Category: Business

  • MIL-OSI: OTC Markets Group Launches OTCID™ Basic Market, In Major Structural Upgrade to U.S. OTC Equities Markets

    Source: GlobeNewswire (MIL-OSI)

    NEW YORK, July 01, 2025 (GLOBE NEWSWIRE) — OTC Markets Group Inc. (OTCQX: OTCM), operator of regulated markets for over 12,000 U.S. and international securities, today launched the OTCID™ Basic Market, a major structural upgrade that redefines the baseline for disclosure in the over-the-counter (OTC) equities space.

    With the elimination of the Pink Current Market, the new OTCID™ Basic Market introduces a more transparent framework for companies that choose to engage with U.S. investors through consistent, ongoing reporting.

    The move reflects OTC Markets Group’s broader strategy to enhance market clarity, reduce investor uncertainty, and offer compliant companies a more defined pathway to grow their presence in U.S. public markets.

    Companies trading on the OTCID™ Basic Market are now required to meet specific disclosure benchmarks, including timely quarterly and annual financials, management certifications, and updated company profile information. These foundational requirements ensure that investors, brokers, regulators, and data providers can rely on timely, accurate information from issuers of securities.

    “We’re supporting companies that choose to connect with the market and commit to timely, consistent, ongoing disclosure, as the best public companies understand that their data drives market quality” said Cromwell Coulson, President and CEO of OTC Markets Group. “When companies provide reliable information, that data flows directly into investor screens and broker-dealer machines, enhancing transparency, improving price discovery, and driving better outcomes across the market.”

    1237 securities from the US and key international markets, including Canada, Australia, the United Kingdom, Japan and Hong Kong have already taken the necessary steps to meet OTCID requirements, reinforcing their commitment to timely disclosure and direct engagement with U.S. investors.

    For many, OTCID is a strategic entry point, not a final destination. Investor-focused issuers continue to move up the market. Since January, 61 companies, including Bayer AG and OMV AG, have qualified for the OTCQX® Best Market, underscoring growing demand among issuers for higher visibility, stronger governance, and deeper, digital engagement with U.S. investors.

    Companies that fail to meet the new OTCID’s requirements have been downgraded to either the Pink Limited™ Market or the Expert Restricted Market. Pink Limited™ Market serves as a warning to investors, flagging securities with limited to no issuer involvement, including companies with limited, outdated, or inconsistent disclosures. The Expert Market continues to include securities that fail to meet even the most basic public disclosure requirements under SEC Rule 15c2-11. Quotes in Expert Market securities are not available to retail investors.

    By setting sharper distinctions between active and inactive issuers, OTC Markets Group is delivering on its mission to foster informed investment decisions and build a more efficient public market.

    For more information, visit www.otcmarkets.com/OTCID

    About OTC Markets Group Inc.
    OTC Markets Group Inc. (OTCQX: OTCM) operates regulated markets for trading 12,000 U.S. and international securities. Our data-driven disclosure standards form the foundation of our public markets: OTCQX® Best Market, OTCQB® Venture Market, OTCID™ Basic Market and Pink Limited™ Market. Our OTC Link® Alternative Trading Systems (ATSs) provide critical market infrastructure that broker-dealers rely on to facilitate trading. Our innovative model offers companies more efficient access to the U.S. financial markets.

    OTC Link ATS, OTC Link ECN, OTC Link NQB, and MOON ATS™ are each SEC regulated ATS, operated by OTC Link LLC, a FINRA and SEC registered broker-dealer, member SIPC. To learn more about how we create better informed and more efficient markets, visit www.otcmarkets.com.

    Media Contact:

    Media@otcmarkets.com

    The MIL Network

  • MIL-OSI: Banco Santander Chile: Second Quarter 2025 Analyst and Investor Webcast / Conference Call

    Source: GlobeNewswire (MIL-OSI)

    SANTIAGO, Chile, July 01, 2025 (GLOBE NEWSWIRE) — You are cordially invited to participate in Banco Santander Chile’s (NYSE: BSAC) conference call-webcast on Tuesday August 5, 2025, at 11.00 AM (ET time) where we will discuss 2Q 2025 financial results. The Bank’s Officers participating in the conference call are: Patricia Pérez, CFO, Cristian Vicuña, Chief Strategy Officer & Head of IR and Andrés Sansone, Chief Economist. A question and answer session will follow the presentation.

    The Management Commentary report will be published on July 31, 2025, before the market opens. The quiet period begins on July 17.

    To participate, the webcast presentation can be viewed at: https://mm.closir.com/slides?id=720987

    Or please dial in using any of the below numbers:
    United Kingdom +44 203 984 9844
    USA +1 718 866 4614
    Austria +43 720 022981
    Brazil +556120171549
    Canada +1 587 855 1318
    Chile +56228401484
    Czech Republic +420 910 880101
    Estonia +372 609 4102
    Finland +35 8753 26 4477
    France +33 1758 50 878
    Germany +49 30 25 555 323
    Hong Kong +852 3001 6551
    Mexico +52 55 1168 9973
    Peru +51 1 7060950
    Poland +48 22 124 49 59
    Russia +7 495 283 98 58
    Singapore +65 3138 6816
    South Africa +27872500455
    South Korea +82 70 4732 5006
    Sweden +46 10 551 30 20
    Turkey +90 850 390 7512
    Ukraine +380 89 324 0624

    Participant Passcode: 720987
    Please dial in approximately 10 minutes prior to the starting time of the conference.

    If you have any questions, please contact Cristian Vicuña at Banco Santander Chile at Cristian.vicuna@santander.cl, Rowena Lambert at Rowena.lambert@santander.cl or María Magdalena Rosende at Maria.rosende@santander.cl

    CONTACT INFORMATION

    Cristian Vicuña
    Investor Relations
    Banco Santander Chile
    Bandera 140, Floor 20
    Santiago, Chile
    Email: irelations@santander.cl
    Website: www.santander.cl

    Banco Santander Chile is one of the companies with the highest risk classifications in Latin America with an A2 rating from Moody’s, A- from Standard and Poor’s, A+ from Japan Credit Rating Agency, AA- from HR Ratings and A from KBRA. All our ratings as of the date of this report have a Stable Outlook.

    As of March 31, 2025, the bank had total assets of Ch$67,059,423 million (US$70,284 million), total gross loans (including those owed by banks) at amortized cost of Ch$41,098,666 million (US$43,075 million), total deposits of Ch$30,607,715 million (US$32,080 million), and bank owners’ equity of Ch$4,400,233 million (US$4,612 million). The BIS capital ratio was 16.9%, with a core capital ratio of 10.7%. As of March 31, 2025, Santander Chile employed 8,712 people and had 237 branches throughout Chile.

    The MIL Network

  • MIL-OSI: Old National Names Matt Keen Chief Information Officer

    Source: GlobeNewswire (MIL-OSI)

    MINNEAPOLIS and ST. PAUL, Minn., July 01, 2025 (GLOBE NEWSWIRE) — (NASDAQ: ONB) Old National Bancorp (“Old National”) has appointed Matt Keen as Chief Information Officer (CIO). In this role, Keen will join Old National’s Executive Leadership Team – the company’s senior-most group of C-suite executives.

    Keen brings more than three decades of experience in significant technology leadership roles at national companies, including leading architecture development, as well as experience with brokerage and banking services, cloud service optimization, and platform modernization.

    “As Old National continues our Midwest and Southeast expansion, our technology strategy and capabilities are also evolving to continue meeting our ever-growing clients’ needs and expectations,” said Old National Chairman & CEO Jim Ryan. “Matt’s wide-ranging technology expertise will be essential for helping us innovate and deliver client-focused solutions, while also supporting the personal relationships that have always been the heart of our success.”

    Keen’s previous technology leadership experience included consulting with American Express as part of his tenure at PriceWaterhouseCoopers, almost 15 years at Ameriprise Financial (formerly a division of American Express), and six years at Two Harbors Investments. Most recently, he served as CIO for Bremer Bank, which became a division of Old National Bank on May 1, 2025.

    As Old National’s CIO, Keen will lead a forward-thinking approach to leveraging technology as an enabler for business success. He will shape and execute the company’s technology strategy, working closely and collaboratively with all aspects of the business to identify ways to increase efficiencies and drive growth. With a particular emphasis on innovation, Keen and his team will use technology, as well as data and analytics, to effectively support and enhance the client and team member experience, to meet their ever-evolving expectations.

    “I’m looking forward to continuing to advance the strong technology foundation that has enabled Old National to achieve its growth goals,” Keen said. “Through a collaborative approach and intense focus on our clients, we’ll bring forward the best technology capabilities to serve the business and support the culture that our team members, clients, and communities expect and appreciate.”

    A resident of Chanhassen, Minn., Keen holds a degree in quantitative methods and computer science from the University of St. Thomas.

    Keen succeeds retiring Chief Information Officer Paul S. Kilroy, who joined Old National in 2020. During his tenure, Kilroy spearheaded a groundbreaking partnership with Infosys that vastly improved contact center quality and stabilized information quality metrics across the organization, leading to a 2024 “Tech Exec of the Year” honor from the Indianapolis Business Journal.

    ABOUT OLD NATIONAL
    Old National Bancorp (NASDAQ: ONB) is the holding company of Old National Bank. As the fifth largest commercial bank headquartered in the Midwest, Old National proudly serves clients primarily in the Midwest and Southeast. With approximately $70 billion of assets and $37 billion of assets under management (including Bremer Financial Corporation on a pro forma basis as of March 31, 2025), Old National ranks among the top 25 banking companies headquartered in the United States. Tracing our roots to 1834, Old National focuses on building long-term, highly valued partnerships with clients while also strengthening and supporting the communities we serve. In addition to providing extensive services in consumer and commercial banking, Old National offers comprehensive wealth management and capital markets services. For more information and financial data, please visit Investor Relations at oldnational.com. In 2025, Points of Light again named Old National one of “The Civic 50” — an honor reserved for the 50 most community-minded companies in the United States.

    Investor Relations:
    Lynell Durchholz
    (812) 464-1366
    lynell.durchholz@oldnational.com

    Media Relations:
    Rick Vach
    (904) 535-9489
    rick.vach@oldnational.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/5d64d8b1-0fab-4151-8bd2-c21133a36465

    The MIL Network

  • MIL-OSI USA: Ernst Celebrates Big Beautiful Win for Iowans

    US Senate News:

    Source: United States Senator Joni Ernst (R-IA)
    WASHINGTON – U.S. Senator Joni Ernst (R-Iowa) released the following statement celebrating the passage of the One Big Beautiful Bill Act:
    “President Trump’s One Big Beautiful Bill delivers on what Iowans voted for in November, keeping more money in hardworking folks’ pockets, real border security, and a safer America,” said Ernst. “In addition to the largest tax cut in history for our families, farmers, and small businesses, the bill strengthens the integrity of Medicaid and prioritizes those who truly need help by eliminating waste, fraud, and abuse. I am proud to have fought to save $100 million for taxpayers over the next decade and eliminated unfair practices in the FAFSA process that held back farm families from investing in their child’s education. I will always fight to improve Iowans’ lives and continue to lead the charge in Washington to reduce reckless spending and put taxpayers first.”
    The Senate unanimously approved Ernst’s Ending Unemployment Payments to Jobless Millionaires Act that will disqualify anyone making a million dollars or more from being eligible for unemployment income support. It is estimated to save taxpayers up to $100 million over the next decade.
    Ernst’s Family Farm and Small Business Exemption Act was also included. It will ensure that Iowans will not have to sell off the farm, or their small business, to afford college by restoring the original exemption of all farmland, machinery, and other operational materials from being declared on the Free Application for Federal Student Aid (FAFSA) form.
    Ernst also provided certainty for Iowa farmers by raising reference prices to strengthen the farm safety net, improving foreign animal disease prevention, protecting access to affordable crop insurance, prioritizing domestic feedstocks to support biofuel producers, expanding trade opportunities, and permanently extending the death tax exemption to ensure family farms and small businesses can be passed down to the next generation. 
    Ernst was a leading voice in the fight to make the Trump tax cuts permanent to avoid a $4 trillion tax increase and empower small business owners and farmers to invest in themselves through provisions like bonus depreciation, 199-A, and the research and development deduction.
    After the Trump administration busted more than 300 criminals accused of $14.6 billion in health care fraud, Ernst emphasized how the One Big Beautiful Bill Act strengthens and preserves Medicaid for our most vulnerable Americans who need it by targeting waste, fraud, and abuse.

    MIL OSI USA News

  • MIL-OSI USA: After Weeks of Markey Raising the Alarm, Senate Strikes AI Moratorium from Budget Reconciliation Bill Overnight in Overwhelming 99-1 Vote

    US Senate News:

    Source: United States Senator for Massachusetts Ed Markey
    Washington (July 1, 2025) – Overnight, the U.S. Senate voted 99-1 in favor of an amendment co-sponsored by Senator Edward J. Markey (D-Mass.), member of the Commerce, Science, and Transportation Committee, Senator Maria Cantwell (D-Wash.), Ranking Member of the Senate Committee on Commerce, Science and Transportation, and Senator Marsha Blackburn (R–Tenn.) to strip a ten-year moratorium on state AI regulations from the Republican budget reconciliation bill.
    “Early this morning, the Senate overwhelmingly voted to reject a dangerous provision to block states from regulating artificial intelligence, including protecting kids online. This 99-1 vote sent a clear message that Congress will not sell out our kids and local communities in order to pad the pockets of Big Tech billionaires. I am proud to have partnered with Ranking Member Cantwell and Senator Blackburn on an amendment to strip this dangerous language, and I look forward to working with my colleagues to develop responsible guardrails for AI,” said Senator Markey.
    For weeks, Senator Markey raised alarms over the provision which would have forced states to make an impossible choice between enforcing AI consumer protections or accepting federal BEAD funding to expand broadband access. Despite several revisions by its author and misleading assurances about its true impact, state officials from across the country, including 17 Republican Governors and 40 state Attorneys General, as well conservative and liberal organizations – from the Heritage Foundation to the Center for American Progress – rallied against the harmful proposal.
    On June 30, Senator Markey introduced an amendment with Senator Cantwell to strip the entire provision prior to introducing the same amendment with Senator Cantwell and Senator Blackburn on July 1. On June 10, Senator Markey announced his plans to file an amendment to the Senate reconciliation bill to block Republicans’ attempt to prevent states from regulating artificial intelligence (AI) for the next 10 years. On June 4, Senator Markey convened a virtual roundtable with advocates to discuss the impacts this ban would have on communities across the country. On June 3, Senator Markey delivered remarks on the Senate floor opposing the provision in the House-passed reconciliation bill that would prevent states from regulating AI for the next ten years.
    Senator Markey is the author of the Artificial Intelligence (AI) Civil Rights Act, the most comprehensive AI civil rights legislation introduced in Congress. The legislation would put strict guardrails on companies’ use of algorithms for consequential decisions, ensure algorithms are tested before and after deployment, help eliminate and prevent bias, and renew Americans’ faith in the accuracy and fairness of complex algorithms.

