bharati digital network project. Hundreds of Ghanaians have benefited from ITEC and ICCR scholarships. In 2024 alone, 128 civilians and 109 defence personnel from Ghana trained in India under ITEC, while 35 ICCR scholarships and three AYUSH scholarships were awarded. Education fairs held in Kumasi and Accra in 2024 and 2025 have strengthened linkages between Indian institutions and Ghanaian students.

    Sectoral Cooperation

    Sectoral cooperation has grown steadily over the years. Agreements have been signed to promote cooperation in areas like LPG distribution, peaceful uses of nuclear energy and standardisation through collaborations between India’s Bureau of Indian Standards and Ghana Standards Authority. Air connectivity is facilitated through the Air Services Agreement signed in 1978 and updated through subsequent MoUs. Cultural exchange remains a vibrant aspect of the partnership, anchored by a Cultural Agreement signed in 1981 and periodic Cultural Exchange Programmes. India also extended humanitarian support to Ghana during the COVID-19 pandemic, providing 50,000 vaccine doses as a grant and over 1.6 million doses through the COVAX facility.

    Prime Minister Modi’s visit is expected to inject fresh momentum into the bilateral partnership by expanding trade, boosting investments in energy and digital infrastructure, advancing cooperation in defence and capacity building, and deepening collaboration in health, education and climate action. 

  • MIL-OSI Russia: Seychelles’ Path to Macroeconomic Stability and Resilience

    Source: IMF – News in Russian

    Comprehensive reforms have fueled Seychelles’ journey out of crisis and its continued resilience in the face of shocks

    Seychelles—a nation of 115 islands in the Indian Ocean—today enjoys a comparatively high degree of economic stability. Inflation is below 2 percent, real GDP has largely recovered from the pandemic, public debt is on course to reach the government’s target of less than 50 percent of GDP before 2030, and per capita income is the highest in Sub-Saharan Africa. But this stands in stark contrast to the country’s fortunes twenty years ago when it faced an economic crisis. What’s behind this turnaround?

    From times of crisis

    In the mid-2000s, Seychelles faced significant macroeconomic challenges stemming from expansionary fiscal policies and a rigid state-led economy. Large fiscal deficits were driven by high public spending on capital projects, subsidies, transfers to state enterprises and high debt service payments, while government revenues were constrained by significant tax concessions to foreign investors in the growing tourism sector. An expansionary monetary policy within a fixed exchange rate framework and extensive exchange controls led to external imbalances and depletion of foreign reserves. By 2008, gross public debt exceeded 192 percent of GDP and reserves had dwindled to just 2 weeks of import cover. The global financial crisis exacerbated these vulnerabilities, and the crisis came to a head in mid-2008 when the Seychelles authorities missed payments on the nation’s private foreign debt and Standard & Poor’s downgraded Seychelles to selective default.

    Changing course

    In response to this crisis, the government launched a comprehensive reform program with support from the IMF and other development partners. Key actions included abolishing all exchange restrictions and floating the rupee, consolidating public finances, reforming state enterprises, and abolishing indirect product subsidies in favor of a targeted social safety net. Paris Club creditors agreed to a debt stock reduction. These measures quickly yielded positive outcomes: inflation fell, foreign reserves were restored to over 3 months of import cover, and public debt declined to below 70 percent of GDP within five years. This turnaround rebuilt investor confidence, and the restoration of macroeconomic stability allowed policymakers room to shift from crisis management to macro-structural reforms in support of sustainable growth. 

    Resilience and commitment tested

    The COVID-19 pandemic, which caused a sudden collapse in global tourism, was another tremendous shock. But its years of macroeconomic stability enabled Seychelles to face this new challenge from a position of strength. Confronted with an economic contraction of nearly 12 percent in 2020, the government implemented timely fiscal and monetary measures to support households and businesses, utilized emergency financing from the IMF, and moved quickly to resume tourism. As tourism rebounded in 2021 and 2022, economic growth surged to nearly 13 percent in 2022, helping to regain lost ground. Foreign exchange reserves were maintained above 3 months of import cover, and the exchange rate was allowed to move to facilitate adjustment. Key to managing the effects of the pandemic and the international commodity shock that followed were the fiscal and foreign exchange buffers built up in prior years and a commitment to macro fiscal discipline demonstrated by the government. 

    Staying on course

    Given highly volatile global economic and financial conditions, Seychelles’ hard-won macroeconomic stability will likely be put to the test again. Environmental pressures limit scope to expand tourism, while vulnerability to external shocks argues for continued strong fiscal discipline and external buffers. To ensure continued economic growth and resilience, vital investments in infrastructure will be necessary, together with deeper development of human capital, more efficient public services, and financial sector deepening and inclusion. Concerted efforts are also needed to strengthen the social safety net and address critical social ills that hamper productivity and economic development. Some of these areas fall within the reform agenda under the current IMF-supported Extended Fund Facility and Resilience and Sustainability Facility, but others will require new policy commitments.

    Seychelles’ economic record highlights the importance of sound macroeconomic management and institutional strengthening in achieving and sustaining economic prosperity. Its journey offers valuable lessons for other small economies aiming at building resilience in an increasingly uncertain global landscape.

    Todd Schneider is IMF mission chief to Seychelles and an advisor in the IMF’s African Department, where Hany Abdel-Latif is an economist, Pedro Maciel is a senior economist, and Henry Quach is a research analyst.

    https://www.imf.org/en/News/Articles/2025/07/01/cf-seychelles-path-to-macroeconomic-stability-and-resilience

    MIL OSI

    MIL OSI Russia News

  • MIL-OSI Economics: Jordan: Third Review Under the Extended Arrangement Under the Extended Fund Facility, and Request for Modification of Performance Criteria, and Request for an Arrangement Under the Resilience and Sustainability Facility-Press Release; Staff Report; and Statement by the Executive Director for Jordan

    Source: International Monetary Fund

    International Monetary Fund. Middle East and Central Asia Dept. “Jordan: Third Review Under the Extended Arrangement Under the Extended Fund Facility, and Request for Modification of Performance Criteria, and Request for an Arrangement Under the Resilience and Sustainability Facility-Press Release; Staff Report; and Statement by the Executive Director for Jordan”, IMF Staff Country Reports 2025, 155 (2025), accessed July 1, 2025, https://doi.org/10.5089/9798229014342.002

    MIL OSI Economics