    MIL OSI USA News

  • MIL-OSI Analysis: Self determination theory: how to use it to boost wellbeing

    Source: The Conversation – UK – By Mark Fabian, Reader of Public Policy, University of Warwick

    Self-determination theory (SDT) is one of the most well established and powerful approaches to wellbeing in psychological research literature. Yet it doesn’t seem to have broken through into popular discussions about wellbeing, happiness and self-help. That’s a shame, because it has so much to contribute.

    A foundational idea in self-determination theory is that we have three basic psychological needs: for autonomy, competence and relatedness.

    Autonomy is the need to be in control of your own life rather than being controlled by others. Competence is the need to feel skilful at the tasks one values or needs to thrive. Relatedness refers to feeling loved and cared for, and a sense of belonging to a group that provides social support.

    If our basic psychological needs are met, then we are more likely to experience wellbeing. Symptoms include emotions such as joy, vitality and excitement because we’re doing the things we love, for example. We’ll probably have a sense of meaning and purpose because we live within a community whose culture we value.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    Conversely, when our basic needs are thwarted we should see symptoms of illbeing. Anger, frustration and boredom grow when our behaviour is controlled by parents, bureaucrats, bosses or other forces that press our energies towards their ends instead of ours.

    Depression is liable when we our competence is overwhelmed by failure. And anxiety is often a social emotion that arises when we’re worried about whether our group cares for us.

    So we should cultivate our basic psychological needs – but how? You need to discover what you want to do with your life, what skills to become competent in, who to relate to and what communities to contribute to.

    Using motivation to find your way

    Here’s where the second foundational idea in SDT can be super helpful, as I explain in my new book, Beyond Happy: How to rethink happiness and find fulfilment. SDT proposes a motivational spectrum running from extrinsic at one end to intrinsic at the other. Finding out where you are on the spectrum for a certain activity or task can help you work out how to be happier.

    The more extrinsically motivated something is, the more self-regulation it requires. For example, when refugees flee their homes due to encroaching war, there is often a large part of them that wants to stay. Willpower is required to act. In contrast, intrinsically motivated behaviour springs spontaneously from us. You don’t need willpower to get stuck into your hobbies.

    Each type of motivation comes with different emotional signals and deciphering them can help us find what values, behaviour and groups suit us.

    The spectrum of motivation according to self-determination theory.
    CC BY-NC

    “Identified” motivation, for example, sits between extrinsic and intrinsic motivation. It occurs when we value an activity but don’t inherently enjoy it. That’s why success in identified behaviour is usually met with a feeling of accomplishment or the warm and fuzzy feeling you get when you do the right thing, like going a bit out of your way to put your rubbish in a bin.

    In contrast, “introjected” motivation is where you value something contingent to the behaviour itself. Many of us loathe the gym, for example, but we want to be healthy. A child might not want to practice the cello, but they do want their parent’s approval.

    Because introjection is relatively extrinsic, it requires willpower, and probably a bit more of it than for identified behaviour. Completion of an introjected activity is often met with relief rather than accomplishment and little desire to keep going.

    Sometimes things that are dependent on introjected behaviour can make us unhappy. In teen dramas, for example, the protagonist often does something because they want to be popular, but when they win the approval of the cool kids they realise those kids are mean and lame.

    Why money, power and status won’t make you happy

    If that’s how you feel, you’ve found something inauthentic to you. Then there’s very little chance the introjected activity will lead to your wellbeing. In fact, SDT has identified some common values. You’ll recognise them immediately: popularity, fame, status, power, wealth and success.

    They’re extrinsic because they’re not peculiar to you. If you get rich doing the thing you love, that’s great, but many of us never even think about what we love because we’re too busy thinking about how to get rich.

    Extrinsic pursuits are ultimately bad for our wellbeing because they’re all poor substitutes for basic psychological needs. When our autonomy is thwarted by strict parents or disciplinarian teachers, we crave power. When we don’t know what sort of life to build and thus what skills we need competence in, we adopt other people’s notions of success instead.

    Extrinsic pursuits often emerge from a wounded place and a defensive reaction. When we’re lonely or feel unloved for who we are, for example, we might compensate by seeking fame or popularity. We’ll start talking about our accomplishments on LinkedIn, for example.

    The problem is that the people this attracts don’t value you specifically, only your power, status or money. You sense that if you ever lost those things, you would lose these people too.

    SDT can help you learn to listen to your emotions and interpret your motivations instead, and use them to guide you towards the values, activities and people that are right for you.

    For example, if you feel joyful and fulfilled when you solve a complex puzzle, perhaps consider a career that involves that activity, such as law or engineering. If such puzzles feel like torture, that’s a signal too. Perhaps something more relational or intuitive, like social work, would work better.

    When you pursue things that are authentic to you it will nourish your sense of autonomy. You’ll build competence in those activities because they’re intrinsically motivated. And you’ll form deep relationships with the people you encounter because you genuinely like each other. Wellbeing will follow.

    Mark Fabian does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Self determination theory: how to use it to boost wellbeing – https://theconversation.com/self-determination-theory-how-to-use-it-to-boost-wellbeing-259829

    MIL OSI Analysis

  • MIL-OSI Analysis: Dune director Denis Villeneuve will helm the next Bond – but what will his 007 be like?

    Source: The Conversation – UK – By William Proctor, Associate Professor in Popular Culture, Bournemouth University

    Wiki Commons/Canva, CC BY-SA

    The James Bond franchise has lain dormant for four years, since Daniel Craig’s swansong as 007, No Time to Die. A legal quarrel between Bond’s producers, Michael G. Wilson and Barbara Broccoli, and Amazon Studios resulted in a stalemate and production on a new Bond film has remained in limbo.

    Nevertheless, speculation has been rife about which actor will next play Ian Fleming’s super-spy (the latest actor to be associated with the role is former Spider-man Tom Holland).

    When news surfaced in February 2025 that Amazon MGM (Amazon purchased MGM in 2021) had effectively become Bond’s new custodians, critics and audiences alike expressed concern – to put it lightly. Many feared that Jeff Bezos was more interested in stimulating Amazon Prime membership by driving multiple content streams through spin-offs and merchandising than protecting Fleming’s legacy.

    However, last week’s announcement that Denis Villeneuve has been appointed as the director of the 26th Bond film is a savvy move. It’s a declaration of intent that seeks to promote and market Amazon MGM as safe harbour for the Bond franchise.


    Looking for something good? Cut through the noise with a carefully curated selection of the latest releases, live events and exhibitions, straight to your inbox every fortnight, on Fridays. Sign up here.


    The announcement positions the next era of Bond as a prestigious exercise helmed by “a cinematic master”, not a journeyman director. Villeneuve was previously offered the opportunity to direct No Time to Die, but turned the role down because of his commitment to the Dune films.

    By appointing Villeneuve, Amazon has managed to radically shift the public debate. Villeneuve is “much more than a technical director”, wrote Guardian film critic Peter Bradshaw. “He is an alpha-grade auteur in the same league as Christopher Nolan.”

    Other critics have pointed to his rare ability to “combine blockbuster momentum (and ticket sales) with the finer, more nuanced sensibilities of a filmmaker always concerned with slowing down, honing in on character and theme”.

    Although Sam Mendes, director of Skyfall (2012) and Spectre (2015), came with artistic status, Villeneuve is something different – a marquee name frequently described as an auteur.

    Villeneuve talks about his love for Bond.

    Since his transition from making mostly low-key independent films in his native Canada to his arrival in Hollywood with Prisoners, starring Hugh Jackman and Jake Gyllenhaal (2013), Villeneuve has amassed an impressively eclectic filmography.

    He has proven that he is as comfortable shooting realistic crime thrillers (Sicario, 2015) and surrealist cinema that David Lynch would be proud of (Enemy, 2013), as he is with science fiction (Arrival, 2016, Blade Runner 2049, 2017, and the Dune films, 2021 and 2024).

    Villeneuve’s Bond

    Although Sicario may be the closest in terms of genre to the Bond films, establishing Villeneuve as a director who can expertly shoot action sequences, it is nevertheless difficult at this stage to conceptualise what a Villeneuve Bond film might be like.

    Some critics have suggested that the director’s cinematic resume, eclectic as it is, might not bode well for Bond. The Hollywood Reporter’s film critic Benjamin Svetkey, for instance, worries that Villeneuve’s “lugubrious, meditative filmmaking” is sorely lacking in humour – which could be fatal for 007. “A certain amount of wit and winking is critical to the character,” he claims.

    It is early days for Amazon MGM and Villeneuve. As yet, there is reportedly no treatment, no script, no writer and – more pointedly – no actor appointed to the role. Whatever happens, the 26th Bond film is likely to be a hard reboot that wipes the slate clean (again) after the fate of 007 in No Time to Die.

    Villeneuve’s choice for Bond is unlikely to be as cartoonish as Pierce Brosnan’s iteration.

    Although Villeneuve has said that he intends to honour tradition and that Bond is “sacred territory” for him, Bond’s capacity for revision and regeneration has been key to the franchise’s longevity.

    As socoiologists Tony Bennett and Janet Woollacott argue in their seminal study, Bond and Beyond, the figure of Bond has over the past six decades “been differently constructed at different moments,” with “different sets of ideological and cultural concerns”.

    So what kind of Bond film Villeneuve ends up directing largely depends on the story and whichever actor is anointed as the next James Bond. It is doubtful that audiences will expect a campy pantomime Bond like Roger Moore, or a Bond with an invisible car, like Pierce Brosnan in the cartoonish Die Another Day (2002). Villeneuve’s choice of Casino Royale as his favourite 007 may provide a clue. But it is also unlikely that the director will be satisfied with slavishly repeating the past.

    William Proctor does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Dune director Denis Villeneuve will helm the next Bond – but what will his 007 be like? – https://theconversation.com/dune-director-denis-villeneuve-will-helm-the-next-bond-but-what-will-his-007-be-like-260140

    MIL OSI Analysis

  • MIL-OSI USA: Luján: Republican Bill Betrays New Mexico Families by Taking an Axe to Health Care, Nutrition Programs, and Rural Communities

    US Senate News:

    Source: United States Senator Ben Ray Luján (D-New Mexico)

    WATCH: Luján Holds Senate Floor During Midnight Session 

    WATCH: Luján Introduces Amendment to Save SNAP 

    Washington, D.C. – U.S. Senator Ben Ray Luján (D-N.M.) issued the following statement after Senate Republicans voted to pass their partisan budget reconciliation bill: 

    “Senate Republicans just pushed through a budget bill that hurts New Mexican families. In their rush to meet President Trump’s demands, they voted blindly, with no regard for the harm this bill will inflict on all of our constituents.

    “This Republican bill guts health care for children and families, strips food assistance from our neighbors, and puts rural hospitals and grocery stores on the brink of closure – all to hand out massive tax cuts to the ultra-wealthy and big corporations. It also adds more than $3 trillion to the national debt – driving up interest rates across the board, making car loans and mortgages more expensive for families, and raising borrowing costs for small businesses and farmers.

    “This bill is not just bad policy – it’s a failure of leadership and a betrayal of New Mexico families, rural communities, and American values.”

    Senator Luján backed a series of amendments and motions to the Republican reconciliation bill aimed at protecting access to health care and nutrition programs and lowering costs for New Mexicans. Senate Republicans blocked these common-sense proposals from Senator Luján and Senate Democrats. Among those measures:

    Keeping Food on the Table for New Mexicans: 

    Millions of families rely on nutrition assistance programs. Senator Luján led a motion to protect funding for SNAP that ensures New Mexico families and children have access to nutritious food. These programs also support New Mexico’s farmers, ranchers, and local communities that rely on these dollars to keep food on shelves and economies strong. 

    Defending Medicaid and the Affordable Care Act:

    Republicans are trying to pay for tax breaks for the wealthy and big corporations by ripping away Medicaid coverage from millions of Americans. New Mexico has the highest per-capita Medicaid enrollment in the country, and children, pregnant women, and working families depend on it. Senator Luján supported a motion to strengthen Medicaid and protect health care for New Mexicans.

    Keeping New Mexico Communities Safe:

    Amid a nationwide shortage of police officers, Senator Luján proposed a motion to provide increased resources for local law enforcement by funding the COPS Hiring Program. Senator Luján previously led dozens of his colleagues in calling for additional funding for public safety.

    Protecting New Mexicans from Wildfires:

    As wildfires continue to devastate New Mexico and the West, Senator Luján supported a motion to invest in wildfire prevention and protect our communities from future disasters.

    Protecting Clean Energy Investments:

    As the climate crisis grows more urgent – and Republicans push to gut clean energy programs – Senator Luján supported amendments to safeguard investments in our energy future and reduce costs.

    Lowering Taxes for Small Businesses and the Middle Class: 

    To bring down costs for New Mexico families and small businesses, Senator Luján supported amendments that would provide tax relief to the middle class and small businesses.

    MIL OSI USA News

  • MIL-OSI: WinnerMining: Are cryptocurrency fluctuations making people panic? No, it’s the business opportunities of cloud mining.

    Source: GlobeNewswire (MIL-OSI)

    New York City, July 01, 2025 (GLOBE NEWSWIRE) — Against the backdrop of drastic fluctuations in the global economy, cryptocurrencies have become the “number one” investment asset pursued by global investors. In particular, BTC, ETH, and XRP continue to influence the global cryptocurrency market. However, AQUARONE, Steffan Luke, CEO of WinnerMining Co., Ltd., believes that amid the market fluctuations that everyone is worried about, there are business opportunities that cannot be missed.

    “Volatility” turns into business opportunities
    WinnerMining not only prevents market volatility, but also stimulates more active trading. WinnerMining offers a variety of different investment contracts for investors of all levels, allowing them to make investment decisions with confidence.
    Despite the uncertainty of US policies under President Trump, which may affect global cryptocurrencies, WinnerMining can cope with the challenges that may arise in the second half of the year and maintain its leading position in the international cryptocurrency market.
    “WinnerMining has experienced crises, whether it is COVID-19 that disrupts the world, US taxation, or regional political conflicts, and each time it has been able to manage in a professional manner and has good resources and connections in the global crypto market, so our customers will still be taken care of in the best way without being affected by irregular market behavior.”

    What are the advantages of Winnermining?
    1. Fund security: The biggest concern of any investor is fund security. There is no need to worry about it at Winnermining, because Winnermining adopts military-grade double protection and stores funds in cold wallets and the world’s top 10 authoritative banks. And it can protect users from asset loss or inflation problems between conflicts.

    2. Registration bonus: In order to welcome novices or experienced miners who join Winnermining for the first time, as long as they join Winnermining, they will immediately receive a platform reward of $15.

    3. Multiple choices: Provide more than 10 different levels of contracts, suitable for users of any class, and also support free cloud mining!

    4. Flexible participation: Support global users to invest in popular currencies such as BTC, ETH, XRP, SOL, DOGE, USDT, USDC, LTC, BCH, etc.

    5. Maintain sustainability: Winnermining has more than 100 large and small new energy power generation sites around the world to maintain the development of cloud mining and continue the mining process.

    6. Customer Support: We provide 24-hour online customer service. Users can visit and consult at any time in any region. Adhering to the concept that customers are God, we serve users from all over the world wholeheartedly and let users have the experience of first love.

    How to participate in Winnermining?
    Step 1: Visit the official website, fill in your email address and set your username/password to complete the registration.
    Step 2: Select the appropriate contract to purchase and lease (all lease contracts can refund the principal).
    Step 3: After the purchase is completed, no operation is required, just wait for 24 hours to get daily income.

    How to earn income on Winnermining?
    Users can complete registration on the official website or application and purchase contracts on the platform.
    Some equity contracts of WinnerMining in 2025 can be viewed here:
    I- Antminer S17e: Investment amount of $100, total profit of $100 + $8.
    II – Shenma Miner M30S: Investment amount of $1000, total profit of $1000 + $130.
    III – Antminer S19J Pro: Investment amount of $3000, total profit of $3000 + $675.
    IV- AvalonMiner A1346: Investment amount of $5000, total profit of $5000 + $1600.
    V – Desiwe Miner K10Ultra: Investment amount of $30,000, total profit of $30,000 + $24300.
    VI – Rack-mounted Filecoin Miner 4300TiB S: Investment amount of $100,000, total profit of $100,000 + $92,500.
    (Visit WinnerMining.VIP to view more contracts)

    Overview:
    Winnermining knows that in the ever-changing crypto market, no one can stand still. The fluctuating crypto market has bubbles and opportunities, and participating in WinnerMining cloud mining is a good choice for digital growth. Join now and get a $15 reward without applying.
    —— Click to download the APP to participate in WinnerMining to take you to experience the daily growth progress of digital assets.

    Attachment

    The MIL Network

  • MIL-OSI: Equasens: General meeting – Results of the votes

    Source: GlobeNewswire (MIL-OSI)

    Villers-lès-Nancy, 1st July 2025 – 07:00 p.m. (CET)

    PRESS RELEASE

    RESULTS OF THE VOTES ON THE RESOLUTIONS SUBMITTED
    TO THE ORDINARY ANNUAL SHAREHOLDERS’ MEETING
    OF 25 JUNE 2025

    Number of shares comprising the share capital: 15,174,125

    Number of shares with voting rights: 14,830,415

    Number of shares with voting rights possessed by shareholders presents or represented or having voted by mail: 13,173,125

    That means a quorum of 88.83% of the 14,830,415 shares with voting rights: the Ordinary Annual General Meeting was able to deliberate.

    The Ordinary Annual General Meeting was held on Wednesday, 25 June 2025 at 5:30 p.m. at the Company’s headquarters and approved the separate parent company and consolidated financial statements for the 2024 financial year. The results of the votes on the resolutions proposed at this meeting by the Board of Directors were as follows:

    Resolutions

    Results of the votes

    • RESOLUTION ONE

    Approval of the annual financial statements

    Resolution adopted by:

    • 13,170,684 votes in favour
    • 0 vote against
    • 2,441 abstentions
    • RESOLUTION TWO

    Discharge of directors and discharge of the Statutory Auditors for the performance of their engagement

    Resolution adopted by:

    • 12,831,312 votes in favour
    • 339,266 votes against
    • 2,547 abstentions
    • RESOLUTION THREE
      Approval of the consolidated financial statements
    Resolution adopted by:

    • 13,170,684 votes in favour
    • 0 vote against
    • 2,441 abstentions
    • RESOLUTION FOUR

    Appropriation of earnings, setting the dividend

    Resolution adopted by:

    • 13,138,631 votes in favour
    • 34,494 votes against
    • 0 abstention
    • RESOLUTION FIVE

    Agreements and commitments governed by Articles L. 225-38 of the French Commercial Code

    Resolution adopted by (*):

    • 13,101,211 votes in favour
    • 59,549 votes against
    • 12,365 abstentions
    • RESOLUTION SIX

    Approval of the information on the compensation of corporate officers paid in or granted for fiscal 2024 and mentioned in Article L. 22-10-9 of the French Commercial Code

    Resolution adopted by:

    • 12,507,815 votes in favour
    • 665,242 votes against
    • 68 abstentions
    • RESOLUTION SEVEN

    Approval of the components of compensation paid in 2024 to Mr. Thierry CHAPUSOT, Chairman of the Board of Directors

    Resolution adopted by:

    • 13,115,547 votes in favour
    • 57,510 votes against
    • 68 abstentions
    • RESOLUTION EIGHT

    Approval of the components of compensation paid in 2024 to Mr. Denis SUPPLISSON, Chief Executive Officer

    Resolution adopted by:

    • 10,782,118 votes in favour
    • 2,390,939 votes against
    • 68 abstentions
    • RESOLUTION NINE

    Approval of the components of compensation paid in 2024 to Mr. Grégoire DE ROTALIER, Deputy CEO

    Resolution adopted by:

    • 10,782,118 votes in favour
    • 2,390,939 votes against
    • 68 abstentions
    • RESOLUTION TEN

    Approval of the components of compensation paid in 2024 to Mr. Damien VALICON, Deputy CEO (non-Board member), as from 01/04/2024

    Resolution adopted by:

    • 10,762,253 votes in favour
    • 2,410,804 votes against
    • 68 abstentions
    • RESOLUTION ELEVEN

    Approval of the compensation policy for Mr. Thierry CHAPUSOT, Chairman of the Board of Directors, for 2025

    Resolution adopted by:

    • 13,115,547 votes in favour
    • 57,510 votes against
    • 68 abstentions
    • RESOLUTION TWELVE

    Approval of the compensation policy for Mr. Denis SUPPLISSON, Chief Executive Officer, for 2025

    Resolution adopted by:

    • 10,545,572 votes in favour
    • 2,454,875 votes against
    • 172,678 abstentions
    • RESOLUTION THIRTEEN

    Approval of the compensation policy for Mr. Grégoire de ROTALIER, Deputy Chief Executive Officer, for 2025

    Resolution adopted by:

    • 10,537,207 votes in favour
    • 2,463,240 votes against
    • 172,678 abstentions
    • RESOLUTION FOURTEEN

    Approval of the compensation policy for Mr. Damien VALICON, Deputy Chief Executive Officer, for 2025

    Resolution adopted by:

    • 10,537,207 votes in favour
    • 2,463,240 votes against
    • 172,678 abstentions
    • RESOLUTION FIFTEEN

    Approval of the compensation policy for Directors

    Resolution adopted by:

    • 13,127,845 votes in favour
    • 45,212 votes against
    • 68 abstentions
    • RESOLUTION SIXTEEN

    Setting total annual compensation for Directors for 2025

    Resolution adopted by:

    • 13,127,845 votes in favour
    • 45,212 votes against
    • 68 abstentions
    • RESOLUTION SEVENTEEN

    Authorisation by the Company to repurchase its own shares

    Resolution adopted by:

    • 11,297,178 votes in favour
    • 1,875,947 votes against
    • 0 abstention
    • RESOLUTION EIGHTEEN

    Powers for formalities

    Resolution adopted by:

    • 13,173,125 votes in favour
    • 0 vote against
    • 0 abstention

    (*)After deduction of excluded voting rights

    Upcoming financial communications

    • 31 July 2025: Q2 2025 revenue – After the close of trading
    • 26 September 2025: H1 2025 results: 26 September 2025

    About Equasens Group

    Founded over 35 years ago, Equasens Group, a leader in digital healthcare solutions, today employs over 1.300 people across Europe.
    Equasens Group’s specialised business applications facilitate the day-to-day work of healthcare professionals and their teams, working in private practice, collaborative medical structures or healthcare establishments. The Group also provides comprehensive support to healthcare professionals in the transformation of their profession by developing electronic equipment, digital solutions and healthcare robotics, as well as data hosting, financing and training adapted to their specific needs.
    And reflecting the spirit of its tagline “Technology for a More Human Experience”, the Group is a leading provider of interoperability solutions that improve coordination between healthcare professionals, their communications and data exchange resulting in better patient care and a more efficient and secure healthcare system.

    Listed on Euronext Paris™ – Compartment B

    Indexes: MSCI GLOBAL SMALL CAP – GAÏA Index 2020 – CAC®SMALL and CAC®All-Tradable
    Included in the Euronext Tech Leaders segment and the European Rising Tech label

    Eligible for the Deferred Settlement Service (“Service à Réglement Différé” – SRD) and equity savings accounts invested in small and mid-caps (PEA-PME).
    ISIN: FR 0012882389 – Ticker Code: EQS

    Get all the news about Equasens Group www.equasens.com and on LinkedIn

    CONTACTS

    EQUASENS Group
    Analyst and Investor Relations:
    Chief Administrative and Financial Officer: Frédérique Schmidt
    Tel: +33 (0)3 83 15 90 67 – frederique.schmidt@equasens.com

    Financial communications agency:
    FIN’EXTENSO – Isabelle Aprile

    Tel.: +33 (0)6 17 38 61 78 – i.aprile@finextenso.fr

    Attachment

    The MIL Network

  • MIL-OSI Africa: African Development Bank approves ZAR 2.5 billion loan to City of Johannesburg for critical urban infrastructure development


    Download logo

    The Board of Directors of the African Development Bank Group (www.AfDB.org) has approved a ZAR 2.5 billion (approximately $139 million) corporate loan to the City of Johannesburg Metropolitan Municipality, marking the Bank’s first direct lending to a subnational entity in Africa.  

    The transaction will finance critical infrastructure projects in electricity, water, sanitation, and solid waste management, directly benefiting over 6 million residents in South Africa’s economic powerhouse. 

    The approval marks a transformative moment for municipal financing across Africa, operationalizing the African Development Bank’s Guidelines for Subnational Finance for the first time. The funding will exclusively support trading services infrastructure that generates revenue, ensuring sustainable debt repayment, while addressing urgent challenges in service delivery. 

    “This landmark transaction, led by the African Development Bank’s Infrastructure and Urban Development Department, in coordination with the Water and Sanitation Department,  and the Power Department, signals a new era in how the African Development Bank can empower cities,” said the Bank’s Vice President for Private Sector, Infrastructure & Industrialization, Solomon Quaynor. “By directly financing Johannesburg, we are unlocking a scalable model for subnational lending that enables multi-sectoral infrastructure delivery and positions the Bank as a trusted partner in driving sustainable, inclusive urban development across Africa.” 

    The loan will finance over 100 carefully selected projects across four vital sectors: upgrading distribution networks, installing smart meters, expanding renewable energy capacity, and connecting 3,200 new households to the grid; rehabilitating aging pipelines, upgrading treatment facilities, and reducing water losses from 46% to 37%;  and improving landfill compliance, expanding recycling facilities, and enhancing waste collection services. 

    “This historic transaction demonstrates the African Development Bank’s commitment to supporting creditworthy cities as engines of economic growth,” said the African Development Bank’s Director General for Southern Africa, Kennedy  Mbekeani. “Johannesburg is not just South Africa’s largest city – it contributes 16% to the country’s GDP and serves as a gateway for investment across the continent. By strengthening its infrastructure backbone, we’re investing in Africa’s urban future.” 

    The City of Johannesburg faces significant infrastructure challenges, with annual electricity losses of 30% for the past three years and water losses of 46.1%. The project is expected to create 2,869 jobs during construction and substantially improve service reliability for millions of residents. 

    An additional $1.5 million grant through the Bank’s Urban and Municipal Development Fund is being sought to support municipal reforms, governance and climate-resilient planning initiatives. 

    Beyond infrastructure improvements, the project will deliver significant socioeconomic benefits:  

    • 592 full-time equivalent jobs, with 14% reserved for women and 23% for youth. 
    • Reduced electricity and water interruptions will boost productivity for 65% of electricity and 5% of water consumed by industry. 
    •  Enhanced free basic services for 160,000 indigent households.  
    • ZAR 500 million in contracts earmarked for small and medium enterprises, with 40% reserved for women-owned businesses and 50% for youth entrepreneurs. 

    The African Development Bank has included comprehensive safeguards in the project to assure robust monitoring and oversight, transparency, compliance, and sound financial management throughout the loan lifecycle. 

    Distributed by APO Group on behalf of African Development Bank Group (AfDB).

    Media contact: 
    Emeka Anuforo
    Communication and External Relations Department
    media@afdb.org

    About the African Development Bank Group:
    The African Development Bank Group is Africa’s premier development finance institution. It comprises three distinct entities: the African Development Bank (AfDB), the African Development Fund (ADF) and the Nigeria Trust Fund (NTF). On the ground in 41 African countries with an external office in Japan, the Bank contributes to the economic development and the social progress of its 54 regional member states.

    For more information: www.AfDB.org

    MIL OSI Africa

  • MIL-OSI Africa: The 2025 Food and Agriculture Organization of the United Nations (FAO) Awards honour organizations from Colombia, Egypt, and the Philippines for their contributions to agrifood systems transformation


    Download logo

    The Food and Agriculture Organization of the United Nations (FAO) announced the winners of the 2025 FAO Awards, recognizing organizations from Colombia, Egypt, and the Philippines, whose work has led to outstanding progress in building more efficient, inclusive, resilient and sustainable agrifood systems.

    On Monday, FAO Director-General QU Dongyu presented the Champion Award and Partnership Award during the 44th FAO Ministerial Conference held in Rome.

    “These Awards are more than an acknowledgment of achievements – they represent FAO’s core values and aspirations. The ceremony is a celebration of possibility and hope of what happens when commitment and innovation meet the urgent call to transform global agrifood systems,” he said.

    The FAO Champion Award, the Organization’s highest corporate award, which carries a prize of USD 50,000 and recognizes significant and outstanding contributions towards advancing FAO’s overall goals, was conferred to la Confederación Mesa Nacional de Pesca Artesanal de Colombia (COMENALPAC), for its tangible results across organizational, social, economic and environmental dimensions, including championing social protection measures for fishers and played a key role in drafting laws against illegal fishing, thereby improving the welfare and rights of fishing communities.

    Since 2017, COMENALPAC has represented over 800 groups of marine and freshwater fishers across Colombia. Its work has contributed to the design and implementation of key legislation, including Law 2268 of 2022, which guarantees social benefits for commercial and subsistence fishers.

    Through an FAO–COMENALPAC partnership, the organization has strengthened fisher communities in Tumaco by eliminating intermediaries, increasing incomes, and promoting inclusive market opportunities. It has also led to the restoration of 83 wetlands, contributing to aquatic biodiversity and more sustainable food systems. The organization was further praised for helping secure the legal recognition of more than 120,000 fishers and for its role in incorporating the concept of “Aquatic Agrifood Ecosystems” into Colombia’s National Development Plan.

    In addition, within the same category, a Special Mention was also awarded to Youth Uprising, a Philippine-based non-profit organization recognized for its intense engagement of young people in transforming agrifood systems.

    The FAO Partnership Award — valued at USD 10,000 and recognizing outstanding cooperation with FAO in advancing the Organization’s work by its Members — was presented to The Egyptian Food Bank (EFB), the first Egypt NGO focused on addressing food insecurity, providing support to over 24 million people through comprehensive food assistance, nutrition, and empowerment programs.

    Among the EFB’s most notable initiatives are the Community Nutrition Programme, the Ramadan Food Loss Initiative, and the Resilience Index Measurement and Analysis (RIMA). EFB’s programs have benefited over 150,000 families and more than 60,000 schoolchildren. Its work also includes capacity-building for small-scale producers and support to 1,200 farmers — particularly women — promoting sustainable agricultural practices and economic inclusion.

    The FAO Director-General bestowed the awards to representatives of the organizations who attended the ceremony in person.

    Adriana Rocío Cadena Cancino, Director of la Confederación Mesa Nacional de Pesca Artesanal de Colombia (COMENALPAC), received the Champion Award on behalf of the organization.

    Mohsen Sarhan Ali Gamal Ali, Chief Executive Officer of The Egyptian Food Bank (EFB), accepted the Partnership Award on behalf of his organization.

    “These awardees remind us that transformation is already happening and must accelerate. Let us continue working hand in hand for the transformation of global agrifood systems to be more efficient, more inclusive, more resilient and more sustainable,” Qu added in his closing remarks, with a reference to the FAO Four Betters – better production, better nutrition, a better environment and a better life, leaving no one behind.

    Distributed by APO Group on behalf of Food and Agriculture Organization (FAO).

    MIL OSI Africa

  • MIL-OSI: Paritii Joins Google.org’s 2025 Generative AI Accelerator to Transform Student Support with AI-Driven Workflows

    Source: GlobeNewswire (MIL-OSI)

    Paritii, creator of Swyft, is now backed by Google.org as part of the 2025 Generative AI Accelerator. Swyft utilizes generative AI to automate higher education workflows, offering personalized student support 24/7 and enabling staff to focus on high-value tasks, targeting 2 million students.

    Photo Courtesy of Paritii

    LONDON, July 01, 2025 (GLOBE NEWSWIRE) — Paritii, an EdTech leader in generative AI for higher education, has joined the 2025 Google.org Generative AI Accelerator. This recognition highlights Paritii’s work transforming student experience through its AI-powered Swyft platform, automating administrative processes, and delivering on-demand student support.

    Our commitment to social impact is recognized and trusted by our community. Based on that trust, we are honored to receive this backing from Google.org as we continue this vital work,” said Dr. Shmona Simpson, CEO of Paritii.

    Administrative burdens at underfunded colleges reduce retention, satisfaction, and graduation rates due to inefficient systems and overwhelmed advisors, especially for students with historically poor outcomes.

    Paritii’s Swyft platform automates high-volume administrative tasks, allowing staff to focus on impactful student interactions. Leveraging a proprietary frontend API and a retrieval-augmented generation (RAG) enabled large language model (LLM), Swyft processes millions of data points to streamline document workflows and support requests.

    Swyft combines generative AI with a tailored backend to deliver precision, speed, and personalized support. Students access a 24/7 AI-powered workspace to manage tasks, get guidance, and generate documents.

    The solution is poised to reach over 2 million students in the next two years, transforming how institutions serve learners at scale.

    According to Paritii, Swyft has already demonstrated transformative potential with quantifiable impact and outcomes.

    • 85% reduction in administrative processing times across partner institutions.
    • Serve 200,000 students by the end of the accelerator and 2M students in two years
    • 90% student satisfaction and a 60% reduction in document-related queries.
    • 15% increase in student retention rates through faster, more equitable support.

    This opportunity helps to affirm Paritii’s bold approach to using generative AI for systemic change, spotlighting Swyft as a model for equitable innovation and empowering the team to reimagine student support across the higher education landscape.

    The Google.org Generative AI Accelerator offers over $30 million in funding and support, plus access to Google’s AI experts and Cloud tools. This partnership will help Paritii expand Swyft’s capabilities and advance its mission to improve student outcomes across higher education at scale.

    About Paritii

    Paritii is an innovation firm at the forefront of ethical AI, specializing in inclusive technology solutions for education, medicine, and public systems. Since 2020, Paritii has partnered with over 50 institutions to design tools that are as responsible as they are effective. Flagship platforms like Swyft and SwyftRFP reflect Paritii’s mission: to expand access, reduce disparities, and make systems work better for the people they serve. From streamlining student support to reimagining procurement, Paritii is building a future where technology works for everyone.

    Contact Information:

    Contact Person’s Name: Griselle Colon
    Organization / Company: Paritii
    Company website: www.paritii.com
    Contact Email Address: griselle@paritii.com
    City, State / Province, Country: Spokane, Washington, USA

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/3def36a2-90a0-4d8d-801f-860aacae112d

    The MIL Network

  • MIL-OSI Global: Why frequent nightmares may shorten your life by years

    Source: The Conversation – UK – By Timothy Hearn, Senior Lecturer in Bioinformatics, Anglia Ruskin University

    Lightfield Studios/Shutterstock.com

    Waking up from a nightmare can leave your heart pounding, but the effects may reach far beyond a restless night. Adults who suffer bad dreams every week were almost three times more likely to die before age 75 than people who rarely have them.

    This alarming conclusion – which is yet to be peer reviewed – comes from researchers who combined data from four large long-term studies in the US, following more than 4,000 people between the ages of 26 and 74. At the beginning, participants reported how often nightmares disrupted their sleep. Over the next 18 years, the researchers kept track of how many participants died prematurely – 227 in total.

    Even after considering common risk factors like age, sex, mental health, smoking and weight, people who had nightmares every week were still found to be nearly three times more likely to die prematurely – about the same risk as heavy smoking.

    The team also examined “epigenetic clocks” – chemical marks on DNA that act as biological mileage counters. People haunted by frequent nightmares were biologically older than their birth certificates suggested, across all three clocks used (DunedinPACE, GrimAge and PhenoAge).

    The science behind the silent scream

    Faster ageing accounted for about 39% of the link between nightmares and early death, implying that whatever is driving the bad dreams is simultaneously driving the body’s cells towards the finish line.

    How might a scream you never utter leave a mark on your genome? Nightmares happen during so-called rapid-eye-movement sleep when the brain is highly active but muscles are paralysed. The sudden surge of adrenaline, cortisol and other fight-or-flight chemicals can be as strong as anything experienced while awake. If that alarm bell rings night after night, the stress response may stay partially switched on throughout the day.

    Continuous stress takes its toll on the body. It triggers inflammation, raises blood pressure and speeds up the ageing process by wearing down the protective tips of our chromosomes.

    On top of that, being jolted awake by nightmares disrupts deep sleep, the crucial time when the body repairs itself and clears out waste at the cellular level. Together, these two effects – constant stress and poor sleep – may be the main reasons the body seems to age faster.

    Your brain clears out waste when you sleep.
    Teeradej/Shutterstock.com

    The idea that disturbing dreams foreshadow poor health is not entirely new. Earlier studies have shown that adults tormented by weekly nightmares are more likely to develop dementia and Parkinson’s disease, years before any daytime symptoms appear.

    Growing evidence suggests that the brain areas involved in dreaming are also those affected by brain diseases, so frequent nightmares might be an early warning sign of neurological problems.

    Nightmares are also surprisingly common. Roughly 5% of adults report at least one each week and another 12.5% experience them monthly.

    Because they are both frequent and treatable, the new findings elevate bad dreams from a spooky nuisance to a potential public health target. Cognitive behavioural therapy for insomnia, imagery-rehearsal therapy – where sufferers rewrite the ending of a recurrent nightmare while awake – and simple steps such as keeping bedrooms cool, dark and screen free have all been shown to curb nightmare frequency.

    Before jumping to conclusions, there are a few important things to keep in mind. The study used people’s own reports of their dreams, which can make it hard to tell the difference between a typical bad dream and a true nightmare. Also, most of the people in the study were white Americans, so the findings might not apply to everyone.

    And biological age was measured only once, so we cannot yet say whether treating nightmares slows the clock. Crucially, the work was presented as a conference abstract and has not yet navigated the gauntlet of peer review.

    Despite these limitations, the study has important strengths that make it worth taking seriously. The researchers used multiple groups of participants, followed them for many years and relied on official death records rather than self-reported data. This means we can’t simply dismiss the findings as a statistical fluke.

    If other research teams can replicate these results, doctors might start asking patients about their nightmares during routine check-ups – alongside taking blood pressure and checking cholesterol levels.

    Therapies that tame frightening dreams are inexpensive, non-invasive and already available. Scaling them could offer a rare chance to add years to life while improving the quality of the hours we spend asleep.

    Timothy Hearn does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Why frequent nightmares may shorten your life by years – https://theconversation.com/why-frequent-nightmares-may-shorten-your-life-by-years-260008

    MIL OSI – Global Reports

  • MIL-OSI Global: Where does the UK most need more public EV chargers?

    Source: The Conversation – UK – By Labib Azzouz, Research Associate in Transport and Energy Innovation, University of Oxford

    Electric vehicle chargers at a motorway service station in Grantham, England. Angus Reid/Shutterstock

    The automotive and EV industry has repeatedly insisted that the UK needs more electric vehicle (EV) chargers to help motorists make the switch from conventional fossil-fuel burning cars.

    The Labour government has announced £400 million to install EV chargers, mainly on streets in poorer residential neighbourhoods, in place of the Conservative’s £950 million rapid charging fund that was directed at installing chargers in motorway service stations.

    Does it matter where these chargers are – and who pays to build them?

    The short answer is yes, it does matter. Our research conducted at motorway and local EV charging stations across England – including those located in residential areas, high streets and community centres – indicates that these two types of infrastructure serve distinct groups of users and fulfil different purposes.

    Suggesting that one can substitute for the other risks sending mixed signals to both the industry and the driving public.

    We found that motorway charging stations tend to cater to wealthier men, who are more likely to own premium EVs with long-range batteries and better performance. Many of these drivers have access to home chargers, so their use of public chargers is only for occasional, long-distance travel for business, leisure, or holidays – trips that require chargers along motorways.

    Convenience and charging speed are often more important than the price of public charging, particularly when the travel costs of these drivers are covered by their employers.

    Local public charging stations, on the other hand, serve more diverse groups. These include drivers from lower-income households who are more likely to own older and smaller EVs with shorter ranges. Access to home charging is often limited, especially for people living in flats or urban areas without driveways, garages or off-street parking.

    Not everyone can plug in at home.
    Andersen EV/Shutterstock

    Local chargers are also vital for taxi and delivery drivers who depend on their vehicles for work and make frequent short trips throughout the day. There are many professional drivers without access to workplace charging stations who need alternative local provision – something the Conservative government recognised in its 2022 EV charging strategy.

    Ultimately, the transition to EVs should take a balanced approach that carefully considers social equity, economic viability and environmental impact.

    Different locations serve different drivers

    Motorway charging stations are commercially attractive to private investors, such as energy companies, specialist charging providers and car manufacturers, despite their higher upfront costs and complex requirements.

    This is because service stations offer greater short-term revenue due to their ability to set premium prices. This is a result of there being limited alternatives and high demand for rapid charging, especially among long-distance travellers, and the willingness of EV drivers to pay for speed and convenience – unlike in more price-sensitive neighbourhood settings.

    Unsurprisingly, the government found that the rapid deployment of motorway chargers in recent years has been largely driven by the private sector. Our research highlighted that these revenues could be enhanced by a broader range of retail, dining and relaxation amenities, turning the time waiting for a car to charge into a more productive and pleasurable experience.

    Residential charging stations may not offer high profits per charge, but they typically require lower capital investment and benefit from consistent and predictable use. They are also suited to measures for reducing strain on the grid and balancing energy supply and demand.

    These measures include tariffs that make it cheaper to charge EVs during off-peak hours, or technology that allows cars to feed electricity stored in batteries back into the grid. These features make them appropriate for public funding, where return on investment is measured not just in profit but in value for the public.

    Considering that local EV charging serves those who do not have access to home charging and who drive for a living, the case for public funding is even stronger. These sorts of chargers make switching to an EV easier for different groups.

    For example, safe and carefully placed public chargers could help more women switch to EVs – although our research suggests that, while “careful placement” might refer to residential areas, it doesn’t necessarily mean on streets. Well-lit car parks and community destinations are sometimes considered safer options.

    Charging points outside a community centre in the Outer Hebrides, Scotland.
    AlanMorris/Shutterstock

    By helping EV drivers make frequent short trips, local chargers can also significantly reduce urban air pollution, emissions and noise, contributing to more liveable, healthier cities.

    That said, motorway charging stations and those near key transport corridors still play a crucial role in a comprehensive national network, and public funding may be required in more peripheral and rural areas of the UK where installations lag and commercial interest is limited.

    While long-distance trips are less frequent than short ones, they account for a disproportionately large share of energy use and emissions. Switching such trips to electric will be essential to reaching net zero goals.

    It seems reasonable to prioritise public investment in local EV charging infrastructure to support a fairer EV transition, but this should not be limited to on-street chargers. Investment is needed in residential and non-residential areas, public car parks, community centres and workplaces.

    Different types of EV charging are not interchangeable – all are needed to support the switch.


    Don’t have time to read about climate change as much as you’d like?

    Get a weekly roundup in your inbox instead. Every Wednesday, The Conversation’s environment editor writes Imagine, a short email that goes a little deeper into just one climate issue. Join the 45,000+ readers who’ve subscribed so far.


    Labib Azzouz has received funding from the UK Research and Innovation via the UK Energy Research Centre and Innovate UK as part of the Energy Superhub Oxford (ESO) project.

    Hannah Budnitz receives government funding from UK Research and Innovation grants via the Economic and Social Research Council and the Engineering and Physical Sciences Research Council. She has also previously received funding from Innovate UK and the Department for Transport.

    ref. Where does the UK most need more public EV chargers? – https://theconversation.com/where-does-the-uk-most-need-more-public-ev-chargers-259623

    MIL OSI – Global Reports

  • MIL-OSI Global: The Bear season 4: this meaty restaurant drama is still an enticing bingeable prospect

    Source: The Conversation – UK – By Jane Steventon, Course Leader, BA (Hons) Screenwriting; Deputy Course Leader & Senior Lecturer, BA (Hons) Film Production, University of Portsmouth

    Take a soupçon of identity crisis, a pinch of perfectionism, a scoop of burnout and mix thoroughly with a large measure of fraternal grief and sear over a hot grill and voilà! You have The Bear, a perfectly blended drama about a chef on the edge, driven by relentless ambition and exacting standards as he turns his family’s humble sandwich shop into a fine-dining restaurant.

    This intoxicating family drama was eaten up by critics and audiences alike in 2022, its first season garnering a rare perfect 100% score on Rotten Tomatoes, the subsequent two reaching scores of 99% and 89% respectively. It’s certainly a hard act to follow for season four.

    The first ten minutes of The Bear’s pilot episode thrillingly defined what was to come in high-octane style and scene-setting detail. The first season delivered a clever mix of authentic dialogue and setting, relatable family dysfunction and dynamic production style.

    Showstopping scenes of stressful kitchen heat were served up alongside a delectable range of new and established talent in the form of Jeremy Allen White (Carmy), Ebon Moss-Bachrach (Richie), Ayo Edebiri (Sydney) and Oliver Platt (Cicero/Uncle Jimmy).


    Looking for something good? Cut through the noise with a carefully curated selection of the latest releases, live events and exhibitions, straight to your inbox every fortnight, on Fridays. Sign up here.


    In charge is showrunner Christopher Storer, who came up with the concept after being inspired by his friend’s father Chris Zucchero, the owner of Chicago sandwich joint Mr Beef.

    With his professional chef sister also serving as a consultant, Storer succeeded in creating a deliciously authentic and intensely real drama. Buoyed along the way by 21 Emmys and five Golden Globes, Storer also watched his cast ascend, the tortured-soul performance of White garnering particular praise.

    Testing the parameters of a long-running show, Storer focused in on the entire cast of characters and their backstories, a successful tactic used by shows such as Orange is the New Black to keep the drama – largely confined to a kitchen set – fresh.

    Pulling in Hollywood die-hards Oliver Platt and Jamie Lee Curtis for familial tough-love roles further enriched the mix, often using a non-chronological timeframe to go back to moments of family turbulence and tension. This made for three-dimensional characters and enabled evolution around difficult themes such as the aftermath of suicide and generational trauma.

    The Bear has come a long way in three seasons, starting with a spit and sawdust establishment serving up the lunchtime beef sandwiches for its working customers.

    Carmy’s experience and longing for the high-end restaurant of his dreams hurtled forward in season two, as he sent his core crew off in different directions to hone their skills and help form his vision. A restaurant trying to win success but plagued with challenges, there were exhausting familial tensions embedded in every episode of season three.

    Several themes play out in The Bear: love, family, loyalty, community and purpose. The relationship between Carmy and cousin Richie (not a real cousin, but a term of endearment) is key to linking past and future. Richie provides some of the highlights of comedy and pathos as he spits truth bombs, most frequently at talented sous-chef Syd.

    It is Syd who follows Carmy’s aspirations for gastronomic perfection but can’t abide the lack of order or the intense highs and lows that inevitably go hand in hand with his talent. And this is one central question to consider for the latest series: just how long will the audience remain loyal to Carmy and his endless quest for artistry in a high-failure rate industry?

    It’s all in the sauce

    Storer begins season four with a ghost. Carmy and his dead brother Mikey (Jon Berthal) banter in a seven-minute scene, with Carmy ultimately confiding the dream of a restaurant as Mikey watches him make tomato sauce (“too much garlic”). The tomatoes resonate: Mikey left behind money hidden in tomato cans that ended up saving Carmy’s sanity and his dream of a proper restaurant.

    Just as oranges represent death to Frances Ford Coppola, Storer uses tomatoes to underscore themes; here they symbolise familial loyalty and history, a solid base to a meal, a core ingredient. Mikey was one of the core ingredients in Carmy’s life, and now he’s gone.

    Carmy awakens to a rerun of Groundhog Day on late-night TV and fittingly, we too are back – same dish, now more seasoned and enriched with its core ingredients and ready to serve up a big bowlful of family, love, ambition, strife and grief.

    The episode furthers the theme of loyalty as the restaurant receives The Tribune’s review – the cliffhanger of the season three finale. Naturally, Storer doesn’t let up – the food critic highlights “dissonance” and Carmy is back in emotional chaos, with Syd urging him to lighten up and lose the misery.

    In truth, this series could do with adding some more humour in the mix; the teasing and frivolous banter of season one has got somewhat lost in the seasons that followed.

    Storer ramps up the tension, setting several ticking clocks in place: chiefly Uncle Jimmy’s notice period for the business to turn a profit is literally installed on a digital clock in the kitchen. Then Syd’s headhunter calls, offering her desired autonomy and an exit strategy from the chaos.

    And Carmy raises the stakes with an intention to gain a Michelin star. Thus a heroic journey is set in place for the whole cast, with future battles both internal and external laid out.

    There’s too much going on at this feast and the feeling of being stuffed full of story is tangible by the end of the first episode. Still, with a season lining up more emotional turbulence steered by White, more celebrity cameos (Brie Larson and Rob Reiner are lined up) and the excellent cinematography and performances that we have come to expect, Storer stirs his secret sauce.

    The Bear still offers an entertaining and enticing proposition, bingeable and mostly satisfying.

    Jane Steventon does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. The Bear season 4: this meaty restaurant drama is still an enticing bingeable prospect – https://theconversation.com/the-bear-season-4-this-meaty-restaurant-drama-is-still-an-enticing-bingeable-prospect-260143

    MIL OSI – Global Reports

  • MIL-OSI Global: Five ways to avoid illness like the Lionesses

    Source: The Conversation – UK – By Samantha Abbott, Doctoral Researcher, Department of Sport Science, Nottingham Trent University

    England’s Beth Mead cheering on podium after win v Germany in the Women European Championship Final 2022 photographyjp/Shutterstock

    Think back to the last time you had a cold or the flu. Now imagine stepping onto the pitch for a European Cup final, while battling through those symptoms. For elite athletes, illness can strike at the worst possible time – and it could hit women harder.

    Research suggests that female athletes are more susceptible to cold and flu-like illnesses than their male counterparts. For England women’s national football team, the Lionesses, this risk only increases before a major tournament like the Euros.

    Close contact, shared kit, disrupted sleep and travel all add up to a perfect storm for infection. But targeted nutritional strategies, alongside good sleep and hand hygiene, can offer a crucial line of defence.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    1. Fuel first: energy matters for immunity

    Before anything else, players need to eat enough. Energy supports both performance and immune function. In fact, female athletes who didn’t meet their energy needs in the run-up to the 2016 Olympics were four times more likely to report cold or flu symptoms.

    This is especially relevant in women’s football, where low energy and carbohydrate intake has been documented among professional players and recreational players too. Regular meals and snacks that include carbohydrate-rich foods like oats, bread and pasta, especially around training, are essential to meet energy demands and support immune health.

    2. Eat the rainbow

    Athletes are often encouraged to go beyond the public’s five-a-day fruit and veg target, aiming instead for eight to ten portions daily. Why? Because colourful plant foods are packed with vitamins, minerals, antioxidants and anti-inflammatory compounds: all vital for immunity.




    Read more:
    We’re told to ‘eat a rainbow’ of fruit and vegetables. Here’s what each colour does in our body


    Each colour offers unique benefits. For instance, red fruits and vegetables, such as tomatoes, contain lycopene, a powerful antioxidant. Orange produce like carrots get their colour from beta-carotene, which is converted by the body into vitamin A – a key vitamin for immune health.

    Eating a rainbow of colours means getting a wide range of nutrients.

    3. Vitamin C: powerful but timing matters

    Vitamin C has long been linked with reducing the risk and severity of cold and flu symptoms. One Cochrane review found that regular vitamin C intake halved the risk of illness in physically active people.

    However, more isn’t always better. Long-term use of high-dose vitamin C supplements could blunt training adaptations – the structural and functional changes the body undergoes in response to repeated exercise – because of its anti-inflammatory effects. That’s why vitamin C is most effective when used strategically, such as during high-risk periods like travel or intense competition. Good food sources include oranges, kiwis, blackcurrants, red and yellow peppers, broccoli and even potatoes.

    4. Gut health supports immune health

    Around 70% of the immune system is located in the gut, making gut health a key player in illness prevention. This is where probiotics (live bacteria) and prebiotics (which feed those bacteria) come in.

    Probiotics, found in fermented foods like kefir and kimchi or in supplement form, have been shown to reduce the duration and severity of respiratory illnesses in athletes. Prebiotics have similarly shown promise. In one study, a 24-week prebiotic intervention in elite rugby players reduced the duration of cold and flu symptoms by over two days.




    Read more:
    Gut microbiome: meet Lactobacillus acidophilus – the gut health superhero


    In the build-up to the Euros, including probiotic-rich foods in their diet or taking a daily prebiotic and probiotic supplement may help players stay healthy and return to training faster if they do get ill.

    5. Zinc lozenges: first aid for a sore throat

    If cold-like symptoms do appear, zinc lozenges can offer fast-acting relief. Zinc has antiviral, antioxidant and anti-inflammatory properties. When zinc is delivered as a lozenge, it acts directly in the throat, where many infections begin. Taken within 24 hours of symptoms starting, zinc lozenges could shorten illness duration by a third.

    But caution is key. Long-term use of high-dose zinc supplements can actually suppress immune function. Zinc lozenges should only be used short-term at symptom onset, not as a daily supplement.

    Staying match-ready during major tournaments means more than just tactical drills and fitness. Nutrition is a powerful ally in illness prevention, especially for women’s teams like the Lionesses. From fuelling adequately to supporting gut health and knowing when to supplement, these nutritional strategies can make the difference between sitting on the bench and bringing a trophy home.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Five ways to avoid illness like the Lionesses – https://theconversation.com/five-ways-to-avoid-illness-like-the-lionesses-259302

    MIL OSI – Global Reports

  • MIL-OSI USA: Welch Votes No on Republicans’ Disastrous Tax Bill 

    US Senate News:

    Source: United States Senator Peter Welch (D-Vermont)

    WASHINGTON, D.C. — U.S. Senator Peter Welch (D-Vt.), a member of the Senate Finance and Judiciary Committees, and Ranking Member of the Senate Agriculture Subcommittee on Rural Development, Energy, and Credit, released the following statement after voting in strong opposition against Senate Republicans’ disastrous tax bill:   
    “We have an obligation to put the constituents and hardworking families we represent first. Instead of helping everyday people, Republicans’ tax bill capitulates to President Trump and harms communities large and small. This cruel bill will take us back decades by exacerbating income inequality, ripping away health care, and rolling back progress on climate change. It will also raise costs and weaken the economy. All of this pain has been caused to help pay for tax cuts for the very wealthy—a top priority of President Trump. I am grateful to the few Republicans—Senators Tillis, Paul, and Collins—who voted against this terrible bill,” said Senator Welch. “The irony is all these hardships will be faced by citizens in red and blue states—the pain is bipartisan. It’s outrageous that families will now face untold hardships because of the Trump Administration’s cuts. I voted no on this bill and will fight to reverse these policies in any way I can.”  
    Republicans’ reckless tax and spending bill will block access to health care for 17 million people, rip away vital food assistance for millions, cut clean energy incentives and add a tax to wind and solar energy, raise utility bills and grocery prices, and tank the economy—all to pay for tax cuts for the very wealthy.    
    Senator Welch filed amendments and changes to Republicans’ One Big Beautiful Bill Act to strengthen the economy, protect access to health care and nutrition programs, and provide more stability for families and rural communities, including provisions to: 
    Protect Access to Health Care and Support Rural Hospitals:  

    Welch proposed requiring the Finance Committee to rewrite the bill to prevent harm to rural health care and the fiscal wellbeing of rural hospitals;  

    Welch proposed requiring the Finance Committee to exempt managed care programs operated by state governments like Vermont from any changes proposed to state directed payments.  

    Welch proposed requiring the Finance Committee to strike any changes to provider taxes, including changes that would impact states like Vermont with Medicaid expansion;  

    Welch proposed requiring the Health, Education, Labor and Pensions (HELP) Committee to make it easier to verify eligibility for the Affordable Care Act’s premium tax credits and expand special enrollment periods under certain circumstances. 

    Defend Food Assistance Programs:  

    Welch proposed requiring the Agriculture Committee to strike any cost-shifts of administering SNAP to states, which would kick American families off the food assistance they need and strain state budgets;  

    Welch proposed an amendment to strike administrative cost-shifts for SNAP;  

    Welch proposed an amendment to adjust the Thrifty Food Plan for cities, counties, and regions where the price of food is 10% higher than the national average;  

    Welch proposed an amendment that places a floor on SNAP allotments to households instead of a ceiling;  

    Welch proposed an amendment preserving the standard utility deduction, which cuts administrative red tape and boosts benefits by providing a more accurate portrayal of a household’s available resources for food when determining SNAP eligibility; 

    Welch proposed requiring the Agriculture Committee to rewrite the bill to allow volunteer work to qualify under SNAP’s work requirements.   

    Protect Programs and Government Services:  

    Welch proposed requiring the Finance Committee to rewrite the bill to maintain the energy efficient home improvement tax credit at current levels through 2028;  

    Welch proposed an amendment to strike the repeal of several home energy efficiency tax credits, including credits for home energy, rooftop solar, energy efficient homes for homebuilders, and more;  

    Welch proposed striking language in the bill that would rescind funding for state-based contractor training grants, as required in Welch’s HOPE for HOMES Act, passed as part of the Inflation Reduction Act;  

    Welch proposed striking language in the bill that would institute taxes on international remittances.  

    Welch proposed an amendment to dedicate funding for residential reentry centers, which are needed in Vermont;  

    Welch proposed an amendment to dedicate funding for the federal public defenders program, which is currently underfunded. 

    Senator Welch has been an outspoken opponent of the President Trump’s One Big Beautiful Bill Act, which Republicans are advancing through reconciliation process without Democratic support. Late Sunday evening, Senator Welch took to the Senate floor to reveal how Republicans’ disastrous tax and spending bill will force millions of working Americans in Vermont, West Virginia, and across the country to lose their health coverage, rip away vital food assistance for more than 42 million Americans, cut clean energy incentives and add a tax to wind and solar energy, raise utility bills and grocery prices, and tank the economy—all to pay for tax cuts for the very wealthy.   
    Welch has slammed the bill for threatening access to health care and cutting food assistance, and has sounded the alarm about how this bill will add more than $4 trillion to the national debt and tank the economy.    

    MIL OSI USA News

  • MIL-OSI: SIMPPLE Ltd. Provides Compliance Updates with Nasdaq’s Continued Listing Requirements

    Source: GlobeNewswire (MIL-OSI)

    Singapore, July 01, 2025 (GLOBE NEWSWIRE) — SIMPPLE Ltd. (NASDAQ: SPPL) (“SIMPPLE” or “the Company”), a leading technology provider and innovator in the facilities management (FM) sector, today announced that it believes it has regained compliance with the minimum shareholders’ equity requirement under Nasdaq Listing Rule 5550(b)(1) due to strong financial performance and closing of a financing round, as well as the requirement to hold an annual meeting of shareholders under Nasdaq Listing Rule 5620(a).

    Shareholders’ Equity Compliance

    As of the date of this report, the Company believes its shareholders’ equity is above the Nasdaq $2.5 million requirement. This increase is partially attributable to the closing of a private investment in public equity (“PIPE”) offering for total gross proceeds of $2,000,001.00. The objective of this fund raise is to accelerate product development and to increase market share, especially in the Australia and New Zealand (ANZ) markets. In addition, the Company expects to continue strengthening its financial position for the full year, supported by robust operating performance for the first half of 2025. Based on these trends and internal forecasts, the Company projects that it will continue to meet and exceed shareholders’ equity requirement by year-end.

    Annual General Meeting Compliance

    Separately, the Company confirms that it has successfully concluded its Annual General Meeting of Shareholders (“AGM”), which was held at 9:00am Eastern Time, on June 30, 2025. The convening of this AGM satisfies the requirement under Nasdaq Listing Rule 5620(a) to hold an annual meeting of shareholders within the required timeframe. It is, however, also noted that the Company has announced earlier this year that it will rely on Cayman Islands home country exemption with regards to AGM requirements in the future.

    The Company will continue to monitor its ongoing compliance with all applicable Nasdaq listing standards and will provide further updates as appropriate.

    About SIMPPLE LTD.

    Headquartered in Singapore, SIMPPLE LTD. is an advanced technology solution provider in the emerging PropTech space, focused on helping facilities owners and managers manage facilities autonomously. Founded in 2016, the Company has a strong foothold in the Singapore facilities management market, serving over 60 clients in both the public and private sectors and extending out of Singapore into Australia and the Middle East. The Company has developed its proprietary SIMPPLE Ecosystem, to create an automated workforce management tool for building maintenance, surveillance and cleaning comprised of a mix of software and hardware solutions such as robotics (both cleaning and security) and Internet-of-Things (“IoT”) devices. 

    For more information on SIMPPLE, please visit: https://www.simpple.ai

    Safe Harbor Statement

    This press release contains forward-looking statements. In addition, from time to time, we or our representatives may make forward-looking statements orally or in writing. We base these forward-looking statements on our expectations and projections about future events, which we derive from the information currently available to us. Such forward-looking statements relate to future events or our future performance, including: our financial performance and projections; our growth in revenue and earnings; and our business prospects and opportunities. You can identify forward-looking statements by those that are not historical in nature, particularly those that use terminology such as “may,” “should,” “expects,” “anticipates,” “contemplates,” “estimates,” “believes,” “plans,” “projected,” “predicts,” “potential,” or “hopes” or the negative of these or similar terms. In evaluating these forward-looking statements, you should consider various factors, including: our ability to change the direction of the Company; our ability to keep pace with new technology and changing market needs; and the competitive environment of our business. These and other factors may cause our actual results to differ materially from any forward-looking statement.

    Forward-looking statements are only predictions. The forward-looking events discussed in this press release and other statements made from time to time by us or our representatives, may not occur, and actual events and results may differ materially and are subject to risks, uncertainties, and assumptions about us. We are not obligated to publicly update or revise any forward-looking statement, whether as a result of uncertainties and assumptions, the forward-looking events discussed in this press release and other statements made from time to time by us or our representatives might not occur.

    The MIL Network

  • MIL-OSI Economics: Consistent Global Pricing for Microsoft’s Commercial Cloud 

    Source: Microsoft

    Headline: Consistent Global Pricing for Microsoft’s Commercial Cloud 

    MIL OSI Economics

  • MIL-OSI Economics: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Source: Microsoft

    Headline: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Since 2024, Microsoft Threat Intelligence has observed remote information technology (IT) workers deployed by North Korea leveraging AI to improve the scale and sophistication of their operations, steal data, and generate revenue for the Democratic People’s Republic of Korea (DPRK). Among the changes noted in the North Korean remote IT worker tactics, techniques, and procedures (TTPs) include the use of AI tools to replace images in stolen employment and identity documents and enhance North Korean IT worker photos to make them appear more professional. We’ve also observed that they’ve been utilizing voice-changing software.

    North Korea has deployed thousands of remote IT workers to assume jobs in software and web development as part of a revenue generation scheme for the North Korean government. These highly skilled workers are most often located in North Korea, China, and Russia, and use tools such as virtual private networks (VPNs) and remote monitoring and management (RMM) tools together with witting accomplices to conceal their locations and identities.

    Historically, North Korea’s fraudulent remote worker scheme has focused on targeting United States (US) companies in the technology, critical manufacturing, and transportation sectors. However, we’ve observed North Korean remote workers evolving to broaden their scope to target various industries globally that offer technology-related roles. Since 2020, the US government and cybersecurity community have identified thousands of North Korean workers infiltrating companies across various industries.

    Organizations can protect themselves from this threat by implementing stricter pre-employment vetting measures and creating policies to block unapproved IT management tools. For example, when evaluating potential employees, employers and recruiters should ensure that the candidates’ social media and professional accounts are unique and verify their contact information and digital footprint. Organizations should also be particularly cautious with staffing company employees, check for consistency in resumes, and use video calls to confirm a worker’s identity.

    Microsoft Threat Intelligence tracks North Korean IT remote worker activity as Jasper Sleet (formerly known as Storm-0287). We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet. To disrupt this activity and protect our customers, we’ve suspended 3,000 known Microsoft consumer accounts (Outlook/Hotmail) created by North Korean IT workers. We have also implemented several detections to alert our customers of this activity through Microsoft Entra ID Protection and Microsoft Defender XDR as noted at the end of this blog. As with any observed nation-state threat actor activity, Microsoft has directly notified targeted or compromised customers, providing them with important information needed to secure their environments. As we continue to observe more attempts by threat actors to leverage AI, not only do we report on them, but we also have principles in place to take action against them.

    This blog provides additional information on the North Korean remote IT worker operations we published previously, including Jasper Sleet’s usual TTPs to secure employment, such as using fraudulent identities and facilitators. We also provide recent observations regarding their use of AI tools. Finally, we share detailed guidance on how to investigate, monitor, and remediate possible North Korean remote IT worker activity, as well as detections and hunting capabilities to surface this threat.

    From North Korea to the world: The remote IT workforce

    Since at least early 2020, Microsoft has tracked a global operation conducted by North Korea in which skilled IT workers apply for remote job opportunities to generate revenue and support state interests. These workers present themselves as foreign (non-North Korean) or domestic-based teleworkers and use a variety of fraudulent means to bypass employment verification controls.

    North Korea’s fraudulent remote worker scheme has since evolved, establishing itself as a well-developed operation that has allowed North Korean remote workers to infiltrate technology-related roles across various industries. In some cases, victim organizations have even reported that remote IT workers were some of their most talented employees. Historically, this operation has focused on applying for IT, software development, and administrator positions in the technology sector. Such positions provide North Korean threat actors access to highly sensitive information to conduct information theft and extortion, among other operations.

    North Korean IT workers are a multifaceted threat because not only do they generate revenue for the North Korean regime, which violates international sanctions, they also use their access to steal sensitive intellectual property, source code, or trade secrets. In some cases, these North Korean workers even extort their employer into paying them in exchange for not publicly disclosing the company’s data.

    Between 2020 and 2022, the US government found that over 300 US companies in multiple industries, including several Fortune 500 companies, had unknowingly employed these workers, indicating the magnitude of this threat. The workers also attempted to gain access to information at two government agencies. Since then, the cybersecurity community has continued to detect thousands of North Korean workers. On January 3, 2025, the Justice Department released an indictment identifying two North Korean nationals and three facilitators responsible for conducting fraudulent work between 2018 and 2024. The indicted individuals generated a revenue of at least US$866,255 from only ten of the at least 64 infiltrated US companies.

    North Korean threat actors are evolving across the threat landscape to incorporate more sophisticated tactics and tools to conduct malicious employment-related activity, including the use of custom and AI-enabled software.

    Tactics and techniques

    The tactics and techniques employed by North Korean remote IT workers involve a sophisticated ecosystem of crafting fake personas, performing remote work, and securing payments. North Korean IT workers apply for remote roles, in various sectors, at organizations across the globe.

    They create, rent, or procure stolen identities that match the geo-location of their target organizations (for example, they would establish a US-based identity to apply for roles at US-based companies), create email accounts and social media profiles, and establish legitimacy through fake portfolios and profiles on developer platforms like GitHub and LinkedIn. Additionally, they leverage AI tools to enhance their operations, including image creation and voice-changing software. Facilitators play a crucial role in validating fraudulent identities and managing logistics, such as forwarding company hardware and creating accounts on freelance job websites. To evade detection, these workers use VPNs, virtual private servers (VPSs), and proxy services as well as RMM tools to connect to a device housed at a facilitator’s laptop farm located in the country of the job.

    Figure 1. The North Korean IT worker ecosystem

    Crafting fake personas and profiles

    The North Korean remote IT worker fraud scheme begins with the procurement of identities for the workers. These identities, which can be stolen or “rented” from witting individuals, include names, national identification numbers, and dates of birth. The workers might also leverage services that generate fraudulent identities, complete with seemingly legitimate documentation, to fabricate their personas. They then create email accounts and social media pages they use to apply for jobs, often indirectly through staffing or contracting companies. They also apply for freelance opportunities through freelancer sites as an additional avenue for revenue generation. Notably, they often use the same names/profiles repeatedly rather than creating unique personas for each successful infiltration.

    Additionally, the North Korean IT workers have used fake profiles on LinkedIn to communicate with recruiters and apply for jobs.

    Figure 2. An example of a North Korean IT worker LinkedIn profile that has since been taken down.

    The workers tailor their fake resumes and profiles to match the requirements for specific remote IT positions, thus increasing their chances of getting selected. Over time, we’ve observed these fake resumes and employee documents noticeably improving in quality, now appearing more polished and lacking grammatical errors facilitated by AI.

    After creating their fake personas, the North Korean IT workers then attempt to establish legitimacy by creating digital footprints for these fake personas. They typically leverage communication, networking, and developer platforms, (for example, GitHub) to showcase their supposed portfolio of previous work samples:

    Figure 3. Example profile used by a North Korean IT worker that has since been taken down.

    Using AI to improve operations

    Microsoft Threat intelligence has observed North Korean remote IT workers leveraging AI to improve the quantity and quality of their operations. For example, in October 2024, we found a public repository containing actual and AI-enhanced images of suspected North Korean IT workers:

    Figure 4. Photos of potential North Korean IT workers

    The repository also contained the resumes and email accounts used by the said workers, along with the following tools and resources they can use to secure employment and to do their work:

    • VPS and VPN accounts, along with specific VPS IP addresses
    • Playbooks on conducting identity theft and creating and bidding jobs on freelancer websites
    • Wallet information and suspected payments made to facilitators
    • LinkedIn, GitHub, Upwork, TeamViewer, Telegram, and Skype accounts
    • Tracking sheet of work performed, and payments received by the IT workers

    Image creation

    Based on our review of the repository mentioned previously, North Korean IT workers appear to conduct identity theft and then use AI tools like Faceswap to move their pictures over to the stolen employment and identity documents. The attackers also use these AI tools to take pictures of the workers and move them to more professional looking settings. The workers then use these AI-generated pictures on one or more resumes or profiles when applying for jobs.

    Figure 5. Use of AI apps to modify photos used for North Korean IT workers’ resumes and profiles
    Figure 6. Examples of resumes for North Korean IT workers. These two resumes use different versions of the same photo.

    Communications

    Microsoft Threat Intelligence has observed that North Korean IT workers are also experimenting with other AI technologies such as voice-changing software. While we haven’t observed threat actors using combined AI voice and video products as a tactic first hand, we do recognize that combining these technologies could allow future threat actor campaigns to trick interviewers into thinking they aren’t communicating with a North Korean IT worker. If successful, this tactic could allow the North Korean IT workers to do interviews directly and no longer rely on facilitators standing in for them on interviews or selling them account access.

    Facilitators for initial access

    North Korean Remote IT workers require assistance from a witting facilitator to help find jobs, pass the employment verification process, and once hired, successfully work remotely. We’ve observed Jasper Sleet advertising job opportunities for facilitator roles under the guise of partnering with a remote job candidate to help secure an IT role in a competitive market:

    Figure 7. Example of a job opportunity for a facilitator role

    The IT workers may have the facilitators assist in creating accounts on remote and freelance job websites. They might also ask the facilitator to perform the following tasks as their relationship builds:

    • Create a bank account for the North Korean IT worker, or lend their (the facilitator’s) own account to the worker
    • Purchase mobile phone numbers or SIM cards

    During the employment verification process, the witting accomplice helps the North Korean IT workers validate the latter’s fraudulent identities using online background check service providers. The documents submitted by the workers include fake or stolen drivers’ licenses, social security cards, passports, and permanent resident identification cards. Workers train using interview scripts, which include a justification for why the employee must work remotely.

    Once hired, the remote workers direct company laptops and hardware to be sent to the address of the accomplice. The accomplice then either runs a laptop farm that provides the laptops with an internet connection at the geo-location of the role or forwards the items internationally. For hardware that remain in the country of the role, the accomplice signs into the computers and installs software that enables the workers to connect remotely. Remote IT workers might also access devices remotely using IP-based KVM devices, like PiKVM or TinyPilot.

    Defense evasion and persistence

    To conceal their physical location as well as maintain persistence and blend into the target organization’s environment, the workers typically use VPNs (particularly Astrill VPN), VPSs, proxy services, and RMM tools. Microsoft Threat Intelligence has observed the persistent use of JumpConnect, TinyPilot, Rust Desk, TeamViewer, AnyViewer, and Anydesk. When an in-person presence or face-to-face meeting is required, for example to confirm banking information or attend a meeting, the workers have been known to pay accomplices to stand in for them. When possible, however, the workers eliminate all face-to-face contact, offering fraudulent excuses for why they are not on camera during video teleconferencing calls or speaking.

    Attribution

    Microsoft Threat Intelligence uses the name Jasper Sleet (formerly known as Storm-0287) to represent activity associated with North Korean’s remote IT worker program. These workers are primarily focused on revenue generation, use remote access tools, and likely fall under a particular leadership structure in North Korea. We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet.

    How Microsoft disrupts North Korean remote IT worker operations with machine learning

    Microsoft has successfully scaled analyst tradecraft to accelerate the identification and disruption of North Korean IT workers in customer environments by developing a custom machine learning solution. This has been achieved by leveraging Microsoft’s existing threat intelligence and weak signals generated by monitoring for many of the red flags listed in this blog, among others. For example, this solution uses impossible time travel risk detections, most commonly between a Western nation and China or Russia. The machine learning workflow uses these features to surface suspect accounts most likely to be North Korean IT workers for assessment by Microsoft Threat Intelligence analysts.

    Once Microsoft Threat Intelligence reviews and confirms that an account is indeed associated with a North Korean IT worker, customers are then notified with a Microsoft Entra ID Protection risk detection warning of a risky sign-in based on Microsoft’s threat intelligence. Microsoft Defender XDR customers also receive the alert Sign-in activity by a suspected North Korean entity in the Microsoft Defender portal.

    Defending against North Korean remote IT worker infiltration

    Defending against the threats from North Korean remote IT workers involves a threefold strategy:

    • Ensuring a proper vetting approach is in place for freelance workers and vendors
    • Monitoring for anomalous user activity
    • Responding to suspected Jasper Sleet signals in close coordination with your insider risk team

    Investigate

    How can you identify a North Korean remote IT worker in the hiring process?

    To protect your organization against a potential North Korean insider threat, it is important for your organization to prioritize a process for verifying employees to identify potential risks. The following can be used to assess potential employees:

    • Confirm the potential employee has a digital footprint and look for signs of authenticity. This includes a real phone number (not VoIP), a residential address, and social media accounts. Ensure the potential employee’s social media/professional accounts are not highly similar to the accounts of other individuals. In addition, check that the contact phone number listed on the potential employee’s account is unique and not also used by other accounts.
    • Scrutinize resumes and background checks for consistency of names, addresses, and dates. Consider contacting references by phone or video-teleconference rather than email only.
    • Exercise greater scrutiny for employees of staffing companies, since this is the easiest avenue for North Korean workers to infiltrate target companies.
    • Search whether a potential employee is employed at multiple companies using the same persona.
    • Ensure the potential employee is seen on camera during multiple video telecommunication sessions. If the potential employee reports video and/or microphone issues that prohibit participation, this should be considered a red flag.
    • During video verification, request individuals to physically hold driver’s licenses, passports, or identity documents up to camera.
    • Keep records, including recordings of video interviews, of all interactions with potential employees.
    • Require notarized proof of identity.

    Monitor

    How can your organization prevent falling victim to the North Korean remote IT worker technique?

    To prevent the risks associated with North Korean insider threats, it’s vital to monitor for activity typically associated with this fraudulent scheme.

    Monitor for identifiable characteristics of North Korean remote workers

    Microsoft has identified the following characteristics of a North Korean remote worker. Note that not all the criteria are necessarily required, and further, a positive identification of a remote worker doesn’t guarantee that the worker is North Korean.

    • The employee lists a Chinese phone number on social media accounts that is used by other accounts.
    • The worker’s work-issued laptop authenticates from an IP address of a known North Korean IT worker laptop farm, or from foreign—most commonly Chinese or Russian—IP addresses even though the worker is supposed to have a different work location.
    • The worker is employed at multiple companies using the same persona. Employees of staffing companies require heightened scrutiny, given this is the easiest way for North Korean workers to infiltrate target companies.
    • Once a laptop is issued to the worker, RMM software is immediately downloaded onto it and used in combination with a VPN.
    • The worker has never been seen on camera during a video telecommunication session or is only seen a few times. The worker may also report video and/or microphone issues that prohibit participation from the start.
    • The worker’s online activity doesn’t align with routine co-worker hours, with limited engagement across approved communication platforms.

    Monitor for activity associated with Jasper Sleet access

    • If RMM tools are used in your environment, enforce security settings where possible, to implement MFA:
      • If an unapproved installation is discovered, reset passwords for accounts used to install the RMM services. If a system-level account was used to install the software, further investigation may be warranted.
    • Monitor for impossible travel—for example, a supposedly US-based employee signing in from China or Russia.
    • Monitor for use of public VPNs such as Astrill. For example, IP addresses associated with VPNs known to be used by Jasper Sleet can be added to Sentinel watchlists. Or, Microsoft Defender for Identity can integrate with your VPN solution to provide more information about user activity, such as extra detection for abnormal VPN connections.
    • Monitor for signals of insider threats in your environment. Microsoft Purview Insider Risk Management can help identify potentially malicious or inadvertent insider risks.
    • Monitor for consistent user activity outside of typical working hours.

    Remediate

    What are the next steps if you positively identify a North Korean remote IT worker employed at your company?

    Because Jasper Sleet activity follows legitimate job offers and authorized access, Microsoft recommends approaching confirmed or suspected Jasper Sleet intrusions with an insider risk approach using your organization’s insider risk response plan or incident response provider like Microsoft Incident Response. Some steps might include:

    • Restrict response efforts to a small, trusted insider risk working group, trained in operational security (OPSEC) to avoid tipping off subjects and potential collaborators.
    • Rapidly evaluate the subject’s proximity to critical assets, such as:
      • Leadership or sensitive teams
      • Direct reports or vendor staff the subject has influence over
      • Suppliers or vendors
      • People/non-people accounts, production/pre-production environments, shared accounts, security groups, third-party accounts, security groups, distribution groups, data clusters, and more
    • Conduct preliminary link analysis to:
      • Detect relationships with potential collaborators, supporters, or other potential aliases operated by the same actor
      • Identify shared indicators (for example, shared IP addresses, behavioral overlap)
      • Avoid premature action that might alert other Jasper Sleet operators
    • Conduct a risk-based prioritization of efforts, informed by:
      • Placement and access to critical assets (not necessarily where you identified them)
      • Stakeholder insight from potentially impacted business units
      • Business impact considerations of containment (which might support additional collection/analysis) or mitigation (for example, eviction)
    • Conduct open-source intelligence (OSINT) collection and analysis to:
      • Determine if the identity associated with the threat actor is associated with a real person. For example, North Korean IT workers have leveraged stolen identities of real US persons to facilitate their fraud. Conduct OSINT on all available personally identifiable information (PII) provided by the actor (name, date of birth, SSN, home of record, phone number, emergency contact, and others) and determine if these items are linked to additional North Korean actors, and/or real persons’ identities.
      • Gather all known external accounts operated by the alias/persona (for example, LinkedIn, GitHub, freelance working sites, bug bounty programs).
      • Perform analysis on account images using open-source tools such as FaceForensics++ to determine prevalence of AI-generated content. Detection opportunities within video and imagery include: 
        • Temporal consistency issues: Rapid movements cause noticeable artifacts in video deepfakes as the tracking system struggles to maintain accurate landmark positioning. 
        • Occlusion handling: When objects pass over the AI-generated content such as the face, deepfake systems tend to fail at properly reconstructing the partially obscured face.
        • Lighting adaptation: Changes in lighting conditions might reveal inconsistencies in the rendering of the face
        • Audio-visual synchronization: Slight delays between lip movements and speech are detectable under careful observation
          • Exaggerated facial expressions. 
          • Duplicative or improperly placed appendages.
          • Pixelation or tearing at edges of face, eyes, ears, and glasses.
    • Engage counterintelligence or insider risk/threat teams to:
      • Understand tradecraft and likely next steps
      • Gain national-level threat context, if applicable
    • Make incremental, risk-based investigative and response decisions with the support of your insider threat working group and your insider threat stakeholder group; one providing tactical feedback and the other providing risk tolerance feedback.
    • Preserve evidence and document findings.
    • Share lessons learned and increase awareness.
    • Educate employees on the risks associated with insider threats and provide regular security training for employees to recognize and respond to threats, including a section on the unique threat posed by North Korean IT workers.

    After an insider risk response to Jasper Sleet, it might be necessary to also conduct a thorough forensic investigation of all systems that the employee had access to for indicators of persistence, such as RMM tools or system/resource modifications.

    For additional resources, refer to CISA’s Insider Threat Mitigation Guide. If you suspect your organization is being targeted by nation-state cyber activity, report it to the appropriate national authority. For US-based organizations, the Federal Bureau of Investigation (FBI) recommends reporting North Korean remote IT worker activity to the Internet Crime Complaint Center (IC3).

    Microsoft Defender XDR detections

    Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, apps to provide integrated protection against attacks like the threat discussed in this blog.

    Customers with provisioned access can also use Microsoft Security Copilot in Microsoft Defender to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.

    Microsoft Defender XDR

    Alerts with the following titles in the security center can indicate threat activity on your network:

    • Sign-in activity by a suspected North Korean entity

    Microsoft Defender for Endpoint

    Alerts with the following titles in the security center can indicate Jasper Sleet RMM activity on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Suspicious usage of remote management software
    • Suspicious connection to remote access software

    Microsoft Defender for Identity

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Atypical travel
    • Suspicious behavior: Impossible travel activity

    Microsoft EntraID Protection

    Microsoft Entra ID Protection risk detections inform Entra ID user risk events and can indicate associated threat activity, including unusual user activity consistent with known patterns identified by Microsoft Threat Intelligence research. Note, however, that these alerts can be also triggered by unrelated threat activity.

    • Microsoft Entra threat intelligence (sign-in): (RiskEventType: investigationsThreatIntelligence)

    Microsoft Defender for Cloud Apps

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Impossible travel activity

    Microsoft Security Copilot

    Security Copilot customers can use the standalone experience to create their own prompts or run the following pre-built promptbooks to automate incident response or investigation tasks related to this threat:

    • Incident investigation
    • Microsoft User analysis
    • Threat actor profile

    Note that some promptbooks require access to plugins for Microsoft products such as Microsoft Defender XDR or Microsoft Sentinel.

    Hunting queries

    Microsoft Defender XDR

    Because organizations might have legitimate and frequent uses for RMM software, we recommend using the Microsoft Defender XDR advanced hunting queries available on GitHub to locate RMM software that hasn’t been endorsed by your organization for further investigation. In some cases, these results might include benign activity from legitimate users. Regardless of use case, all newly installed RMM instances should be scrutinized and investigated.

    If any queries have high fidelity for discovering unsanctioned RMM instances in your environment, and don’t detect benign activity, you can create a custom detection rule from the advanced hunting query in the Microsoft Defender portal. 

    Microsoft Sentinel

    The alert Insider Risk Sensitive Data Access Outside Organizational Geo-locationjoins Azure Information Protection logs (InformationProtectionLogs_CL) with Microsoft Entra ID sign-in logs (SigninLogs) to provide a correlation of sensitive data access by geo-location. Results include:

    • User principal name
    • Label name
    • Activity
    • City
    • State
    • Country/Region
    • Time generated

    The recommended configuration is to include (or exclude) sign-in geo-locations (city, state, country and/or region) for trusted organizational locations. There is an option for configuration of correlations against Microsoft Sentinel watchlists. Accessing sensitive data from a new or unauthorized geo-location warrants further review.

    References

    Acknowledgments

    For more information on North Korean remote IT worker operations, we recommend reviewing DTEX’s in-depth analysis in the report Exposing DPRK’s Cyber Syndicate and IT Workforce.

    Learn more

    Meet the experts behind Microsoft Threat Intelligence, Incident Response, and the Microsoft Security Response Center at our VIP Mixer at Black Hat 2025. Discover how our end-to-end platform can help you strengthen resilience and elevate your security posture.

    For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog. 

    To get notified about new publications and to join discussions on social media, follow us on LinkedIn, X (formerly Twitter), and Bluesky. 

    To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast. 

    MIL OSI Economics

  • MIL-OSI USA: Sen. Budd Votes for the One Big Beautiful Bill Act ToDeliver Historic Tax Cuts for North Carolina Families

    US Senate News:

    Source: United States Senator Ted Budd (R-North Carolina)
    Washington, D.C. — U.S. Senator Ted Budd (R-N.C.) released the following statement after voting in support of President Trump’s One Big Beautiful Bill Act, historic legislation that lowers taxes for families, makes America safer and more secure, and unleashes economic growth for the future:
    “I voted in favor of the One Big Beautiful Bill Act because the people of North Carolina deserve more of their hard-earned wages, a more secure border, a reinvigorated military, responsible spending reforms for government programs, and a thriving economy. My colleagues and I fought successfully to protect North Carolina’s tobacco growers to help them stay competitive with China. I am also grateful that this bill included my PELL Act, which will help Americans earn in-demand credentials for rewarding careers. I hope my colleagues in the House quickly get this bill on President Trump’s desk because Americans cannot afford the largest tax increase in our nation’s history,” said Sen. Budd. 
    Here’s How the One Big Beautiful Bill Act Directly Benefits North Carolina:
    Provides Unprecedented Tax Relief for Families
    This legislation helps Americans keep more money in their pockets by extending key provisions of President Trump’s 2017 Tax Cuts and Jobs Act. Preventing the largest tax increase in American history will save the average North Carolinian $2,474 in 2026.
    Working families will receive significant savings with the increase and permanence of the child tax credit, expanded tax credits for paid leave, enhanced 529 savings accounts, and additional childcare access.
    This legislation lowers taxes for seniors relying on Social Security.
    Gives Workers the Tools They Need to Advance Their Careers
    Sen. Budd fought to have his PELL Act included in this legislation, a provision that expands Pell Grant eligibility for high-quality, short-term workforce programs. This would benefit individuals seeking to advance their careers without long-term debt while also providing American businesses with a broader, better-prepared talent pool ready to meet the demands of a rapidly evolving economy.
    Protects North Carolina Agriculture
    Sen. Budd successfully defended tobacco’s eligibility to receive the “duty drawback,” allowing tobacco manufacturers to receive reimbursement for the tariffs they pay on materials used to produce tobacco products that they ship to international markets. This will protect North Carolina growers and prevent the tobacco market from being flooded with cheaper, lower-quality products from China and Brazil.
    This legislation provides serious tax relief for North Carolina farmers by raising the death tax exemption, ensuring family farms can be passed down to future generations, rather than being broken up and sold.
    Unlocks Economic Growth & American Manufacturing
    This legislation will create a renaissance in American manufacturing by delivering full expensing for companies that build new factories and invest in equipment and machinery. This will help create new, good-paying jobs.
    By enhancing the small business deduction and making it permanent, small businesses will be able to hire more workers.
    Increasing deductions for small businesses’ equipment and property will quickly help businesses grow.
    Reduces Government Spending to Preserve & Protect Government Programs
    This legislation contains the first structural reforms to address waste, fraud, and abuse in key government programs like SNAP and Medicaid in over three decades. Slowing the rate of exponential cost increases will result in significant deficit savings and will preserve and protect these programs for future generations.
    Invests in America’s National Defense
    Sen. Budd helped secure funding to boost manufacturing capacity for the next generation of the F-15, the F-15EX, which will sustain the training mission at Seymour Johnson far into the future. 
    This legislation also includes significant funding to enhance America’s air superiority by preventing the retirement of the F-15E aircraft flying out of Seymour Johnson Air Force Base. 
    America’s troops deserve a pay raise. This legislation increases pay and allowances while making improvements to housing, healthcare, childcare, and education.
    This legislation makes generational investments in our military readiness that will protect the American homeland and deter our adversaries by boosting America’s missile defense by building the “Golden Dome.”
    Sen. Budd worked to secure investments to improve housing at Fort Bragg and Seymour Johnson and funds for restoration and modernization at Camp Lejeune.
    This legislation creates new production lines to scale innovative, cost-effective munitions, so we are no longer shooting $4M missiles at $50,000 drones.
    This legislation makes the largest ever investment in the Coast Guard’s history, which will purchase more than 40 new helicopters and six new C-130J aircraft, which will be serviced at the Aviation Technical Training Center in Elizabeth City. The legislation also funds 17 new icebreakers to protect American interests and 21 new cutters to combat drug runners and human traffickers.
    Keeps America’s Border Secure
    While President Trump’s policies have resulted in a dramatic drop-off of illegal immigration, this legislation also boosts America’s border security by surging funding for 3,000 new Border Patrol agents and 10,000 new ICE agents. The One Big Beautiful Bill also increases funding to finish President Trump’s border wall.
    Ushers in Next-Generation Technologies
    This legislation includes funding for the transformational air traffic control modernization project underway at the FAA. This will quickly update aging and failing technologies to keep Americans safe in the sky.
    This legislation makes a historic amount of spectrum available for commercial use, which will create new jobs and unleash the next generation of wireless technology. This will ensure America remains the premier destination for innovation and help unleash a new area of advanced manufacturing. This will also make the internet faster & more dependable across the country through commercial success stories like 5G, 6G, wi-fi, and private networks using CBRS.

    MIL OSI USA News

  • MIL-OSI United Kingdom: ARU students across region to celebrate graduation

    Source: Anglia Ruskin University

    An ARU graduation ceremony at Chelmsford Cathedral

    July will see approximately 6,000 Anglia Ruskin University (ARU) students across the East of England cross the stage to graduate, ready to take the next step in their careers.

    Ceremonies begin at the Cambridge Corn Exchange from Monday, July 7 until Wednesday, July 9. In addition to students formally receiving their degrees, an honorary doctorate will be bestowed on Nadia Edwards-Dashti, entrepreneur, author, equity and inclusion thought-leader, and co-founder of London-based Harrington Starr, a global leader in FinTech recruitment.

    Peterborough Cathedral will host the first ever set of graduations for ARU Peterborough students at 2pm on Friday, 11 July.

    On Monday, 14 July, graduation ceremonies take place in Essex, with 21 ceremonies to be held at Chelmsford Cathedral across the week.

    On Thursday, 17 July, ARU will bestow the award of Honorary Doctor of Business Administration on alumnus Vice Admiral Andrew Kyte, the Royal Navy’s Chief of Defence Logistics and Support.

    Many of the 6,000 students due to attend graduation ceremonies this month will go on to take up vital roles in public service, including careers as doctors and police officers.

    “Graduation is always a fantastic occasion, not only for our students and their families, but also our staff who have worked with them for several years to help them to earn their degree.

    “My warmest congratulations to all our graduates, we are extremely proud of them and they will always be part of our ARU community.”

    Professor Roderick Watkins, Vice Chancellor of Anglia Ruskin University (ARU)

    MIL OSI United Kingdom

  • MIL-OSI USA: Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes

    Source: US State of North Dakota

    Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers

    The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.

    According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.

    As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.

    “These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”

    “North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”

    “North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”

    Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts

    Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme. 

    “The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”

    According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).

    Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.

    IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files  containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.

    Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.

    Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.

    The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.

    Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.

    Kim Kwang Jin et al. Indictment – Northern District of Georgia

    Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.

    “The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”

    According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

    After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

    To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.

    The FBI Atlanta Field Office is investigating the case.

    Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.

    21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District

    Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.

    Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.

    ***

    The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.

    As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.

    Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.

    The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.

    The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI USA: Durable Medical Equipment Owner Sentenced to 12 Years for $61 Million Medicare Fraud Scheme

    Source: US State of North Dakota

    A Florida man was sentenced today to 12 years in prison and three years of supervised release for conspiring to defraud Medicare with false reimbursement claims for durable medical equipment (DME). He was also ordered to pay $21,195,540.18 in restitution and forfeiture in the amount of $2,514,040.

    According to court documents, Peter Roussonicolos, 64, of Port Saint Lucie, Florida, owned and operated five DME suppliers as a silent partner. Roussonicolos hid his involvement in the companies from Medicare because he had one or more felony convictions, making him ineligible to enroll with the government program. To further conceal his involvement, he recruited and paid co-conspirators to serve as nominee owners of the DME suppliers and caused others to falsify Medicare enrollment forms, bank records, and other documents to conceal the true ownership and control of the DME suppliers. He also knew that a co-conspirator paid kickbacks and bribes to patient recruiters in exchange for beneficiary referrals. As part of the scheme, the DME companies submitted approximately $61.5 million in false and fraudulent claims to Medicare for medically unnecessary DME that was ineligible for reimbursement and were paid approximately $26.7 million of these claims.

    “Through lies and deceit, the defendant and his co-conspirators orchestrated a $61 million fraud on Medicare,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The defendant’s fraud drained critical government resources that could have been used to help vulnerable Americans. Today’s sentencing demonstrates the Department’s steadfast commitment to protecting taxpayer dollars and ensuring accountability for those who seek to defraud our health care programs.”

    “Today’s sentence underscores HHS-OIG’s firm commitment to thoroughly investigating individuals who engage in illegal kickback schemes to prescribe medically unnecessary durable medical equipment for their own personal financial gain,” said Deputy Inspector General for Investigations Christian J. Schrank with the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG). “We remain steadfast in our mission to protect the integrity of Medicare and other federal healthcare programs as well as the people served by those programs.”

    “This defendant and his co-conspirators orchestrated an elaborate scheme to steal millions from Medicare through kickbacks and sham billing,” said Assistant Director Jose A. Perez of the FBI Criminal Investigative Division. “Today’s sentencing demonstrates that those who exploit our healthcare system for personal gain will be held accountable. The FBI is committed to working with our partners to protect taxpayer dollars and ensure the integrity of healthcare programs.”

    In November 2024, Roussonicolos pleaded guilty to conspiracy to commit health care fraud and wire fraud.

    The FBI and HHS-OIG investigated the case.

    Trial Attorney Jennifer Burns and Assistant Chiefs Jamie de Boer and Emily Gurskis of the Criminal Division’s Fraud Section prosecuted the case. Trial Attorneys Joanna Bowman and Lindita Ciko Torza of the Special Matters Unit assisted in the prosecution.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of 9 strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with the Office of the Inspector General for the Department of Health and Human Services, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www. justice. gov/criminal-fraud/health-care-fraud-unit.

    MIL OSI USA News

  • MIL-OSI USA: Justice Department Requires Divestitures and Licensing Commitments in HPE’s Acquisition of Juniper Networks

    Source: US State of California

    WASHINGTON — Achieving a result otherwise unavailable through litigation, earlier today the Justice Department advised the court it had reached a settlement with HPE and Juniper that allows their merger to continue. This novel approach by the Justice Department reflects a commitment to solving unique challenges in mergers. Under the leadership of Attorney General Pam Bondi the laws of this country will be zealously enforced.

    “Thank you to the hardworking men and women of the Antitrust Division for their work on this case.” — Gail Slater, Assistant Attorney General for the Antitrust Divison

    “This marks another key legal victory from the Department of Justice’s Antitrust division. Our attorneys will continue fighting and winning to defend the American people and consumers.” — Department of Justice Chief of Staff Chad Mizelle

    The settlement requires HPE to divest its Instant On business and mandates that the merged firm license critical Juniper software to independent competitors. HPE must divest its global “Instant On” campus and branch WLAN business, including all assets, intellectual property, R&D personnel, and customer relationships, to a DOJ-approved buyer within 180 days. The agreement also ensures that key software assets will be available to rivals looking to compete with the merged company. The parties must hold an auction to license Juniper’s AI Ops for Mist source code—an important component in modern WLAN systems. The license will be perpetual, non-exclusive, and include optional transitional support and personnel transfers to facilitate competition.

    MIL OSI USA News

  • MIL-OSI USA: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: US State of California

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: Eureka Chiropractor Sentenced to 20 Months in Prison and Ordered to Repay More than $2.3 Million for Defrauding Medicare

    Source: US FBI

    PEORIA, Ill. – Carrie Musselman, 48, of Eureka, Illinois, was sentenced on June 24, 2025, to 20 months in prison and ordered to pay more than $2.3 million dollars in restitution following her convictions on multiple charges related to her scheme to defraud Medicare and twelve other insurance companies. A jury found Musselman guilty of one count of healthcare fraud and five counts of wire fraud after a 13-day trial in February 2025.

    At the sentencing hearing before Senior U.S. District Judge Michael M. Mihm, the government presented evidence that Musselman, a chiropractor in Eureka, engaged in a multi-year fraud to steal more than $2.5 million from Medicare and other insurance companies. As part of the scheme, Musselman submitted fraudulent insurance claims which indicated that services had been performed by medical doctors when they were actually performed by mid-level providers. That resulted in automatic pay increases for Musselman to which she was not entitled.

    Musselman also made claims that falsely asserted patients had received services that were never provided. These claims included purportedly providing patients with allergy injections when no such injections were given. Instead, patients were sent home with oral drops that had not been approved by the Food and Drug Administration, were considered “experimental,” and had not been proven to be effective.

    And Musselman misrepresented services that were provided, again resulting in her receipt of payments to which she was not entitled. One of Musselman’s most highly reimbursed services, the placement of an electroacupuncture device, which she falsely billed as a surgically implanted neurostimulator, would not have qualified for any payment but for her deception.

    Also at the hearing, Judge Mihm found that Musselman had committed perjury in her testimony. In doing so, the judge noted that Musselman’s statements lacked credibility. He stated that Musselman was well aware of the fraud she was committing and that she had directed and encouraged the fraud. 

    “This case should serve as a warning to anyone who would commit fraud against health insurance,” said Acting United States Attorney Gregory M. Gilmore. “We will seek out fraud, waste, and abuse and prosecute those who engage in it. Providers who take advantage of the trust placed in them to line their own pockets abandon their ethical responsibilities and raise health insurance costs for vulnerable patients.”

    “The submission of false claims undermines the integrity of our federal healthcare system,” said Linda T. Hanley, Special Agent in Charge with the United States Department of Health and Human Services Office of Inspector General. “We remain committed to holding healthcare providers accountable for complying with Medicare regulations so that enrollees can continue to rely on the program and receive the care they deserve.”

    “Bad actors in healthcare, such as Dr. Musselman, think they can cover up fraud through clouded paperwork and technical healthcare jargon all while they commit illegal acts such as false claims, fraudulent services, and in this case, services not even rendered,” said Christopher J.S. Johnson, the Special Agent in Charge of the FBI Springfield Field Office. “This sentencing and ordered restitution are a testament to the FBI’s commitment to working these types of cases. It doesn’t matter how clouded the paperwork, or how many files there are to go through, if there is a victim, then there will be an agent investigating it.”

    The case investigation was conducted by the Department of Health and Human Services, Office of Inspector General, Office of Investigations, and the Federal Bureau of Investigation, Springfield Field Office. Assistant U.S. Attorneys Douglas F. McMeyer, Bryan D. Freres, and Grace J. Hitzeman represented the government at trial.

    MIL Security OSI

  • MIL-OSI Security: Justice Department Requires Divestitures and Licensing Commitments in HPE’s Acquisition of Juniper Networks

    Source: United States Attorneys General

    WASHINGTON — Achieving a result otherwise unavailable through litigation, earlier today the Justice Department advised the court it had reached a settlement with HPE and Juniper that allows their merger to continue. This novel approach by the Justice Department reflects a commitment to solving unique challenges in mergers. Under the leadership of Attorney General Pam Bondi the laws of this country will be zealously enforced.

    “Thank you to the hardworking men and women of the Antitrust Division for their work on this case.” — Gail Slater, Assistant Attorney General for the Antitrust Divison

    “This marks another key legal victory from the Department of Justice’s Antitrust division. Our attorneys will continue fighting and winning to defend the American people and consumers.” — Department of Justice Chief of Staff Chad Mizelle

    The settlement requires HPE to divest its Instant On business and mandates that the merged firm license critical Juniper software to independent competitors. HPE must divest its global “Instant On” campus and branch WLAN business, including all assets, intellectual property, R&D personnel, and customer relationships, to a DOJ-approved buyer within 180 days. The agreement also ensures that key software assets will be available to rivals looking to compete with the merged company. The parties must hold an auction to license Juniper’s AI Ops for Mist source code—an important component in modern WLAN systems. The license will be perpetual, non-exclusive, and include optional transitional support and personnel transfers to facilitate competition.

    MIL Security OSI

  • MIL-OSI Security: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: United States Attorneys General

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI