NewzIntel.com

    • Checkout Page
    • Contact Us
    • Default Redirect Page
    • Frontpage
    • Home-2
    • Home-3
    • Lost Password
    • Member Login
    • Member LogOut
    • Member TOS Page
    • My Account
    • NewzIntel Alert Control-Panel
    • NewzIntel Latest Reports
    • Post Views Counter
    • Privacy Policy
    • Public Individual Page
    • Register
    • Subscription Plan
    • Thank You Page

Category: Crime

  • MIL-OSI: Best Online Casinos Australia: JACKBIT Ranked #1 for Real Money Pokies for Australian Players!

    Source: GlobeNewswire (MIL-OSI)

    BRISBANE, Australia, May 22, 2025 (GLOBE NEWSWIRE) — In the fast-evolving world of online gambling, JACKBIT has been recognized as the top choice among the best online casinos in Australia in 2025. In a highly competitive iGaming landscape, JACKBIT surges ahead with its player-friendly features, particularly its no KYC policy and instant crypto withdrawals, earning it the number one spot among the best online casinos Australia offering real value for Aussie players.

    “We’re thrilled to be named a leader among the best online casinos Australia for 2025. At JACKBIT, we’ve focused on creating an experience that puts players first, with seamless crypto payouts, exciting bonuses, and a massive game selection. It’s all about delivering trust, fairness, and fun,” said a JACKBIT spokesperson.

    Australian online casino fans know that fast payouts and diverse games are key to a great experience. These features are especially appealing for players wanting to dive into real money pokies without delays or complications.

    Recognizing this demand, JACKBIT has elevated its offerings in 2025, with tailored features designed for both new players and seasoned gamblers alike. JACKBIT sets a new standard among the best online casinos Australia with its instant crypto rewards and access to top pokies and table games, no lengthy verification needed.

    ✅SIGN UP WITH JACKBIT TO GET 100 NO-WAGERING FREE SPINS!

    How to Sign Up at JACKBIT – The Best Real Money Online Casino in Australia

    Joining JACKBIT is fast, easy, and takes less than five minutes. Just follow these simple steps to get started at one of Australia’s top crypto-friendly online casinos:

    1. Visit the Official JACKBIT Website
    Open your preferred browser and head to the official JACKBIT site to begin the signup process.

    2. Click “Sign Up.”
    Look for the “Sign Up” or “Register” button, usually located in the top-right corner. Click it to launch the registration form.

    3. Enter Basic Details
    Fill in a few essentials like your email, a secure password, and choose your preferred currency (crypto or fiat). No long forms – just the basics.

    4. Deposit Funds Using Your Preferred Method
    Once your account is created, choose a deposit method. JACKBIT supports both cryptocurrencies and traditional payment options. Fund your account to start playing.

    5. Claim Your Welcome Bonus
    New players can unlock a 30% Rakeback and 100 Free Spins. Don’t forget to activate this offer to maximize your first play session.

    6. Explore the Casino & Sportsbook
    With your bonus ready and account funded, explore JACKBIT’s massive game library of over 7,000 titles, or place bets in the fully loaded sportsbook.

    7. Confirm You’re of Legal Age
    Before registering, make sure you’re of legal gambling age in your jurisdiction – typically 18 or 19 years old. JACKBIT promotes safe and responsible gaming.

    JACKBIT’s Bonuses: A Game-Changer for Aussie Gamblers

    Bonuses are a big deal when choosing the best online casino Australia, and JACKBIT doesn’t disappoint. Its welcome offer is a 30% rakeback plus 100 free spins with no wagering requirements, meaning you keep what you win.

    This is a rare gem among the best online casinos Australia, as most platforms impose hefty wagering conditions. Whether you’re spinning the reels of the best online pokies or betting on sports, this bonus gives you a head start.

    JACKBIT keeps the rewards coming with a variety of promotions:

    • Weekly $10,000 Giveaways: Compete for cash prizes and up to 10,000 free spins every week.
    • VIP Rakeback Program: Earn up to 30% rakeback based on your loyalty tier, rewarding long-term play.
    • Pragmatic Drops & Wins: Join tournaments with a €2,000,000 prize pool for slots and table games.
    • Sports Welcome Bonus: Get a 100% bonus up to $100 with insurance for sports betting fans.
    • NBA Playoffs Cashback: Special offers for basketball enthusiasts.
    • Social Media Bonuses: Follow JACKBIT’s channels for exclusive free spins and rewards.

    These promotions make JACKBIT a top online casino for value, catering to both casual players and high rollers. Always review the terms to understand any conditions. Claim your welcome bonus and start winning at JACKBIT!

    ✅CLICK HERE TO CLAIM YOUR 30% RAKEBACK + 100 FREE SPINS!

    A Comprehensive Review Focused on the Player

    The review process that crowned JACKBIT as the top choice among the best online casinos Australia was player-centric, evaluating key factors that matter most to Aussie gamblers. The criteria included:

    • License: Ensuring the platform operates under a reputable authority.
    • Fairness: Verifying that game outcomes are unbiased and audited.
    • Quality of Games: Assessing the variety and quality of the game library.
    • Bonuses and Promotions: Evaluating the value and fairness of offers.
    • Payment Methods: Checking for flexible, secure, and fast options.
    • Online Security: Confirming robust data protection measures.
    • Mobile Experience: Testing accessibility on smartphones and tablets.
    • Quality of Sportsbook: Reviewing betting options and odds.
    • KYC: Assessing ease of verification processes.
    • Deposit and Withdrawal Limits: Analyzing flexibility for all players.
    • Customer Support: Measuring responsiveness and helpfulness.

    JACKBIT excelled across all these areas, earning its place as the best payout online casino and a trusted online casino in Australia for 2025. “JACKBIT offers over 6,600 games from leading providers, which is one of the largest libraries among the best online casinos Australia,” noted the review team. “This vast selection ensures an exceptional experience, especially for fans of real money pokies.”

    Here’s a detailed breakdown of why JACKBIT, the best online casino Australia, was chosen as the top online casino:

    • License: Licensed by the Curacao eGaming Commission, ensuring regulatory compliance.
    • Fairness: Games are audited by independent firms, with RNG technology guaranteeing unbiased outcomes.
    • Quality of Games: Over 6,600 titles from providers like NetEnt, Microgaming, Pragmatic Play, and Play’n GO.
    • Bonuses and Promotions: 30% rakeback + 100 free spins with no wagering, plus weekly giveaways and tournaments.
    • Payment Methods: Supports AUD, crypto (Bitcoin, Ethereum, Tether), Visa, MasterCard, and e-wallets with instant crypto payouts.
    • Online Security: Uses 128-bit SSL encryption and secure servers with no history of data breaches.
    • Mobile Experience: Fully optimized HTML5 website for seamless play on Android and iOS.
    • Quality of Sportsbook: Covers 30+ sports and esports with competitive odds and exclusive bonuses.
    • KYC: No KYC required for crypto users, simplifying the signup process.
    • Limits for Deposits and Withdrawals: Minimum deposit of $50, withdrawals from $50, with a $25,000 weekly cap.
    • Customer Support: 24/7 support via live chat, email, and social media with fast response times.

    The review team expressed their excitement in finding a platform that delivers what Aussie players deserve: “JACKBIT scores high in every category, offering a safe, exciting, and fair experience that sets it apart among the best online casinos Australia.”

    Best Online Casino Australia: Game Selection

    JACKBIT’s game library is a standout, offering over 6,600 titles from industry leaders like Microgaming, NetEnt, Pragmatic Play, and Evolution Gaming. This vast selection makes it the best online casino Australia for game variety. Fans of real money pokies will find plenty to love, with popular titles including:

    • Book of Dead (Play’n GO): An Egyptian-themed adventure with free spins and high payouts.
    • Starburst (NetEnt): A vibrant slot with frequent wins and stunning visuals.
    • Mega Moolah (Microgaming): A progressive jackpot slot known for life-changing prizes.
    • Gonzo’s Quest (NetEnt): Features cascading reels and exciting multipliers.

    Beyond the best online pokies, JACKBIT offers classic table games like blackjack, roulette, poker, and baccarat. The live casino, powered by Evolution Gaming, delivers an authentic experience with professional dealers and HD streaming. Games like live blackjack, roulette, and unique titles like Dream Catcher bring the casino floor to your screen.

    Sports fans aren’t left out, as JACKBIT’s sportsbook covers over 30 sports, including AFL, NRL, basketball, and esports. With intuitive filters and a user-friendly interface, finding your favorite game is easy, whether you’re on desktop or mobile. Explore over 6,600 games at JACKBIT now!

    ✅CLICK HERE TO JOIN JACKBIT AND START WINNING TODAY!

    Payment Methods: Fast, Flexible, and Secure

    JACKBIT shines as a best payout online casino with payment options designed for Aussies. It supports both fiat and crypto, ensuring flexibility:

    Payment Method Fast Deposit Fast Withdrawal Processing Time
    Visa/MasterCard Yes Yes 3-5 business days
    E-Wallets Yes Yes 1-2 business days
    Bank Transfer Yes Yes 3-5 business days
    Bitcoin Yes Yes Instant
    Ethereum Yes Yes Instant
    Tether Yes Yes Instant
    Binance Coin Yes Yes Instant
    Solana Yes Yes Instant

    With a minimum deposit of $50 and instant crypto withdrawals, JACKBIT ensures quick access to winnings. The no KYC policy for crypto users adds convenience, making it the best online casino Australia.

    ✅CLICK HERE TO DEPOSIT AND PLAY AT JACKBIT NOW!

    Security and Fairness: Play with Peace of Mind

    JACKBIT operates under a Curacao eGaming Commission license, ensuring compliance with strict standards. Advanced 128-bit SSL encryption protects player data, and RNG technology guarantees fair game outcomes. Regular audits by independent firms reinforce its credibility, making JACKBIT the best online casino Australia.

    Mobile Experience: Game on the Go

    JACKBIT’s HTML5-powered website is fully optimized for mobile devices, offering seamless play on Android and iOS without an app. Whether you’re spinning pokies or betting on sports, the responsive design ensures a smooth experience, making JACKBIT the best online casino Australia for mobile gaming.

    Customer Support: Always Ready to Help

    JACKBIT provides 24/7 support via live chat, email (support@jackbit.com), and social media. The professional team responds quickly, ensuring players get help when needed. This dedication enhances JACKBIT’s status as a top online casino among the best online casinos Australia.

    JACKBIT Promotes Responsible Gambling

    Responsible gambling is a priority at JACKBIT, which offers tools like deposit limits, self-exclusion, and access to support organizations. The platform uses technology to detect problematic gambling patterns, providing assistance to ensure a safe experience. “Safety is key among the best online casinos Australia, and JACKBIT’s commitment to responsible gambling is why it stands out,” said the review team.

    Why JACKBIT is the Best in 2025, But What About 2026?

    “After our in-depth review, JACKBIT is clearly the best online casino in Australia for 2025,” said the review team. “But the iGaming world moves fast, with new platforms emerging constantly. We’ll revisit our analysis in 2026 to see if JACKBIT holds its crown or if another contender takes the lead among the best online casinos Australia.”

    To celebrate its top ranking, JACKBIT is offering new players a 30% rakeback plus 100 free spins with no wagering requirements.

    Player Reviews: What Aussies Say

    JACKBIT has earned a 4-star rating on Trustpilot based on hundreds of reviews.

    • “The instant crypto withdrawals are a game-changer,”- Jake from Brisbane.
    • “I love the huge pokie selection,” – Sarah from Perth.
    • “I’ve tried a bunch of online casinos, but Jackbit’s interface and payout speed are unbeatable. Cashed out in under 10 minutes with zero hassle!” – Liam, Melbourne
    • “Jackbit’s live dealer games make it feel like a real casino night from home. Plus, their crypto bonuses are the best I’ve seen in Australia.” – Emily, Adelaide

    These testimonials highlight why JACKBIT is the best online casino Australia.

    Tips for Maximizing Your JACKBIT Experience

    To get the most out of JACKBIT, consider these tips:

    • Use AUD: Avoid conversion fees by depositing in Australian dollars.
    • Try Demo Mode: Test games for free to hone your skills before betting real money.
    • Play Blackjack: Its low house edge makes it ideal for better odds.
    • Set Limits: Use responsible gambling tools to manage your budget.

    Comparing JACKBIT to Other Platforms

    Compared to other best online casinos Australia, JACKBIT’s no KYC policy, instant crypto payouts, and 6,600+ games give it an edge. While competitors offer similar features, JACKBIT’s blend of speed, variety, and player-focused policies makes it unmatched.

    ✅CLICK HERE TO JOIN JACKBIT NOW & GET EXCLUSIVE REWARDS!

    Final Thoughts About The Best Online Casinos Australia

    JACKBIT is likely the best online casino in Australia for 2025, delivering an unmatched mix of games, bonuses, and fast payouts. It’s no KYC policy, and instant crypto withdrawals appeal to players who value privacy and speed. Whether you’re chasing jackpots on real money pokies, enjoying live dealer games, or betting on sports, JACKBIT has it all.

    Frequently Asked Questions (FAQs) About The Best Online Casinos Australia

    1. Why are online casinos popular among Australian players in 2025?

    Online casinos have gained immense popularity among Aussie players due to their accessibility, wide variety of real money games, fast payouts, and crypto-friendly options. The ability to play from anywhere and take advantage of generous welcome bonuses has made them a top entertainment choice in Australia.

    2. Is it legal to play at online casinos in Australia?

    While operating an online casino from within Australia is restricted, Australian players are legally allowed to access and play at offshore online casinos. Make sure the platform is licensed and regulated by a reputable international authority to ensure safety.

    3. What types of games can I play at Australian online casinos?

    Top Australian online casinos offer a broad selection, including pokies (slots), blackjack, roulette, baccarat, video poker, and live dealer games. Many platforms, like Jackbit, also include crypto games and instant-win titles.

    4. Are mobile casinos reliable for real money gaming in Australia?

    Yes, most top online casinos are fully optimized for mobile play. Whether you use Android or iOS, you can enjoy smooth gameplay, secure transactions, and full access to bonuses and game libraries directly from your smartphone or tablet.

    5. How fast are withdrawals at Australian online casinos?

    Withdrawal speeds depend on the method used. Crypto withdrawals are often processed within minutes, while traditional banking methods may take 1–5 business days. Platforms like Jackbit are known for instant or same-day crypto payouts.

    6. What bonuses can I claim at the best Aussie online casinos?

    Australian players can access a range of promotions such as welcome bonuses, no-deposit offers, free spins, cashback, and reload bonuses. Always read the terms and wagering requirements before claiming.

    7. How do I choose the best online casino for my needs?

    Look for licensed casinos with strong reputations, a wide range of games, fast payouts, responsive customer support, and user-friendly interfaces. Reading reviews and checking forums can also help you make an informed decision.

    8. What tools are available to help players gamble responsibly?

    Top Australian online casinos offer responsible gambling tools like deposit limits, session timers, self-exclusion options, and access to support resources. These tools are essential to maintaining healthy gaming habits.

    Email: support@jackbit.com

    Disclaimer & Affiliate Disclosure

    The information in this article is for informational and promotional purposes only and is not legal, financial, or professional advice. While we strive for accuracy, no warranties are made regarding completeness or timeliness. Readers should verify information independently. The publisher, affiliates, and contributors are not liable for errors, omissions, or losses from using this content.

    This article may contain affiliate links. Clicking these links and making a deposit may earn us a commission at no extra cost to you. These relationships do not affect our editorial integrity, and all evaluations are based on independent research.

    Online gambling is for those of legal age (19+ in Australia). Gambling carries financial risks and may lead to addiction. Play responsibly and seek help if needed. All trademarks are the property of their respective owners. This content is not endorsed by any brands unless stated.

    Photos accompanying this announcement are available at:

    https://www.globenewswire.com/NewsRoom/AttachmentNg/485f0d51-c3ad-496c-a269-ceba1851cf4e

    https://www.globenewswire.com/NewsRoom/AttachmentNg/392641a0-20e8-45a8-856a-abfa70f0adc5

    The MIL Network –

    May 23, 2025
  • MIL-OSI United Kingdom: Appointment of Jonathan Hall KC as independent reviewer

    Source: United Kingdom – Executive Government & Departments

    News story

    Appointment of Jonathan Hall KC as independent reviewer

    Jonathan Hall KC has been appointed to lead the HMP Frankland Independent Review.

    Following the attacks on 3 prison officers in the separation centre at HMP Frankland on 12 April, the Lord Chancellor announced on 15 May that Jonathan Hall KC will lead the HMP Frankland Independent Review.

    The terms of the independent review are as follows:

    • Consider whether the facts of the incident, as established by HMPPS’ internal review reveal the need for any changes to how convicted terrorists are placed onto Separation Centres.
    • Consider whether the policies, operating procedures, legal framework, and relationships with other agencies that underpin Separation Centres are fit for purpose, including whether an appropriate balance is being struck between security and long-term offender management.
    • Provide findings and recommendations on the basis of the above that can be implemented to reduce the likelihood of any such incident occurring in the future.

    Lord Chancellor Shabana Mahmood said:

    I will do whatever it takes to protect our brave prison officers. I have asked for the review to report back promptly, and to leave no stone unturned so we can prevent such an incident ever happening again.

    Jonathan Hall KC

    Jonathan Hall KC is the current Independent Reviewer of Terrorism Legislation and Independent Reviewer of State Threats Legislation. Mr Hall is an experienced barrister in independent practice and King’s Counsel since 2014. He has been involved in complex and high-profile cases involving fraud, law enforcement, and national security.

    While Mr Hall will be given access to the information he needs to deliver against the terms of reference, the review will be independent of HMPPS. The report on the Review, including any recommendations, will be submitted to the Lord Chancellor and the Permanent Secretary at the Ministry of Justice.

    Share this page

    The following links open in a new tab

    • Share on Facebook (opens in new tab)
    • Share on Twitter (opens in new tab)

    Updates to this page

    Published 22 May 2025

    MIL OSI United Kingdom –

    May 23, 2025
  • MIL-Evening Report: Keith Rankin on the War in Sudan

    Analysis by Keith Rankin.

    Keith Rankin, trained as an economic historian, is a retired lecturer in Economics and Statistics. He lives in Auckland, New Zealand.

    On 11 April 2025, AP noted that the two-year-old Civil War in Sudan is regarded by the United Nations as “the world’s worst humanitarian crisis”, though it is grossly underreported (see Wake up: The Worst Humanitarian Crisis on Earth is in Sudan, by Shirley Martey Hargis and Mike Sexton, Third Way [2024]).

    Even Pope Leo XIV failed to mention ‘Sudan’ on Sunday when he denounced the conflicts in Gaza, Ukraine, and Myanmar (refer Pope Leo calls for peace in Gaza, Myanmar and Ukraine at the end of his inaugural mass, Africa News 18 May 2025).

    Al Jazeera’s The Stream (20 May) posed this social media post: “Trying to raise awareness about Sudan is like talking into a void. Nobody seems to care about the starving children or the innocent people being brutally executed by the RSF on a daily basis”.

    The young man, Elbashir Idris, political analyst, speaking from Cardiff, claimed: “There’s an international conspiracy done by the global order that seems to be working together against the Sudanese people”.

    What Sudan means to me, and that the conflict should mean to New Zealand

    I have not been to Israel, Gaza, Ukraine, or Myanmar; though I have been close to Gaza; Port Said (and other places in Egypt, during the week in September 1978 when Pope Jean-Paul I mysteriously died). And I enjoyed two days in Khartoum and Omdurman the following week.

    Sudan represents a special memory to me. It’s an assertive place. Khartoum, on the confluence of the Blue Nile and the White Nile, was the site of one of the most spectacular defeats of the British Empire, in 1884/85. I still remember the epic 1966 movie Khartoum, starring Charlton Heston and Lawrence Olivier.

    That 1880s’ stoush – reminiscent of the 2021 defeat of the United States by the Taliban – could have been New Zealand’s first involvement in a foreign imperial war. The conservative government in New Zealand – headed by Harry Atkinson – refused the request from the United Kingdom for military support; contrast the subsequent adventure into South Africa in 1899 under the Liberal Government of Richard Seddon.

    Al Jazeera reported just today (20 May 2025, Sudan time) that the new Battle of Khartoum (2023–2025) has resolved with a victory to the Sudanese Armed Forces over the rebel Rapid Support Forces. (The Wikipedia article is premature, calling the present Battle of Khartoum over on 26 March 2025.) The Sudan Civil War remains far from over, however.

    One reason why the west has paid so little attention to this conflict is almost certainly a racism-tainted view; that it’s just a civil war in ‘black Africa’, that the rest of the world can leave well-alone. But this view is not true, because the present Sudan Civil War is an international ‘proxy war’; fuelled by extra-national powers – regional if not global.

    Before the Civil War started, there was a successful military coup, in October 2021. Sudanese politics have always been convoluted, as is true in reality for most countries. Sudan had struggled for decades with a humanitarian crisis in its west – Darfur – with attacks on civilian communities by the mysterious Janjaweed which had links to Libya in the time of Muammar Gaddafi. The Janjaweed has now largely morphed into the Rapid Support Forces, and it’s an open contention that they are heavily backed by the United Arab Emirates; that is, the RSF – the force which appears to be mainly responsible for the humanitarian disaster – is an alleged proxy of the UAE. And the RSF have a lot of very sophisticated military kit; armaments which are clearly foreign-sourced and foreign-funded.

    Where is the journalism examining the role of the United Arab Emirates in this most brutal of wars; this war happening in front of our eyes but which we do not see? This is an important question for New Zealand, because the UAE is a particularly important commercial ally of New Zealand.

    Al Jazeera’s Inside Story (15 April 2025) noted: “In March, the army-led government filed a case in the International Criminal Court against the United Arab Emirates”. Conspiracy or not, there is certainly a massive missing narrative. Is this cognitive void simple racism on the part of The West (and maybe some others)? Or is it part of a wider problem of geopolitical smoke and mirrors? Or are New Zealand and its associates mesmerised, like a possum (or rabbit) in the headlights or an ostrich with its head firmly buried in the sand?

    (Chris Hipkins, New Zealand’s Leader of the Opposition, deployed a little casual racism in Parliament yesterday [20 May 2025] – twice in the one speech – referring to “tinpot dictatorships and banana republics“. Is the United Arab Emirates a ‘tinpot dictatorship’? Would he call the President of the Philippines a ‘banana republican’?)

    *******

    Keith Rankin (keith at rankin dot nz), trained as an economic historian, is a retired lecturer in Economics and Statistics. He lives in Auckland, New Zealand.

    MIL OSI Analysis – EveningReport.nz –

    May 22, 2025
  • Operation Sindoor: Indian parliamentary team in Tokyo to rally support against terrorism

    Source: Government of India

    Source: Government of India (4)

    A high-level all-party parliamentary delegation, led by Janata Dal (United) MP Sanjay Kumar Jha, reached Tokyo on Thursday as part of a five-nation diplomatic outreach under ‘Operation Sindoor’. The initiative is aimed at highlighting India’s firm stance against cross-border terrorism following the April 22 terror attack in Pahalgam.

    “An All-Party Parliamentary Delegation led by Hon’ble MP Sanjay Kumar Jha has arrived in Tokyo and was welcomed by Ambassador Sibi George. India’s unwavering stand against cross-border terrorism, as demonstrated in Operation Sindoor, will be highlighted in all engagements,” the Indian Embassy in Japan said in a post on X.

    The nine-member delegation includes a diverse political representation with BJP MPs Dr. Hemang Joshi, Aparajita Sarangi, Brij Lal, and Pradan Baruah; CPI(M) MP John Brittas; TMC MP Abhishek Banerjee; and Ambassador Mohan Kumar. The tour, which spans Japan, Indonesia, Malaysia, the Republic of Korea, and Singapore, aims to brief international partners about India’s decisive response to terrorism and its broader anti-terror framework.

    The group was briefed at the Indian Embassy, where George provided a detailed overview of Japan’s stance and reaction to the recent terror attack. He noted that Japan was among the first nations to respond to the attack, underscoring Tokyo’s solidarity with India in the fight against terrorism.

    “Our parliamentary delegation is here to strongly present India’s position on cross-border terrorism,” George said. “This engagement is crucial in setting the tone for strong international messaging against terrorism.”

    BJP MP Aparajita Sarangi expressed optimism about the outreach’s effectiveness, saying, “The visit started with an in-depth discussion at the Indian Embassy in Japan. We were briefed by Ambassador Sibi George on Japan’s perspective regarding the Pahalgam attack. This diplomatic outreach, initiated by Prime Minister Modi’s government, is a well-thought-out exercise to communicate India’s united stand to the global community.”

    Jha emphasized the need to expose what he called Pakistan’s state policy of sponsoring terrorism. “Terrorism is a part of Pakistan’s state policy. Operation Sindoor is a reflection of our resolve. We want the world to know that India will not tolerate terrorist activities supported and perpetrated by Pakistan. Enough is enough,” he said before departing from India.

    CPI(M) MP John Brittas, part of the delegation, noted that the initiative demonstrates national consensus on the issue of terrorism. “We are united as a nation in condemning terrorism in all forms. Our delegation’s purpose is to project that unity and resolve globally.”

    The delegation is set to hold discussions with senior Japanese government officials, including the Foreign Minister, and engage with key policymakers and diplomatic figures. Similar high-level meetings are scheduled throughout the other four countries on the tour.

    India launched Operation Sindoor in response to the April 22 Pahalgam terror attack, carrying out precision strikes on terror infrastructure in Pakistan and Pakistan-occupied Kashmir (PoJK). In retaliation to subsequent Pakistani aggression, the Indian Armed Forces targeted Pakistani airbases. Following a call from Pakistan’s Director General of Military Operations (DGMO) to his Indian counterpart, both nations have agreed to halt further military actions.

    ANI

    May 22, 2025
  • MIL-OSI Russia: Financial news: 05/21/2025, 18-18 (Moscow time) the values of the upper limit of the price corridor and the range of market risk assessment for the security RU000A0ZZVQ0 (RSHB BO-7R) were changed.

    Translation. Region: Russian Federal

    Source: Moscow Exchange – Moscow Exchange –

    05/21/2025 18:18

    In accordance with the Methodology for determining the risk parameters of the stock market and the deposit market of Moscow Exchange PJSC by NCO NCC (JSC), on 21.05.2025, 18-18 (Moscow time), the values of the upper limit of the price corridor (up to 85.65) and the range of market risk assessment (up to 1045.49 rubles, equivalent to a rate of 42.5%) of the security RU000A0ZZVQ0 (RSHB BO-7R) were changed

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    Please Note; This Information is Raw Content Directly from the Information Source. It is access to What the Source Is Stating and Does Not Reflect

    HTTPS: //VVV. MEEX.K.M.M.M.

    MIL OSI Russia News –

    May 22, 2025
  • MIL-OSI Russia: Financial news: 05/21/2025, 16-07 (Moscow time) the values of the lower limit of the price corridor and the range of market risk assessment for the KZT/RUB currency pair have been changed.

    Translation. Region: Russian Federal

    Source: Moscow Exchange – Moscow Exchange – In accordance with the Methodology for determining the risk parameters of the foreign exchange market and the precious metals market of Moscow Exchange PJSC by NCO NCC (JSC), on 21.05.2025, 16-07 (Moscow time), the values of the lower limit of the price corridor (up to RUB 13,395 in the mode with TOD settlements) and the range of market risk assessment (up to RUB 12,802, equivalent to a rate of 19.51%) of the KZT/RUB currency pair were changed. New values are available Here.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    Please Note; This Information is Raw Content Directly from the Information Source. It is access to What the Source Is Stating and Does Not Reflect

    HTTPS: //VVV. MOEX.K.MO/N90398

    MIL OSI Russia News –

    May 22, 2025
  • Aid trucks enter Gaza after delays, as pressure mounts on Israel

    Source: Government of India

    Source: Government of India (4)

    Israel allowed 100 aid trucks carrying flour, baby food and medical equipment into the Gaza Strip on Wednesday, the Israeli military said, as UN officials reported that distribution issues had meant that no aid had so far reached people in need.

    Prime Minister Benjamin Netanyahu said Israel would be open to a temporary ceasefire to enable the return of hostages. But otherwise he said it would press ahead with a military campaign to gain total control of Gaza.

    After an 11-week blockade on supplies entering Gaza, the Israeli military said a total of 98 aid trucks entered on Monday and Tuesday. But even those minimal supplies have not made it to Gaza’s soup kitchens, bakeries, markets and hospitals, according to aid officials and local bakeries that were standing by to receive supplies of flour.

    “None of this aid – that is a very limited number of trucks – has reached the Gaza population,” said Antoine Renard, country director of the World Food Programme.

    The blockade has left Gazans in an increasingly desperate struggle for survival, despite growing international and domestic pressure on Israel’s government, which one opposition figure said risked turning the country into a “pariah state”.

    Thousands of tons of food and other vital supplies are waiting near crossing points into Gaza but until it can be safely distributed, around a quarter of the population remains at risk of famine, Renard said.

    “I’m here since eight in the morning, just to get one plate for six people while it is not enough for one person,” said Mahmoud al-Haw, who says he often waits for up to six hours a day hoping for some lentil soup to keep his children alive.

    U.N. officials said security issues had prevented the aid from moving out of the logistics hub at the Kerem Shalom crossing point but late on Wednesday there appeared some hope that supplies would move more freely.

    Nahid Shahaiber, a major transport company owner, said 75 trucks of flour and over a dozen more carrying nutritional supplements and sugar were inside the southern area of Rafah and witnesses said trucks carrying flour had been seen in Deir Al-Balah in the central Gaza Strip.

    Israel imposed a blockade on all supplies entering Gaza in March, saying Hamas was seizing supplies meant for civilians – a charge the group denies.

    Under mounting international pressure, it has allowed aid deliveries by the U.N. and other aid groups to resume briefly until a new U.S.-backed distribution model using private contractors operating through so-called secure hubs is up and running by the end of the month. But the United Nations says the plan is not impartial or neutral, and it will not be involved.

    ‘PARIAH STATE’

    As people waited for supplies to arrive, air strikes and tank fire killed at least 50 people across the Gaza Strip on Wednesday, Palestinian health authorities said. The Israeli military said air strikes hit 115 targets, which it said included rocket launchers, tunnels and unspecified military infrastructure.

    Efforts to halt the fighting have faltered, with both Hamas, which insists on a final end to the war and withdrawal of Israeli forces, and Israel, which says Hamas must disarm and leave Gaza, sticking to positions the other side rejects.

    Netanyahu said an Israeli air strike this month had probably killed Hamas leader Mohammed Sinwar and he reiterated his demand for the complete demilitarization of Gaza and the exile of Hamas leaders for the war to end.

    The resumption of the assault on Gaza since March, following a two-month ceasefire, has drawn condemnation from countries including Britain and Canada that have long been cautious about expressing open criticism of Israel. Even the United States, the country’s most important ally, has shown signs of losing patience with Netanyahu.

    Netanyahu said it was “a disgrace” that countries like Britain were sanctioning Israel instead of Hamas.

    There has been growing unease within Israel meanwhile at the continuation of the war while 58 hostages remain in Gaza.

    Left-wing opposition leader Yair Golan drew a furious response from the government and its supporters this week when he declared that “A sane country doesn’t kill babies as a hobby” and said Israel risked becoming a “pariah state among the nations.”

    Golan, a former deputy commander of the Israeli military who went single-handedly to rescue victims of the Hamas attack on Israel on Oct 7, 2023, leads the left-wing Democrats, a small party with little electoral clout.

    But his words, and similar comments by former Prime Minister Ehud Olmert in an interview with the BBC, underscored the rift within Israel. Netanyahu dismissed the criticism, saying he was “appalled” by Golan’s comments.

    Opinion polls show widespread support for a ceasefire that would include the return of all the hostages, with a survey from the Hebrew University of Jerusalem this week showing 70% in favour of a deal.

    But hardliners in the cabinet, some of whom argue for the complete expulsion of all Palestinians from Gaza, have insisted on continuing the war until “final victory”, which would include disarming Hamas as well as the return of the hostages.

    Netanyahu, trailing in the opinion polls and facing trial at home on corruption charges, which he denies, as well as an arrest warrant from the International Criminal Court, has so far sided with the hardliners.

    Israel launched its campaign in Gaza in response to the Hamas attack on October 7, 2023, which killed some 1,200 people by Israeli tallies and saw 251 hostages abducted into Gaza.

    The campaign has killed more than 53,600 Palestinians, according to Gaza health authorities, and devastated the coastal strip, where aid groups say signs of severe malnutrition are widespread.

    (Reuters)

    May 22, 2025
  • MIL-OSI Australia: Call for information – Aggravated robbery – Wadeye

    Source: Northern Territory Police and Fire Services

    NT Police Force is calling for information in relation to an aggravated robbery that occurred in Wadeye on Tuesday evening.

    Around 5:30pm, police received reports that five employees from an animal management clinic were approached by a group of youths as they left the facility in their vehicle. The youths were allegedly armed with weapons, including wooden planks and machetes. One of the offenders opened the driver’s side door, threatened the driver with a machete, and demanded the vehicle keys. The victim complied and exited the vehicle.

    Employees at a nearby construction site observed the incident taking place and came to the aid of the victims, causing the group of offenders to flee the scene.

    Police conducted patrols of the area and spoke with community members leading to the stolen keys being handed in. The alleged offenders remain outstanding, and investigations are ongoing.

    If you have any information about the incident, police urge you to make contact on 131 444. Please quote reference number NTP2500052080. Anonymous reports can be made through Crime Stoppers on 1800 333 000 or via https://crimestoppersnt.com.au/.

    MIL OSI News –

    May 22, 2025
  • MIL-Evening Report: ER Report: A Roundup of Significant Articles on EveningReport.nz for May 22, 2025

    ER Report: Here is a summary of significant articles published on EveningReport.nz on May 22, 2025.

    Indonesian military operations spark concerns over displaced indigenous Papuans
    By Caleb Fotheringham, RNZ Pacific journalist A West Papua independence leader says escalating violence is forcing indigenous Papuans to flee their ancestral lands. It comes as the Indonesian military claims 18 members of the West Papua National Liberation Army (TPNPB) were killed in an hour-long operation in Intan Jaya on May 14. In a statement,

    Compression tights and tops: do they actually benefit you during (or after) exercise?
    Source: The Conversation (Au and NZ) – By Ben Singh, Research Fellow, Allied Health & Human Performance, University of South Australia Olena Yakobchuk/Shutterstock You’ve seen them in every gym: tight black leggings, neon sleeves and even knee-length socks. Compression gear is everywhere, worn by weekend joggers, elite athletes and influencers striking poses mid-squat. But do

    Australia’s knowledge of Russia is dwindling. We need to start training our future experts now
    Source: The Conversation (Au and NZ) – By Jon Richardson, Visiting Fellow, Centre for European Studies, Australian National University Shutterstock Russia’s possible interest in basing long-range aircraft at an Indonesian airbase not far from Australian shores shook up a relatively staid election campaign last month. The news, which Jakarta immediately dismissed, caught many by surprise

    ‘Perfect bodies and perfect lives’: how selfie-editing tools are distorting how young people see themselves
    Source: The Conversation (Au and NZ) – By Julia Coffey, Associate Professor in Sociology, University of Newcastle Olena Yakobchuk/Shutterstock Like many of her peers, Abigail (21) takes a lot of selfies, tweaks them with purpose-made apps, and posts them on social media. But, she says, the selfie-editing apps do more than they were designed for:

    NZ Budget 2025: tax cuts and reduced revenues mean the government is banking on business growth
    Source: The Conversation (Au and NZ) – By Adrian Sawyer, Professor of Taxation, University of Canterbury Hagen Hopkins/Getty Images Not a lot is known about the government’s plans for taxes in the 2025 budget. Few tax policies have been announced so far, and what has been revealed involves targeted tax cuts for business interests. This

    Evidence shows AI systems are already too much like humans. Will that be a problem?
    Source: The Conversation (Au and NZ) – By Sandra Peter, Director of Sydney Executive Plus, University of Sydney Studiostoks / Shutterstock What if we could design a machine that could read your emotions and intentions, write thoughtful, empathetic, perfectly timed responses — and seemingly know exactly what you need to hear? A machine so seductive,

    Playing the crime card: do law and order campaigns win votes in Australia?
    Source: The Conversation (Au and NZ) – By Chloe Keel, Lecturer in Criminology and Criminal Justice, Griffith University Crime and public safety are usually the domain of state politics. But the Coalition tried to elevate them as key issues for voters in the recent federal election. Claiming crime had been “allowed to fester” under Labor,

    Labor now has the political clout to reset Australia’s refugee policy. Here’s where to start
    Source: The Conversation (Au and NZ) – By Mary Anne Kenny, Associate Professor, School of Law, Murdoch University Australia’s policy towards refugees and asylum seekers stands at a critical juncture. Global displacement is at record highs and many countries are retreating from their responsibilities. At this moment, Australia can lead by example. As Australia’s prime

    Please don’t tape your mouth at night, whatever TikTok says. A new study shows why this viral trend can be risky
    Source: The Conversation (Au and NZ) – By Moira Junge, Adjunct Clincal Associate Professor (Psychologist), Monash University K.IvanS/Shutterstock You might have heard of people using tape to literally keep their mouths shut while they sleep. Mouth taping has become a popular trend on social media, with many fans claiming it helps improve sleep and overall

    E-bikes for everyone: 3 NZ trials show people will make the switch – with the right support
    Source: The Conversation (Au and NZ) – By Caroline Shaw, Associate Professor in Public Health, University of Otago Getty Images Anyone who uses city roads will know e-bikes have become increasingly popular in Aotearoa New Zealand. But we also know rising e-bike sales have been predominantly driven by financially well-off households. The question now is,

    Drivers of SUVs and pick-ups should pay more to be on our roads. Here’s how to make the system fairer
    Source: The Conversation (Au and NZ) – By Milad Haghani, Associate Professor & Principal Fellow in Urban Risk & Resilience, The University of Melbourne In the year 2000, almost 70% of all new cars sold in Australia were small passenger vehicles – mainly sedans and hatchbacks. But over 25 years, their share has dropped dramatically

    Australia’s Wong condemns ‘abhorrent, outrageous’ Israeli comments over blocked aid
    Asia Pacific Report Australia’s Foreign Minister Penny Wong has released a statement saying “the Israeli government cannot allow the suffering to continue” after the UN’s aid chief said thousands of babies were at risk of dying if they did not receive food immediately. “Australia joins international partners in calling on Israel to allow a full

    The West v China: Fight for the Pacific – Episode 1: The Battlefield
    Al Jazeera How global power struggles are impacting in local communities, culture and sovereignty in Kanaky, New Caledonia, the Solomon Islands and Samoa. In episode one, The Battlefield, tensions between the United States and China over the Pacific escalate, affecting the lives of Pacific Islanders. Key figures like former Malaita Premier Daniel Suidani and tour

    Windows are the No. 1 human threat to birds – an ecologist shares some simple steps to reduce collisions
    Source: The Conversation (Au and NZ) – By Jason Hoeksema, Professor of Ecology, University of Mississippi Birds are drawn to the mirror effect of windows. That can turn deadly when they think they see trees. CCahill/iStock/Getty Images Plus When wood thrushes arrive in northern Mississippi on their spring migration and begin to serenade my neighborhood

    Politics with Michelle Grattan: Jim Chalmers on keeping Australia out of recession amid the ‘dark shadow’ of global instability
    Source: The Conversation (Au and NZ) – By Michelle Grattan, Professorial Fellow, University of Canberra This week, the Reserve Bank delivered welcome news for mortgage holders, with another 25 basis points rate cut. With this cut, some are hoping that the cost-of-living pain will start to finally ease. Economists, however, are still wary of celebrating

    40 years on – reflecting on Rainbow Warrior’s legacy, fight against nuclear colonialism
    Report by Dr David Robie – Café Pacific. – A forthcoming new edition of David Robie’s Eyes of Fire honours the ship’s final mission and the resilience of those affected by decades of radioactive fallout. PACIFIC MORNINGS: By Aui’a Vaimaila Leatinu’u The Greenpeace flagship Rainbow Warrior III ship returns to Aotearoa this July, 40 years

    Gordon Campbell: NZ’s silence over Gaza genocide, ethnic cleansing
    COMMENTARY: By Gordon Campbell Since last Thursday, intensified Israeli air strikes on Gaza have killed more than 500 Palestinians, and a prolonged Israeli aid blockade has led to widespread starvation among the territory’s two million residents. Belatedly, Israel is letting in a token amount of food aid that UN Under-Secretary Tom Fletcher has called a

    View from The Hill: Coalition split puts Victorian and NSW Nationals Senate seats at high risk
    Source: The Conversation (Au and NZ) – By Michelle Grattan, Professorial Fellow, University of Canberra The Victorian and NSW Nationals senators due to face the voters at the 2028 election will struggle to hold their seats if the former partners do not re-form the Coalition before then. Under usual Coalition arrangements, Bridget McKenzie, from Victoria,

    New Caledonia, French Polynesia at UN decolonisation seminar in Dili
    By Patrick Decloitre, RNZ Pacific correspondent French Pacific desk New Caledonia and French Polynesia have sent strong delegations this week to the United Nations Pacific regional seminar on the implementation of the Fourth International Decade for the Eradication of Colonialism in Timor-Leste. The seminar opened in Dili today and ends on Friday. As French Pacific

    NSW is copping rain and flooding while parts of Australia are in drought. What’s going on?
    Source: The Conversation (Au and NZ) – By Andrew King, Associate Professor in Climate Science, ARC Centre of Excellence for 21st Century Weather, The University of Melbourne Emergency crews were scrambling to rescue residents trapped by floodwaters on Wednesday as heavy rain pummelled the Mid North Coast of New South Wales. In some areas, more

    MIL OSI Analysis – EveningReport.nz –

    May 22, 2025
  • MIL-OSI Security: Great Falls man sentenced to 20 years in prison for drug and money laundering charges

    Source: Office of United States Attorneys

    GREAT FALLS – A Great Falls man who distributed significant amounts of methamphetamine was sentenced today to 240 months in prison to be followed by 5 years of supervised release, U.S. Attorney Kurt Alme said.

    Daniel Allen Wakeford, 61, pleaded guilty in October 2024 to one count of conspiracy to distribute and to possess with intent to distribute methamphetamine and one count of money laundering.

    Chief U.S. District Judge Brian M. Morris presided.

    The government alleged in court documents that law enforcement learned Daniel Wakeford had been involved in the distribution of methamphetamine in Great Falls and elsewhere for several years. A witness informed law enforcement they received methamphetamine from Wakeford for resale since 2020. Prior to 2021, the witness had received approximately two pounds of methamphetamine from Wakeford. In March 2021, however, law enforcement learned Wakeford provided the witness with roughly five pounds of methamphetamine for resale. Surveillance conducted by law enforcement corroborated the witness’s account.

    Law enforcement spoke with numerous individuals who received methamphetamine from Wakeford between approximately 2020 and 2024. Those individuals outlined how Wakeford and others would provide them with methamphetamine for resale. In February 2024, an individual referred to here as John Doe was apprehended in Billings, Montana with approximately 78 grams of methamphetamine in his possession. He outlined how, among other things, he had recently assisted Wakeford with packaging several hundred thousand dollars in cash, how John Doe received the methamphetamine from Wakeford in Great Falls, and that Wakeford made statements indicating he was conspiring to distribute a significant amount of methamphetamine.

    Law enforcement determined that during the time of the conspiracy Wakeford did not have a significant source of legitimate income. However, on November 21, 2022, Wakeford paid $16,534 in cash for a new 2022 snowmobile in Great Falls.

    Following the original indictment in this case, law enforcement conducted a search of Wakeford’s home in Great Falls, Montana and located paperwork for a storage unit that Wakeford leased in Phoenix, Arizona. Wakeford was arrested in Utah on a federal warrant while driving a motorhome valued at over $40,000. Inside the motorhome, officers located over $62,000 in cash, as well as additional paperwork related to the storage unit in Arizona. Federal agents in Arizona obtained a warrant to search the storage unit and located over 100 pounds of methamphetamine and a firearm (both pictured below).

    Assistant U.S. Attorneys Zeno Baucus and Jeff Starnes prosecuted the case. The investigation was conducted by the Russell Country Drug Task Force.

    The case was investigated under the Organized Crime Drug Enforcement Task Forces (OCDETF). OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. For more information about Organized Crime Drug Enforcement Task Forces, please visit Justice.gov/OCDETF.

    XXX

    MIL Security OSI –

    May 22, 2025
  • MIL-OSI USA: Durbin, Graham, Reps. Ocasio-Cortez & Lee Introduce Bipartisan Legislation To Combat Non-Consensual, Sexually-Explicit Deepfake Imagery

    US Senate News:

    Source: United States Senator for Illinois Dick Durbin

    May 21, 2025

    The DEFIANCE Act would give survivors a tool to reclaim their image and freedom

    WASHINGTON – U.S. Senate Democratic Whip Dick Durbin (D-IL), Ranking Member of the Senate Judiciary Committee, U.S. Representative Alexandria Ocasio-Cortez (D-NY-14), U.S. Senator Lindsey Graham (R-SC), and U.S. Representative Laurel Lee (R-FL-15) today reintroduced the Disrupt Explicit Forged Images and Non-Consensual Edits Act(DEFIANCE Act), bipartisan, bicameral legislation that would grant survivors the right to take civil action against individuals who knowingly produce, distribute, solicit andreceive, or possess with the intent to distribute nonconsensual sexually-explicit digital forgeries. Last July, the Senate unanimously passed the DEFIANCE Act of 2024.

    “Sexually-explicit ‘deepfake’ content is often used to exploit and harass women and girls, and no one should have their privacy and autonomy violated by someone else generating explicit AI-generated content of them,” said Durbin. “Although the imagery may be fake, the harm to the victims is very real. Victims have lost their jobs, their reputations, and many have suffered from life-altering depression or anxiety. By introducing the DEFIANCE Act, we’re giving power back to the victims; cracking down on the production, receipt, distribution, and possession of ‘deepfake’ images; and holding those responsible for the images accountable.”

    “We’re reintroducing the DEFIANCE Act to empower survivors of nonconsensual deepfake pornography with the right to take civil action so they can pursue justice for themselves,” said Ocasio-Cortez. “I’m proud to lead this legislation with Representative Lee, and Senators Durbin and Graham to provide victims with the federal protections they deserve.”

    “I am proud to co-lead the bipartisan DEFIANCE Act, which gives victims a civil right of action when predators attempt to use exploitative AI-generated intimate images—so-called deepfakes—to intimidate, shame, or harm them,” said Lee. “We’ve seen stories across the country of women and girls as young as 12 years old victimized by this new and growing form of sexual violence. The time for action is now. This legislation will complement the TAKE IT DOWN Act, which was recently signed into law. Together, they both create both accountability and recourse. I am grateful for my colleagues’ work on these issues, and look forward to moving this bill through Committee.”

    The bill text is available here. 

    In addition to Durbin and Graham, the DEFIANCE Act is cosponsored by Senators Amy Klobuchar (D-MN), Angus King (I-ME), Mike Lee (R-UT), Martin Heinrich (D-NM), and Peter Welch (D-VT).

    In addition to Ocasio-Cortez and Lee, the DEFIANCE Act is cosponsored by Representatives Kat Cammack (R-FL-03), Chris Deluzio (D-PA-17), Debbie Dingell (D-MI-12), Mike Lawler (R-NY-17), Ted Lieu (D-CA-36), Nancy Mace (R-SC-06), Max Miller (R-OH-07), Brittany Pettersen (D-CO-07), and Jeff Van Drew (R-NJ-02).

    The legislation is endorsed by the National Women’s Law Center, National Center on Sexual Exploitation (NCOSE), Raven, Public Citizen, Sexual Violence Prevention Association, Democratic Women’s Caucus, UltraViolet, Joyful Heart Foundation, My Image My Choice, Reclaim Coalition, SIECUS: Sex Ed for Social Change, American Association of University Women (AAUW), End Rape on Campus, Foundation Ra, Explain the Asterisk, Protect America’s Daughters, Sexual Assault Response Coalition (SARC), Students Against Sexual Assault, What Were You Wearing, Rooting Movements, Recognize Violence, Change Culture (RVCC), and Street Grace. Quotes from these organizations follow.

    “As a survivor of deepfake pornography, I know the trauma of having your body and identity manipulated and weaponized. It is a violation that leaves you feeling powerless. The DEFIANCE Act changes that. It empowers victims to seek justice through a civil right of action, finally giving us a path to hold perpetrators accountable. With the number of deepfakes doubling every six months—and over 98% of them being pornographic—we are in a crisis. This bipartisan bill addresses the creation, distribution, and solicitation of nonconsensual deepfake pornography. It’s not just necessary—it’s urgent. Survivors deserve justice. Congress must act swiftly to pass the DEFIANCE Act and take a meaningful stand against digital sexual violence,” said Omny Miranda Martone, Founder & CEO of the Sexual Violence Prevention Association (SVPA).

    “Survivors of image-based sexual abuse deserve a clear path to civil justice,” said Stefan Turkheimer, VP of Public Policy at RAINN, the nation’s largest anti-sexual violence organization. “The DEFIANCE Act is the right solution — and now is the right time to build on the growing momentum to ensure survivors have real power to hold offenders accountable, including the ability to pursue civil remedies against those who use AI to create and spread sexually explicit images meant to cause harm.”

    The volume of “deepfake” content available online is increasing exponentially as the technology used to create it has become more accessible to the public. The overwhelming majority of this material is sexually-explicit and is produced without the consent of the person depicted. A 2019 study found that 96 percent of “deepfake” videos were nonconsensual pornography.

    One researcher found that:

    • The number of nonconsensual pornographic “deepfake” videos available online has increased ninefold since 2019;
    • Such videos have been viewed almost four billion times;
    • Monthly traffic to the top 20 “deepfake” sites increased by 285 percent from July 2020 to July 2023; and
    • Search engines directed 25.2 million visits to the top five most popular “deepfake” sites in July 2023 alone.

    -30-

    MIL OSI USA News –

    May 22, 2025
  • MIL-OSI USA: Houston Pharmacy Owner Sentenced to 19 Years in Prison for Illegal Distribution of Opioids and Tax Fraud

    Source: US State of North Dakota

    A Texas man was sentenced on Monday to 19 years in prison for unlawfully conspiring to distribute millions of opioid pills and aiding the falsification of tax records. 

    According to court documents, Christopher Obaze, 64, of Houston, Texas, was the owner and pharmacist-in-charge of Chrisco Pharmacy. Obaze and his co-conspirators operated Chrisco Pharmacy as an illegal “ghosting pharmacy,” purchasing pharmaceutical opioids and other commonly abused prescription drugs from wholesalers and then selling them in bulk to drug traffickers, without involving physicians, patients, or prescriptions. From January 2018 through October 2021, Obaze and his co-conspirators distributed at least 2,268,700 hydrocodone 10-325 mg and oxycodone 30 mg pills as part of the scheme. 

    The defendant and his pharmacy technician attempted to conceal their illegal activities by reporting no dispensing of the drugs to the Texas State Board of Pharmacy’s prescription monitoring program after July 2018, and by structuring cash deposits and submitting false documents to banks to maintain accounts to hold the proceeds of their unlawful distribution scheme. Obaze also aided and assisted in the preparation and presentation of false and fraudulent tax returns to the IRS by understating, among other things, the gross receipts of Chrisco Pharmacy. 

    Matthew R. Galeotti, Head of the Justice Department’s Criminal Division, U.S. Attorney Nicholas J. Ganjei for the Southern District of Texas, Special Agent in Charge William Kimbell of the Drug Enforcement Administration (DEA) Houston Division, and Special Agent in Charge Lucy Tan of the IRS Criminal Investigation (IRS-CI) Houston Field Office made the announcement. 

    The DEA and IRS-CI investigated the case. 

    Trial Attorney Drew Pennebaker of the Criminal Division’s Fraud Section prosecuted the case. 

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of 9 strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with the Office of the Inspector General for the Department of Health and Human Services, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal/criminal-fraud/health-care-fraud-unit.

    MIL OSI USA News –

    May 22, 2025
  • MIL-OSI USA: Klobuchar Opening Remarks and Questions at Antitrust Subcommittee Hearing on AI-Generated Deepfakes

    US Senate News:

    Source: United States Senator for Minnesota Amy Klobuchar
    WATCH KLOBUCHAR’S FULL REMARKS AND QUESTION HERE
    WASHINGTON – U.S. Senator Amy Klobuchar (D-MN), Ranking Member of the Senate Judiciary Subcommittee on Privacy, Technology, and the Law, held a hearing titled “The Good, the Bad, and the Ugly: AI-Generated Deepfakes in 2025.” 
    Testifying at the hearing was Country Music Singer-Songwriter, Martina McBride; CEO of the Recording Industry Association of America, Mitch Glazier; Senior Legal Counsel at the National Center on Sexual Exploitation (NCOSE), Christen Price; Director of Technology Policy at Consumer Reports, Justin Brookman; and Head of Music Policy at Youtube, Suzana Carlos.
    “AI-enabled scams have become far too common. We know that it takes only a few seconds of audio to clone a voice. Criminals can pull the audio sample and personal back story from public sources, said Klobuchar at the hearing. “We also need rules of the road to ensure that AI technologies empower artists and creators and not undermine them. Art just doesn’t entertain us. It’s something that uplifts us and brings us together.”
    “That’s why this NO FAKES Act is so important. It protects people from having their voice and likeness replicated using AI without their permission, all within the framework of the Constitution, and it protects everybody, because everyone should have a right to privacy.” 
    A rough transcript of Klobuchar’s opening remarks and questions is available below. Video is available HERE.
    Senator Klobuchar: Thank you very much, Senator Blackburn, I’m very excited about this subcommittee and the work we’ve already done together for years on this issue and similar issues when it comes to tech.
    I share your hopes for AI and see that we’re on this cusp of amazing advancements if this is harnessed in the right way, but I’m also concerned if things go the wrong way. I think it was David Brooks, a columnist, that said he has trouble writing about it because he doesn’t know if it will take us to Heaven or Hell. So it’s our job to head to heaven, and it’s our job to put some rules in place, and this is certainly one of them. 
    We want this to work for children, for consumers, for artists, and not against them. And you brought up the example Chair, of Randy Travis who was at the event that we recently had with you, and Senator Coons and myself about the bill and how he used AI in such a positive way. But then we know there are these risks. 
    And one of the things that I think is really exciting about this week is that, in fact, on Monday, the President signed my bill with Senator Cruz, the TAKE IT DOWN Act, into law. This was a bill I discussed with him and the First Lady at the inaugural lunch. 
    It’s an example of “use-every-moment-you-have” to advance a cause. And then she supported the bill and helped to get it passed in the House. Senator Cruz and I had already passed it in the Senate, and we were having some trouble getting it done over in the House. So we’re really pleased, because it actually does set some track moving forward, even though this bill, that bill, is about nonconsensual porn, both AI created and non AI created, it’s had huge harmful effects, about 20 some suicides a year of young kids who think they’re sending a picture innocently to a girlfriend or a potential boyfriend, and then it gets sent out on their school internet. It gets sent out to people they know, and basically, they believe their life is in ruins, and don’t have any other context, and take their own lives. And that’s just the most obvious and frightful part of this, but there’s others as well. So I’m hoping this is going to be a first step to some of the work that we can do, including with the bill that we’re going to be discussing today. 
    AI-enabled scams have become far too common. We know that it takes only a few seconds of audio to clone a voice. Criminals can pull the audio sample and personal back story from public sources. 
    Just last week, the FBI was forced to put out an alert about scams using AI-cloned voices of FBI agents and officials asking people for sensitive payment information.
    Jamie Lee Curtis was forced to make a public appeal to Mark Zuckerberg to take down an unauthorized, deepfake ad that included her digital replica endorsing a dental product. While Meta removed the ad after her direct outreach, most people don’t have that kind of influence. 
    We also need rules of the road to ensure that AI technologies empower artists and creators and not undermine them. Art just doesn’t entertain us. It’s something that uplifts us and brings us together. 
    When I recently met with Cory Wong, a Grammy-nominated artist from Minnesota, he talked about how unauthorized digital replicas threaten artists’ livelihoods and undermine their ability to create art. 
    So this is not just a personal issue. It’s also an economic issue. One of the reasons our country, one of our best exports to the world, is music and movies. When you look at the numbers and how we’ve been able to captivate people around the world, that’s going to go away if people can just copy everything that we do. 
    And one of the keys to our success as a nation in innovation has been the fact, and Senator Coons does a lot of work in this area, [that] we’ve been able to respect copyrights and patents and people’s own right to their own products. 
    So that’s why this NO FAKES Act is so important. It protects people from having their voice and likeness replicated using AI without their permission, all within the framework of the Constitution, and it protects everybody, because everyone should have a right to privacy. 
    I also am working in the space on AI to put some base rules in place in my role on the Commerce Committee. Senator Thune and I have a bill that we’re reintroducing on this to set some rules for NIST to be able to put out there for companies that are using AI. And then I’m always concerned about its effect on democracy, but that is for a different day and in a different committee. 
    But I do want to thank Senator Blackburn for her willingness to come out on doing something about tech, including the work she does with Senator Blumenthal, the work that we’ve done together on commerce. And if Monday is any sign with the first bill getting through and there in that Rose Garden signing ceremony, there’s more to come, and so thank you and look forward to hearing from the witnesses.
    …
    Klobuchar: All right. Thank you very much. I guess I’ll start with Mr. Brookman, the non-Grammy winner. I want to talk to you just a little bit about this consumer angle here, which I think is interesting to people. And I think at its core, all of us involved in this legislation have made it really clear that’s not just people who are well known that will be hurt by this eventually, and that getting this bill passed as soon as possible is just as important for everyone, but I do so appreciate Ms. McBride being willing to come forward, because those stories and the stories that we’ve heard from, like I mentioned, Jamie Lee Curtis, or the stories that we’ve heard from many celebrities, are very important to getting this done. So you just did a report on AI-generated voice cloning scams, including that, AI voice cloning applications, in the words of the report, presents a clear opportunity for scammers, and we need to make sure our consumer protection enforcers are prepared to respond to the growing threat of these scams. I had this happen to my state director’s husband, who their kid is in the Marines, and they got a call. They figured out that it wasn’t really him asking for stuff and money. They knew he couldn’t call from where he was deployed to. This is just going to be happening all over the place, and the next call will be to a grandma who thinks it’s real, and she sends her life savings in. So I have called on the FTC and the FCC to step up their efforts to prevent these voice cloning scams. And what are some of the tools that agencies need to crack down on these scams, even outside of this bill?
    Justin Brookman: Yeah, absolutely, so I think the first thing the Federal Trade Commission probably needed is more resources. They only have like 1200 people right now for the entire economy. That’s down from like seven, that’s down from like 100 just in the past couple of months.
    Klobuchar: Down from way down from even during like, the Nixon Era.
    Brookman: Yeah, like 1700 it used to be and the economy has grown like three or four times. Chairman Ferguson has, Chairman Ferguson has said more cuts are coming, which I think is the wrong direction. I worked for the Federal Trade Commission for a couple of years. We could not do, like, a fraction of all the things that we wanted to do to protect consumers, so more people, more capacity, more technologists. Like, there’s just not enough technology capacity in government. I was in the office of technology research and investigation there, that was like five people. That’s just not enough, obviously, with all these very sophisticated, I mean, just deep fakes alone, let alone the rest of the tech economy, the ability to get penalties and even injunctive relief, right if someone, if someone gets caught stealing something, the FTC often doesn’t have the ability to make them give the money back. I know this, under this committee has tried to restore that authority, but that would be important. And also, like again, maybe the FTC could have rule-making authority. But also this, I would like to see Congress consider legislative authority to address tools like again, if you are offering a tool that can be used only for harm, voice impersonation, deepfake pornographic images, maybe there should, there should be responsibilities to make sure it’s not being used for harm.
    Klobuchar: Okay, thank you. Ms. Carlos, can you talk about what YouTube is doing to ensure it’s not facilitating these scams?
    Suzana Carlos: Sure, and thank you for the question, Senator.
    Klobuchar: And thanks for your support for the bill
    Carlos: Of course. So, just to primarily consider, we obviously see great and tremendous opportunity coming from AI, but we also acknowledge that there are risks, and it is our utmost responsibility to ensure that it is deployed responsibly. So we’ve taken a number of efforts to protect against unharmful contact on our platform. Primarily, we have uploaded, we have updated our privacy policies last year to ensure that all individuals can now submit a notice to YouTube when their unauthorized voice or likeness has been used on our platform, and once reviewed, if it is applicable, and we’ve confirmed that that content should be removed, we will take it down. We’ve additionally implemented watermarks on our AI products. We originally began with both image and watermarks using our SynthID technology, and we’ve recently expanded it to also be applied to text generated from our Gemini app and web experience. And most recently, as part of our VO video tool. We’ve also taken the additional step to become a member of C2PA, the Coalition for Content Provenance and Authenticity, and there, we’re serving as a steering member to work with the organization to create indicators and markings that will allow the content provenance that was created off platforms to additionally be recognized, and we’re deploying those technologies across our platform.
    Klobuchar: Okay, thank you. We mentioned the TAKE IT DOWN Act, and thank you for the support for that. Mr. Glazer, you talked about how this is the first federal law related to generative AI, and that it’s a good first step. And could you talk about how, if we don’t move on from there and we just stop and don’t do anything for years, which seems to be what’s been going on, what’s going to happen here, and why it’s so important to do this.
    Mitch Glazier: I think there’s a very small window, and an unusual window, for Congress to get ahead of what is happening before it becomes irreparable. The TAKE IT DOWN Act was an incredible model. It was done for criminal activity, you know, …
    Klobuchar: Yeah, I know. 
    Glazier:  Yeah, right. You know, you wrote it, but it was a great model, but it only goes so far. But we need to use that model now, and we need to expand it carefully in a balanced way to lots of other situations, which is exactly what the NO FAKES Act does. And I think, you know, we have a very limited amount of time in order to allow people and platforms to act before this gets to a point where it’s so far out of the barn that instead of encouraging responsible AI development, instead, we allow investment and capital to go into AI development that hurts…
    Klobuchar: Stealing things…
    Glazier: So let’s encourage investment the right way to boost great AI development and be first. Let’s not be the folks that encourage investment in AI technologies that really harm us.
    Klobuchar: And Ms. Price, you’ve expressed concerns about this 10-year moratorium on state rules. I’m very concerned, having spent years trying to pass some of these things, and I think that one of the ways we pass things quickly, like Mr. Glazier was talking about, is if people actually see a reason that they don’t want to patch work, they want to get it done. But if you just put a moratorium, and you look at, like, the Elvis law coming out of Tennessee, Ms. McBride, and some of the other things that would stop all of that. Could you, my last question here before we go to another round, could you talk about why you’re concerned about what is right in front of us now, which is this 10-year moratorium?
    Christen Price: Yes, thank you for the question, Senator. We’re concerned about the moratorium because it’s basically signaling to the AI companies that they can kind of do whatever they want in the meantime, and it inhibits States’ ability to adapt their laws to this form of technology that’s changing very quickly and then has this potential to cause great harm. 
    Klobuchar: Thank you.

    MIL OSI USA News –

    May 22, 2025
  • MIL-OSI Australia: Drug seizures – Alice Springs

    Source: Northern Territory Police and Fire Services

    Yesterday, detectives from the Southern Drug Investigation Unit executed multiple search warrants at commercial premises resulting in three arrests and significant seizures of methamphetamine, ketamine and cannabis.

    In the morning, police executed a search warrant at a hotel where they located and seized a less than commercial quantity of methamphetamine, a commercial quantity of ketamine and a less than traffickable amount of cannabis. A 47-year-old female was arrested and charged with:

    • Supply Schedule 1 (Ketamine) – Commercial Quantity
    • Supply Schedule 1 (Methamphetamine) – Less than commercial quantity
    • Possess Schedule 1 (Ketamine) – Commercial Quantity
    • Possess Schedule 1 (Methamphetamine) – Less than commercial quantity
    • Possess Schedule 2 (Cannabis) – Less than traffickable

    She was remanded to appear in the Alice Springs Local Court today.

    In a separate incident that afternoon, detectives conducted searches at the airport where they located and seized several packages containing a significant amount of methamphetamine. A 44-year-old male and a 51-year-old male were arrested and charged with:

    • Possess schedule 1 (Methamphetamine) – commercial quantity
    • Supply schedule 1 (Methamphetamine) – commercial quantity

    Both males were remanded to appear in the Alice Springs Local Court today.

    Detective Acting Superintendent Deanne Ward said, “If these drugs had entered our regional township and communities, it could have had devastating impacts on people’s lives and social cohesion.”

    Anyone with information on the supply of alcohol or drugs into remote communities can call police on 131 444 or make an anonymous report to Crime Stoppers on 1800 333 000.

    MIL OSI News –

    May 22, 2025
  • MIL-OSI Security: U.S. Marshals Arrest Woman in Florida Wanted for Money Laundering in Texas Since 2015

    Source: US Marshals Service

    Corpus Christi, TX – On May 16, 2025, the Cold Case Unit of the U.S. Marshals Service, Gulf Coast Violent Offenders and Fugitive Task Force – Corpus Christi Division and the Florida/Caribbean Regional Fugitive Task Force (FCRFTF) joined to arrest Olga Escamilla for Failure to Appear on a Money Laundering charge originating in Kenedy County, Texas.

    On September 19, 2012, Escamilla was indicted for Money Laundering, involving a sum between $20,000 and $100,000, by a Grand Jury in Kleberg County, Texas. While on bond, Escamilla fled to Mexico.

    On June 19, 2015, the 105th Judicial District Court for Kenedy County, Texas issued a fully extraditable arrest warrant for Failure to Appear, involving the Money Laundering charge.

    Utilizing various investigative methods, along with working with multiple law enforcement partners, the Cold Case Unit was able to determine Escamilla’s location. Investigators collaborated with senior inspectors assigned to the FCRFTF, who arrested Escamilla in Florida.

    The Cold Case Unit was formed to devote specialized investigative efforts to capturing fugitives who have been on the run for several years. The United States Marshals Service is committed to expediently investigating the locations of, and ultimately apprehending, fugitives regardless of how many years they have been on the run.

    The U.S. Marshals led Gulf Coast Violent Offenders Task Force with base in Corpus Christi, Texas, is integrated by remarkable agents from Texas Department of Public Safety, Nueces County Sheriff’s Office, Aransas County Sheriff, Texas Department of Criminal Justice, Corpus Christi Police Department, U.S. Immigration and Customs Enforcement, Kleberg County Attorney Office and other partner federal agencies that work together for the protection of our communities.

    MIL Security OSI –

    May 22, 2025
  • MIL-OSI Security: Jamestown man going to prison for selling meth

    Source: Office of United States Attorneys

    BUFFALO, N.Y. – U.S. Attorney Michael DiGiacomo announced today that Richard S. Dean, 49, of Jamestown, NY, who was convicted of conspiring to possess with intent to distribute, and distributing, 500 grams of methamphetamine, was sentenced to serve 70 months in prison by U.S. District Judge Richard J. Arcara.

    Assistant U.S. Attorney Joshua A. Violanti, who handled the case, stated that the defendant was a drug trafficking associate of co-defendant Douglas Beardsley. During the conspiracy, Dean would go over to Beardsley’s residences on Linden and Forest Avenues in Jamestown several times a week and pick up ounces of methamphetamine and grams of heroin to sell for Beardsley. At times, Beardsley would “front” the narcotics to the defendant to sell. Dean and Beardsley would often communicate about their drug trafficking, including through their Facebook accounts.

    On January 6, 2019, local law enforcement observed a suspicious male, later identified as the defendant. Dean became evasive and ran from officers. Shortly thereafter, the defendant was taken into custody and arrested on an outstanding warrant. Dean was transported to the Jamestown City jail where a subsequent search revealed that he possessed methamphetamine, heroin, plastic baggies, a digital scale, and Dimethyl Sulfone, a common cutting agent for methamphetamine. On March 21, 2019, the defendant pleaded guilty in Chautauqua County Court to Criminal Possession Controlled Substance-5th: Intent To Sell and Criminal Sale Controlled Substance-5th Degree.

    Douglas Beardsley was previously convicted and sentenced to serve 176 months in prison.

    This effort is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) operation. OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.

    The sentencing is the result of an investigation by the Bureau of Alcohol, Tobacco, Firearms, and Explosives, under the direction of Special Agent-in-Charge Bryan Miller, New York Field Division; the Drug Enforcement Administration, under the direction of Special Agent-in-Charge Frank Tarentino, New York Field Division; and the Jamestown Police Department, under the direction of Chief Timothy Jackson.

    # # # #

     

     

    MIL Security OSI –

    May 22, 2025
  • MIL-OSI Security: Former Defense Contractor Pleads Guilty to Tax Crimes

    Source: Office of United States Attorneys

    Defendant Admits to Concealing 50% Ownership of $7B Defense Contracting Business to Evade Taxes

               WASHINGTON – Douglas Edelman, 73, a former defense contractor, pleaded guilty today to tax crimes related to a scheme to defraud the United States and evade taxes on income he earned from his contracts with the U.S. Department of Defense.

               The sentence was announced U.S. Attorney Jeanine Ferris Pirro, Acting Deputy Assistant Attorney General Karen E. Kelly of the Justice Department’s Tax Division, and Special Agent in Charge Kareem A. Carter with IRS-Criminal Investigation (IRS-CI) Washington, D.C. Field Office. 

               Edelman pleaded guilty to 10 felony counts: conspiracy to defraud the United States, seven counts of tax evasion, and two counts of making a false statement.  U.S. District Court Judge Colleen Kollar-Kotelly scheduled a hearing on issues related to sentencing on Nov. 17, 2026. Trial on the remaining counts of the indictment will be in 2026.

               According to court documents and statements made in court, Edelman founded and owned 50% of Mina Corp. and Red Star Enterprises (Mina/Red Star), a defense contracting business that received more than $7 billion from contracts with the U.S. Department of Defense to provide jet fuel in the United States’ post-9/11 military efforts in Afghanistan and the Middle East. 

               Working with others, Edelman engaged in a lengthy scheme to hide his Mina/Red Star profits to evade U.S. taxes, including by concealing his income in undisclosed foreign bank accounts, creating false documents and making false statements that one of his co-conspirators — a French citizen residing abroad and without U.S. tax obligations — founded and owned Mina/Red Star. 

               For example, when the company became profitable in 2005, Edelman began taking distributions which he deposited into Swiss bank accounts, primarily at Credit Suisse, in the name of other companies he owned. In 2008, Credit Suisse informed Edelman that he had to either close his accounts or disclose them to U.S. authorities. Rather than come into compliance with his tax and reporting obligations, Edelman closed his accounts and opened new ones at Bank Julius Baer in Singapore in the name of a nominee entity, the beneficiaries of which were purportedly Edelman’s daughters. He then directed the subject income he earned from Mina/Red Star to those bank accounts. 

               In 2010 the U.S. House of Representatives Committee on Oversight and Government Reform’s Subcommittee on National Security and Foreign Affairs began investigating allegations of corruption in connection with Mina/Red Star’s contracts with the Department of Defense. As part of this inquiry, the subcommittee became interested in the identity of Mina/Red Star’s owners. At this time, Edelman had not filed U.S. tax returns to report the millions of dollars he had earned from Mina/Red Star and had not paid U.S. taxes on his income. 

               Rather than disclose his ownership, Edelman caused his attorneys to tell Congress a false story that a French co-conspirator who had no U.S. tax or reporting obligations founded and co-owed Mina/Red Star with another individual. To corroborate the false story, Edelman and a co-conspirator caused false and backdated paperwork to be created. 

               To continue the scheme, Edelman conveyed the false story about Mina/Red Star’s ownership to other arms of the U.S. government, including to the Department of Defense during contract negotiations in 2010 and 2011, to the IRS in a 2016 application to the Offshore Voluntary Disclosure Program, and to the Justice Department in a 2018 presentation. 

               In conjunction with his 2016 application to the IRS’s Voluntary Disclosure Program, Edelman filed false tax returns for several prior years that only reported income from gifts or purported consulting payments, continuing to conceal the millions he had earned from his company. On the returns, he also concealed profits he had earned from a separate business to provide internet service to members of the armed forces at Kandahar Air Base in Afghanistan. 

               Instead of paying the taxes that he knew he owed, Edelman used the money to fund his lifestyle and additional investments. He invested in a music television franchise in Eastern Europe, a land venture in Tulum, Mexico, and a farm in Kenya, and purchased property around Europe, including a home in Ibiza, Spain, and a townhouse in London.

               Edelman faces a maximum penalty of five years in prison for each of the 10 counts to which he has pleaded. He also faces a period of supervised release, restitution, and monetary penalties. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

               This case is being investigated by special agents from IRS-CI’s International Tax & Financial Crimes specialty group, a team based out of Washington, D.C., that is dedicated to uncovering international tax crimes, along with the Special Inspector General for Afghanistan Reconstruction. The Justice Department’s Office of International Affairs assisted in the investigation. His Majesty’s Revenue & Customs of the United Kingdom also provided assistance, as did the Joint Chiefs of Global Tax Enforcement (J5), which brings together the taxing authorities of Australia, Canada, the Netherlands, the United Kingdom, and the United States. The Guardia Civil of Spain assisted with the arrest. 

               This case is being prosecuted by Assistant U.S. Attorney Joshua Gold for the District of Columbia and Assistant Chief Sarah Ranney and Trial Attorney Ezra Spiro of the Tax Division.

    24cr239

    MIL Security OSI –

    May 22, 2025
  • MIL-OSI Security: Texas Doctor Who Falsely Diagnosed Patients Sentenced to 10 Years’ Imprisonment in Connection with $118M in Fraudulent Health Care Claims

    Source: Office of United States Attorneys

    A Texas rheumatologist was sentenced to 10 years in prison and three years of supervised release for perpetrating a health care fraud scheme involving over $118 million in false claims and the payment of over $28 million by insurers as a result of him falsely diagnosing patients with chronic illnesses to bill for tests and treatments that the patients did not need. Jorge Zamora-Quezada M.D., 68, of Mission, also falsified patient records to support the false diagnoses after receiving a federal grand jury subpoena. Following a 25-day trial, Zamora-Quezada was convicted of one count of conspiracy to commit health care fraud, seven counts of health care fraud, and one count of conspiracy to obstruct justice. In addition to his prison term, Zamora-Quezada was ordered to forfeit $28,245,454, including 13 real estate properties, a jet, and a Maserati GranTurismo.

    According to the evidence presented at trial, Zamora-Quezada falsely diagnosed his patients with rheumatoid arthritis and administered toxic medications in order to defraud Medicare, Medicaid, TRICARE, and Blue Cross Blue Shield. The fraudulent diagnoses made the defendant’s patients believe that they had a life-long, incurable condition that required regular treatment at his offices. After falsely diagnosing his patients, Zamora-Quezada administered unnecessary treatments and ordered unnecessary testing on them, including a variety of injections, infusions, x-rays, MRIs, and other procedures—all with potentially harmful and even deadly side effects. To receive payment for these expensive services, Zamora-Quezada fabricated medical records and lied about the patients’ condition to insurers.

    “Dr. Zamora-Quezada funded his luxurious lifestyle for two decades by traumatizing his patients, abusing his employees, lying to insurers, and stealing taxpayer money,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “His depraved conduct represents a profound betrayal of trust toward vulnerable patients who depend on care and integrity from their doctors. Today’s sentence is not just a punishment—it’s a warning. Medical professionals who harm Americans for personal enrichment will be aggressively pursued and held accountable to protect our citizens and the public fisc.”

    “Through the false diagnoses and excessive false billing, Dr. Zamora-Quezada abused both patient trust and public resources,” said Special Agent in Charge Jason E. Meadows of the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG). “It is imperative to investigate and address this form of fraud — not only to protect vulnerable individuals from harm but to uphold the integrity of the federal health care system and safeguard the use of public funds.”

    “The FBI is dedicated to working with all of our partners to address health care fraud,” said Special Agent in Charge Aaron Tapp of the FBI’s San Antonio Field Office. “This case was not only a concern to us because of the financial loss — the physical and emotional harm suffered by the patients and their families was alarming and profound. We hope this significant sentence will help bring closure to the many victims in this case.”

    Evidence at trial established that Dr. Zamora-Quezada falsely diagnosed patients in order to defraud insurers and enrich himself. Other rheumatologists in the Rio Grande Valley testified at trial that they saw hundreds of patients previously diagnosed with rheumatoid arthritis by Zamora-Quezada who did not have the condition, prompting one physician to explain that for “most” it was “obvious that the patient did not have rheumatoid arthritis.” Zamora-Quezada’s false diagnoses and powerful medications caused debilitating side effects on his patients, including strokes, necrosis of the jawbone, hair loss, liver damage, and pain so severe that basic tasks of everyday life, such as bathing, cooking, and driving, became difficult. As one patient testified, “Constantly being in bed and being unable to get up from bed alone, and being pumped with medication, I didn’t feel like my life had any meaning.” One mother described how she felt that her child served as a “lab rat,” and others described abandoning plans for college or feeling like they were “living a life in the body of an elderly person.”

    Former employees detailed how Zamora-Quezada imposed strict quotas for procedures, leading to a climate of fear. Zamora-Quezada referred to himself as the “eminencia” — or eminence, threw a paperweight at an employee who failed to generate enough unnecessary procedures, hired employees he could manipulate because they were on J-1 visas and their immigration status could be jeopardized if they lost their jobs, and fired those who challenged him. Testimony also revealed Zamora-Quezada’s obstruction of insurer audits by fabricating missing patient files, including by taking ultrasounds of employees and using those images as documentation in the patient records. Testimony at trial established that Zamora-Quezada told employees to “aparecer” the missing records — “to make them appear.” Former employees also recounted being sent to a dilapidated barn to attempt to retrieve records. There, files were saturated with feces and urine, rodents, and termites that infested not only the records but also the structure.

    Zamora-Quezada’s patient file storage facility

    Zamora-Quezada used proceeds from his crimes to fund a lavish lifestyle, replete with real estate properties across the country and in Mexico, a jet, and a Maserati.

    One of Zamora-Quezada’s luxury properties

    Zamora-Quezada’s jet

    FBI, HHS-OIG, Texas HHS-OIG, and the Texas Medicaid Fraud Control Unit investigated the case, with assistance from the Defense Criminal Investigative Service.

    Principal Assistant Chief Jacob Foster and Assistant Chiefs Rebecca Yuan and Emily Gurskis of the Criminal Division’s Fraud Section and Assistant U.S. Attorney Laura Garcia for the Southern District of Texas prosecuted the case. Assistant U.S. Attorney Kristine Rollinson handled asset forfeiture. Fraud Section Assistant Chief Kevin Lowell initially handled the prosecution. The prosecution team thanks the Fraud Section’s Data Analytics Team, whose work initiated the investigation, Victim Witness Specialist Olga De La Rosa of the U.S. Attorney’s Office for the Southern District of Texas, and the Texas Department of Insurance.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of nine strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with HHS-OIG, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal-fraud/health-care-fraud-unit.

    MIL Security OSI –

    May 22, 2025
  • MIL-OSI Security: Chief Executive Officer of Digital Asset Company Found Guilty in Multi-Million Dollar Crypto-Fraud Scheme

    Source: Office of United States Attorneys

    Defendant Misappropriated Millions of Dollars of Investors’ Funds for His Own Use Including to Purchase Real Estate and Luxury Vehicles

    Earlier today, at the federal courthouse in Brooklyn, a federal jury convicted Braden John Karony on all counts of a three-count indictment charging him with conspiracy to commit securities fraud, wire fraud, and money laundering.  The charges arose from the defendant’s and his co-conspirators’ roles in defrauding investors in a decentralized finance digital asset called “SafeMoon,” issued by their company SafeMoon LLC.  As alleged, the defendant agreed with his co-conspirators to lie to SafeMoon investors about whether SafeMoon executives could access the liquidity pool and whether they were using the assets from the liquidity pool for their personal benefit.  As SafeMoon’s market capitalization grew to more than $8 billion, the defendant fraudulently diverted and misappropriated millions of dollars’ worth of  liquidity from the SafeMoon liquidity pool for their personal benefit.  The verdict followed a 12-day trial before United States District Judge Eric R. Komitee.  When sentenced, Karony faces up to 45 years in prison.  The jury also issued a verdict to forfeit one residential property and the proceeds from the sale of another residential property, amounting to approximately $2 million.

    Joseph Nocella, Jr., United States Attorney for the Eastern District of New York;   Christopher G. Raia, Assistant Director in Charge, Federal Bureau of Investigation, New York Field Office (FBI); Harry T. Chavis, Jr., Special Agent in Charge, Internal Revenue Service Criminal Investigation, New York (IRS-CI); and Darren B. McCormack, Acting Special Agent in Charge, Homeland Security Investigations, New York (HSI New York) announced the verdict. 

    “As proven at trial, the SafeMoon digital asset was anything but safe and turned out to be pie in the sky for investors who were deliberately misled by Karony, a man who sought to get rich quick by stealing and diverting millions of dollars,” stated United States Attorney Nocella.  “Karony used his scheme to purchase multiple homes, sports cars, custom trucks, and other luxury goods.  Today’s guilty verdict should serve as a warning to all would-be fraudsters that my Office will vigorously prosecute individuals like the defendant who victimize digital asset investors and undermine investor confidence in digital assets markets, thereby threatening the stability and growth of these emerging technologies.”

    Mr. Nocella expressed his appreciation to the U.S. Securities and Exchange Commission for its work on the case. 

    “Braden Karony, the CEO of SafeMoon, exploited his company’s digital portfolio with fictional success stories and stole millions of dollars in crypto-assets to finance luxury purchases,” stated FBI Assistant Director in Charge Raia.  “Along with his co-conspirators, Karony violated his clients’ trust and wallets while attempting to conceal his misconduct through discreet transactions.  May today’s conviction emphasize the FBI’s commitment to securing all markets and protecting the American people from individuals who abuse their position to satisfy personal greed.”

    “Braden Karony misled investors; intentionally diverted and misappropriated millions in cryptocurrency for his personal benefit; and lined the driveways of his million dollar homes with luxury cars.  While the name of his company is SafeMoon, there was nothing safe about this investment that was just a front for theft.  By following the money with complex cryptocurrency tracing, IRS-CI New York’s Cyber and J5 groups worked with our investigative partners to see that this conman is held accountable for his greedy acts,” stated IRS-CI New York Special Agent in Charge Chavis.  “The Joint Chiefs of Global Tax Enforcement (J5) is a global partnership that works together to gather information, share intelligence, and conduct coordinated operations against transnational financial crimes.  The J5 includes the Australian Taxation Office, the Canada Revenue Agency, the Dutch Fiscal Intelligence and Investigation Service, His Majesty’s Revenue and Customs from the U.K. and IRS-CI from the U.S.”

    “Steered by his selfish desires and insatiable greed, Braden John Karony treated millions of dollars in investors’ funds as his own personal bank account,” stated HSI New York Acting Special Agent in Charge McCormack.  “The defendant will soon be trading his sprawling real estate and luxury vehicles for a jail cell within the four walls of a federal penitentiary.  As reflected by today’s conviction, whether it involves fiat or crypto, HSI New York’s El Dorado Task Force will relentlessly pursue individuals intent on exploiting investors and the American financial system for their own gain.”

    Background on SafeMoon

    As proven at trial, SafeMoon tokens were digital assets first issued in March 2021 by SafeMoon LLC on a public blockchain.  Through the operation of SafeMoon’s smart contract, every transaction in SafeMoon was automatically subject to a 10% tax, meaning, for example, that if a holder of SafeMoon transferred 10 SafeMoon to another user, 1 SafeMoon would automatically be retained from the transfer as a tax and the remaining 9 SafeMoon would be received by the other party.  As marketed to SafeMoon investors, the proceeds of SafeMoon’s 10% tax were split into two 5% tranches, the proceeds of which were supposed to benefit holders of SafeMoon in specific ways.  The first 5% tranche of the tax proceeds would be “reflected” back to, and distributed among, all SafeMoon holders in proportion to their current SafeMoon holdings and thereby increase the total quantity of SafeMoon held by every SafeMoon investor automatically.  The remaining 5% tranche of SafeMoon tax proceeds would be deposited into designated SafeMoon liquidity pools.  The larger the SafeMoon liquidity pool, the greater the liquidity in the market for SafeMoon.  In the months after its launch in March 2021, SafeMoon grew to have millions of holders and a market capitalization of more than $8 billion.

    The Defendants’ Fraudulent Scheme

    Karony and his co-conspirators misrepresented various material aspects of the SafeMoon offering to investors.  Such misrepresentations included that SafeMoon relied on “locked” liquidity pools that would automatically increase in size due to a 10% tax imposed on every SafeMoon transaction; that the “locked” SafeMoon liquidity pool prevented the defendants and other insiders at SafeMoon from being able to “rug pull”—a type of crypto fraud— SafeMoon investors by removing liquidity from the SafeMoon liquidity pool; that tokens in the liquidity pool would only be used for limited pre-defined business purposes, not personal enrichment; that the defendants would manually add token pairs to the SafeMoon liquidity pool when transactions of SafeMoon occurred on specific centralized exchanges; and that the developers were not and had not been holding and trading SafeMoon for their benefit.

    In reality, Karony and his co-conspirators retained access to the SafeMoon liquidity pools and used that access to intentionally divert and misappropriate millions of dollars’ worth of tokens for their personal benefit.  In addition, although they publicly denied that they personally held or traded SafeMoon, they repeatedly bought and sold SafeMoon, sometimes at the height of SafeMoon market price, which generated millions of dollars in profits.  Karony and his co-conspirators masked their movement of the fraudulent proceeds via numerous private un-hosted crypto wallet addresses, complex transaction routing, and pseudonymous centralized exchange accounts.  Karony acquired over $9 million in crypto assets from the scheme and used some of the proceeds to purchase luxury vehicles and real estate, including a $2.2 million home in Utah, additional homes in Utah and Kansas, a $277,000 Audi R8 sports car, another Audi R8, a Tesla, and custom Ford F-550 and Jeep Gladiator pickup trucks.

    Co-conspirator Thomas Smith previously pleaded guilty and is awaiting sentencing. Co-conspirator Kyle Nagy remains at large. 

    The government’s case is being handled by the Office’s Business and Securities Fraud Section.  Assistant United States  Attorneys Dana Rehnquist, Sara K. Winik, and Jessica K. Weigel are in charge of the prosecution, with assistance from Paralegal Specialists Asher Martin-Rosenthal and Madison Bates. Assistant United States Attorney Laura Mantell is handling forfeiture matters.

    The Defendant:

    BRADEN JOHN KARONY
    29
    Provo, Utah

    E.D.N.Y. Docket No. 23-CR-433 (EK)

    MIL Security OSI –

    May 22, 2025
  • MIL-OSI Security: Houston Pharmacy Owner Sentenced to 19 Years in Prison for Illegal Distribution of Opioids and Tax Fraud

    Source: United States Attorneys General 7

    A Texas man was sentenced on Monday to 19 years in prison for unlawfully conspiring to distribute millions of opioid pills and aiding the falsification of tax records. 

    According to court documents, Christopher Obaze, 64, of Houston, Texas, was the owner and pharmacist-in-charge of Chrisco Pharmacy. Obaze and his co-conspirators operated Chrisco Pharmacy as an illegal “ghosting pharmacy,” purchasing pharmaceutical opioids and other commonly abused prescription drugs from wholesalers and then selling them in bulk to drug traffickers, without involving physicians, patients, or prescriptions. From January 2018 through October 2021, Obaze and his co-conspirators distributed at least 2,268,700 hydrocodone 10-325 mg and oxycodone 30 mg pills as part of the scheme. 

    The defendant and his pharmacy technician attempted to conceal their illegal activities by reporting no dispensing of the drugs to the Texas State Board of Pharmacy’s prescription monitoring program after July 2018, and by structuring cash deposits and submitting false documents to banks to maintain accounts to hold the proceeds of their unlawful distribution scheme. Obaze also aided and assisted in the preparation and presentation of false and fraudulent tax returns to the IRS by understating, among other things, the gross receipts of Chrisco Pharmacy. 

    Matthew R. Galeotti, Head of the Justice Department’s Criminal Division, U.S. Attorney Nicholas J. Ganjei for the Southern District of Texas, Special Agent in Charge William Kimbell of the Drug Enforcement Administration (DEA) Houston Division, and Special Agent in Charge Lucy Tan of the IRS Criminal Investigation (IRS-CI) Houston Field Office made the announcement. 

    The DEA and IRS-CI investigated the case. 

    Trial Attorney Drew Pennebaker of the Criminal Division’s Fraud Section prosecuted the case. 

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of 9 strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with the Office of the Inspector General for the Department of Health and Human Services, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal/criminal-fraud/health-care-fraud-unit.

    MIL Security OSI –

    May 22, 2025
  • MIL-OSI USA News: President Trump is Right About What’s Happening in South Africa

    Source: The White House

    Today, President Donald J. Trump showed the world the shocking treatment of white farmers in South Africa — including with a video montage that highlighted the discrimination and violence targeted at the innocent minority victims.

    President Trump was exactly right.

    • “We left because of the attacks. You can’t stay on a farm as a white person in South Africa. You know you’ll be killed,” said one South African refugee.
    • New York Post: White South African couple say they’re victims of racial attacks — and can’t wait to be in Trump’s America
    • The Daily Mail: Why white South Africans are fleeing surging violence and ‘racist’ laws for new lives in America
    • BBC: ‘I didn’t come here for fun’ – Afrikaner defends refugee status in US
    • Breitbart: Trump Vindicated as South Africa Considers Bill to Redistribute Land on Racial Lines
    • BBC: South African president signs controversial land seizure law
      • The law is vague, stating that expropriation is allowed in circumstances where it is “just and equitable and in the public interest” to do so.
    • BBC: “Close to 70,000 South Africans have expressed interest in moving to the US following Washington’s offer to resettle people from the country’s Afrikaner community, a business group has said.”
    • The New York Times: ‘Kill the Boer’ Song Fuels Backlash in South Africa and U.S.
      • “The political rally was winding down when the brash leader of a leftist South African party grabbed the microphone and began to stomp and chant. Thousands of supporters joined in, and when he reached the climax, they pointed their fingers in the air like guns. ‘Kill the Boer!’ Julius Malema chanted, referring to white farmers. The crowd in a stadium in Johannesburg on Saturday roared back in approval.”
    • The New York Times: Killing of White Farmer Becomes a Flash Point in South Africa
    • Sky News: ‘Anti-white racism’: Farmers being targeted in South Africa
    • news.com.au: South Africans trapped ‘like frogs in boiling water’ as racial violence escalates
    • The Independent: South Africa: Taking farms from whites is justified because ‘it’s not really their land’, says EFF spokesman
    • New York Sun: From Murdered White Farmers to ‘Racially Disfavored Landowners’: Why Trump and Musk Are Targeting South Africa
    • The Independent: Farmers in South Africa claim they are being targeted in ‘horrific’ attacks
    • news.com.au: South Africa farm attacks: Brutal crimes landowners face
    • The Daily Mail: There’s been a murder a week on farms in South Africa this year. Now a race-baiting Marxist who loves singing Kill the Boer is set to become Vice President
    • Fox News: South African political leader calls for violence against White citizens at rally: ‘Kill the Boer, the farmer’

    MIL OSI USA News –

    May 22, 2025
  • MIL-OSI Submissions: Africa – Joint Statement of Commission of the Bishops’ Conferences of the European Union (COMECE) and Symposium of Episcopal Conferences of Africa and Madagascar (SECAM) ahead of the AU – EU Foreign Ministers’ Meeting on 21 May 2025

    SOURCE: Symposium of Episcopal Conferences of Africa and Madagascar (SECAM)

    Africa needs a transformation rooted in the Gospel values of care for creation, solidarity with the poor, and the pursuit of peace

    ACCRA, Ghana, May 21, 2025 – As shepherds of the Catholic Church in Africa and in Europe, we, the bishops of the Symposium of Episcopal Conferences of Africa and Madagascar (SECAM) (www.SECAM.org) and of the Commission of the Bishops’ Conferences of the European Union (COMECE), speak today with a voice formed by the lived realities of our people – farmers, fisherfolk, pastoralists, women and youth – whose lives are shaped by the land, and whose hope depends on justice, peace, and dignity. We welcome the convening of the joint African Union–European Union Foreign Ministers’ Meeting as an opportunity to examine not only shared ambitions but the very nature of our partnership. 
    As SECAM and COMECE have already stated five years ago, “we are firmly convinced that Africa and Europe could become the engines for a reinvigoration of multilateral cooperation by reinforcing their longstanding ties marked by our common roots and geographical proximity […] towards an equitable and responsible partnership that puts the people at its centre”.

    We are, however, deeply concerned about certain developments in this partnership over recent years. We have witnessed a profound shift in European priorities – away from solidarity with the most fragile regions and communities, and from development cooperation aimed at eradicating poverty and hunger, towards a more narrowly defined set of geopolitical and economic interests. Notwithstanding the commendable intention behind some projects promoting human development at the grassroots, certain initiatives supported under the EU’s Global Gateway – while presented as mutually beneficial – too often seem to replicate extractive patterns of the past: privileging European corporate and strategic aims over the real needs and aspirations of African people.

    Land, water, seeds, and minerals – the very foundations of life – seem to be once again treated as commodities for foreign profit rather than as common goods to be stewarded with care. Africa is being asked to sacrifice its ecosystems and communities to help Europe meet its decarbonisation goals – whether through massive land deals for so-called “green” energy projects, the expansion of carbon offset plantations, or the outsourcing of industrial agriculture’s toxic inputs and waste. This is not partnership. This is not justice.

    “The earth herself, burdened and laid waste, is among the most abandoned and maltreated of our poor” (Laudato Si’, §2)

    The Catholic Church, inspired by late Pope Francis’ encyclical Laudato Si’, shares the understanding that we must hear both the cry of the earth and the cry of the poor. These cries are loud and clear across Africa. Climate change is wreaking havoc on those who depend on the land, even as our continent has contributed least to the crisis. Soil degradation, poisoned water, and the loss of biodiversity are destroying the foundation of rural life. Hunger in Africa is growing, not because we lack food, but because we have allowed systems to dominate that put profit above people and that treat agriculture as an industrial process, not a way of life.

    We urge the ministers gathered in Brussels to place the dignity of African peoples at the heart of the AU-EU partnership. This means supporting a transformation of agriculture that breaks free from dependency on imported fertilisers, chemical inputs, and genetically modified seeds. It means protecting and promoting farmer-managed seed systems, which are the repositories of Africa’s agricultural biodiversity and the key to food sovereignty. These systems are not backward or inefficient – they are resilient, rooted in tradition, and adapted to local ecologies. Criminalising farmers for saving seeds or imposing rigid intellectual property regimes aligned with UPOV or corporate agendas violates both their rights and the planet’s needs.

    We call for an immediate ban on the export and use of Highly Hazardous Pesticides in Africa. It is a grave injustice that chemicals banned in Europe for their risks to health and ecosystems are still manufactured there and marketed to African farmers. This double standard must end. Instead, we must invest in agroecology – a science, a practice, and a social movement that nourishes the land, respects cultural traditions, and empowers women and youth. Agroecology offers a truly African path to climate adaptation and rural regeneration. It is rooted in the wisdom of our communities and validated by science. It is our future.

    Moreover, we remind our political leaders that land is sacred. For most Africans, land is not merely a factor of production or a tradable asset. It is a gift from God, entrusted to us by our ancestors and held in common for future generations. Large-scale land acquisitions by foreign investors or development finance institutions, carried out without free, prior, and informed consent, are an affront to this sacred trust. They displace communities, erode customary rights, and contribute to conflict and forced migration. Ministers must act decisively to end land grabbing and ensure legal protection for communal and customary tenure systems.

    We are particularly disturbed by growing use of African territory as a site for Europe’s resource needs and climate ambitions. Decarbonisation must not come at the cost of African ecosystems or the rights of African communities. It is ethically untenable to demand that Africa become the dumping ground for Europe’s “green transition” – whether through extractive mining for critical minerals or vast land projects that reduce our continent to a carbon sink.

    Let us be clear: Africa does not need charity, nor does it need to be a battleground for external interests. What it needs is justice. What it needs is a partnership grounded in mutual respect, environmental stewardship, and the centrality of human dignity. We believe such a partnership is possible – but only if the structures and priorities of AU-EU cooperation are fundamentally reoriented towards these objectives.

    We therefore urge ministers to listen more closely to African civil society, Indigenous peoples, and faith communities – not as token participants, but as equal co-creators of policy. Real dialogue means making space for the voices of those who live on and with the land.

    We conclude by echoing the spirit of Laudato Si’, which calls for an “integral ecology” – one that recognises the profound interconnection between people, planet, and purpose.

    We pray that this meeting may mark a turning point – not only in diplomatic relations but in the moral and spiritual compass guiding our shared future.

    Africa needs a transformation rooted in the Gospel values of care for creation, solidarity with the poor, and the pursuit of peace. As Laudato Si’ teaches us, “everything is interconnected” (§117) – and so our response must be holistic and courageous.

    We invite the AU and EU Foreign Ministers to rise to this moment. Let this be the partnership that listens to the cries of the earth and the cries of the poor. Let this be the moment when Africa’s future is shaped not by external interests, but by the aspirations of its people – especially those who till the land, feed the nation, and protect the environment.

    MIL OSI – Submitted News –

    May 22, 2025
  • MIL-OSI USA: Rep. Fitzgerald’s Halting Uncertain Methods and Practices in Supervision (HUMPS) Act Passes Financial Services Committee

    Source: United States House of Representatives – Congressman Scott Fitzgerald (WI-05)

    WASHINGTON, DC – Congressman Scott Fitzgerald (WI-05) introduced the Halting Uncertain Methods and Practices in Supervision (HUMPS) Act, which strengthens transparency in how banks are evaluated. The bill passed the House Financial Services Committee today by voice vote. Specifically, it directs the Federal Financial Institutions Examination Council (FFIEC) to revise the CAMELS rating system by establishing clear, objective standards for each component and updating the formula used to calculate a bank’s overall rating. It also calls for eliminating or reforming the subjective “Management” component, focusing instead on measurable risk governance and internal controls.

    “The HUMPS Act brings much-needed transparency and accountability to the bank rating process,” said Congressman Scott Fitzgerald. “The CAMELS rating system has a real impact on how banks operate—but right now, it gives regulators too much room to apply double standards. This bill ensures that supervisory ratings are based on transparent, quantifiable metrics, not political bias or personal opinion. It’s a necessary step to prevent debanking by removing subjectivity from banking oversight.”

    BACKGROUND: The CAMELS rating system—Capital adequacy, Asset quality, Management, Earnings, Liquidity, and Sensitivity to market risk—is a supervisory tool used by federal regulators to assess the health and safety of financial institutions. These confidential ratings significantly affect decisions around mergers and acquisitions, deposit insurance premiums, and whether a bank is considered “well managed” for regulatory purposes. 

    However, the current framework gives regulators broad discretion, particularly in the “Management” component, which is often based on subjective judgments rather than objective metrics. This discretion has raised concerns about politicized supervision and “debanking.” When a bank’s supervisory rating can be downgraded due to undefined or opaque criteria, institutions may choose to “de-risk” by avoiding lawful but politically disfavored customers. This creates a chilling effect on financial access and weakens trust in the neutrality of bank oversight.

    SUPPORTERS: American Bankers Association, America’s Credit Unions, Bank Policy Institute, Financial Services Forum, and Wisconsin Bankers Association.

    Read the bill text here.

    ###

    MIL OSI USA News –

    May 22, 2025
  • MIL-OSI Security: Watertown Man Sentenced to Nearly 16 Years in Federal Prison for Unlawful Firearm Possession

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    SIOUX FALLS—United States Attorney Alison J. Ramsdell announced today that Judge Charles B. Kornmann has sentenced a Watertown, South Dakota, man convicted of Possession of a Firearm by a Prohibited Person. The sentencing took place on May 19, 2025. 

    Anthony Thomas Lee Baker, 43, was sentenced to 15 years and 8 months in federal prison, followed by 5 years of supervised release, and ordered to pay a $100 special assessment to the Federal Crime Victims Fund. Forfeiture of the firearm was also ordered.  

    Baker was indicted for Felon in Possession of a Firearm by a federal grand jury in May 2024. He pleaded guilty on September 30, 2024.

    The charges arose from an incident when Baker, driving a vehicle, was stopped by law enforcement in Watertown, South Dakota. He was found to be in possession of a .45 caliber semi-automatic pistol. Baker is prohibited from possessing any firearm based on a prior felony conviction. More specifically, Baker has at least three prior violent felony convictions, including one for possession of another firearm following his conviction for a crime of violence in Ramsey County, Minnesota, in 2017.

    This case was investigated by the ATF and the Watertown Police Department. Assistant U.S. Attorney Paige Petersen prosecuted the case. 

    Baker was immediately remanded to the custody of the U.S. Marshals Service. 

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results. 

    MIL Security OSI –

    May 22, 2025
  • MIL-OSI USA: Unlocking Albany’s Potential Through Revitalization

    Source: US State of New York

    [embedded content]

    [embedded content]

    The comprehensive approach to the CAP Initiative also includes up to $150 million to transform cultural experiences in and around Albany’s Downtown, such as renovating the New York State Museum and upgrading the exhibits to be more inviting to Albany families and tourists alike. It also includes funding to invest in improvements at the Empire State Plaza to strengthen connections with the surrounding community and make the space a vibrant and inviting part of the fabric of downtown Albany.

    Additionally, Governor Hochul has committed up to $40 million to advance plans to reimagine I-787 which would include reconnecting Albany and surrounding communities and enhancing access to the Hudson River waterfront. This summer, the New York State Department of Transportation (NYSDOT) will release a Planning and Environment Linkages (PEL) study on potential ways to reimagine I-787, a travel corridor in the Capital Region that provides high speed access to the City of Albany and other communities along the river, including Green Island, Watervliet and Menands. Building upon the work completed under the PEL study, up to $40 million will be utilized by NYSDOT to begin an Environmental Impact Statement, which will lay the groundwork for a future project along the I-787 corridor. The environmental review will examine ways to enhance waterfront access along the Hudson River for all users of the road, connect neighborhoods and key destinations in communities along the corridor, and address the infrastructure of I-787, the South Mall Expressway, the Dunn Memorial Bridge, and additional infrastructure along the study area.

    Governor Hochul previously announced $19.5 million in State investments to improve public safety in Albany, which included a $1 million commitment to the City of Albany Police Department and $500,000 for the Albany County Sheriff’s Office. These investments reflect a record level of State funding for public safety in the City of Albany and Capital Region. These resources are delivered through a series of nation-leading programs supported by the Division of Criminal Justice Services (DCJS), including the Gun Involved Violence Elimination (GIVE) initiative, the Capital Region Crime Analysis Center, the SNUG Street Outreach and Social Work Program and Project RISE (Respond, Invest, Sustain and Empower). Working together, these efforts have helped reduce violence and improve community safety.

    Albany is not only our great state’s capital city, it’s also a place I call home. This investment isn’t just about dollars and cents, it’s about jobs, innovation and a brighter future for our community.

    Governor Kathy Hochul

    Informed by input from local stakeholders and the community, the CAP Initiative will unfold through a comprehensive public engagement process to identify key opportunities to promote business development, bolster public safety, encourage housing, attract visitors and enhance affordability.

    Empire State Development President, CEO and Commissioner Hope Knight said, “Since Governor Hochul first proposed the Championing Albany’s Potential initiative in her State of the State, ESD has been working to establish the foundation upon which this historic investment in our Capital City will build. Working together, we will utilize this generational funding to support transformational projects that reflect the needs of those who live, work and visit the city, and encourage even more people to experience and explore Downtown Albany.”

    New York State Office of General Services Commissioner Jeanette Moy said, “The historic investment Governor Hochul is making through the Championing Albany’s Potential initiative will help revitalize our capital city. It will also strengthen the ties between state government and our neighbors living and working in the communities surrounding the Capitol and Empire State Plaza. CAP is a sustainable plan for long-term growth that will spur public-private partnerships, build a thriving city center, and create a vibrant downtown for residents and visitors alike.”

    New York State Homes & Community Renewal Commissioner RuthAnne Visnauskas said, “Albany deserves a downtown that is a place people want to visit, live, work, connect, and celebrate. It’s a place rich with history that has been wounded by planning decisions that negatively impacted entire neighborhoods. This $400 million investment will directly boost the city’s potential as an attractive destination by unwinding past mistakes and disinvestment. We’ve made strides recently in Governor Hochul’s administration, investing in upgrading affordable housing and reclaiming vacant land and buildings for development. Now, through CAP, there’s real momentum to rebuild, replan holistically with community involvement and revive our beautiful Capital City for those who live and work here now and for those who will enjoy its future.”

    New York State Department of Transportation Commissioner Marie Therese Dominguez said, “The Hudson River is one of the Capital Region’s greatest natural assets, and over the past few years the Department of Transportation has made key investments to reconnect residents and visitors with the waterfront, including projects like the Albany Skyway – a linear park; building the Empire State Trail and today, the Livingston Avenue Rail Bridge, which is currently in construction. The I-787 corridor is a vital piece in reimagining the City of Albany and its waterfront, which is why the Governor’s investment in the next stage of this project is so important. For a number of years now, the project team at NYSDOT has engaged with communities all along the Hudson River to gather ideas and feedback and most importantly, listen to local residents – the people who work and live here, on the future of this corridor. The funding for the next stage of this project – an Environmental Impact Statement – was included in this year’s budget and brings us one step closer to advancing from the ideation stage to the preliminary design and eventual construction phase, as we work to study the real potential this corridor offers for travel, recreation and tourism as well as economic growth throughout the Capital Region.”

    New York State Division of Criminal Justice Services Commissioner Rossana Rosado said, “Through Governor Hochul’s unparalleled leadership on public safety, cities across New York State are receiving record resources to ensure safer and stronger communities. These investments and initiatives – spanning evidence-based policing strategies, crime analysis center support, community violence interventions, and neighborhood empowerment programs – help keep New Yorkers safe, ensure a fair and effective justice system, and build opportunities for young people and families. Here in the Capital Region, DCJS is proud to support dozens of our law enforcement and community-based partners as they continue to drive down gun violence and crime.”

    State Senator Patricia Fahy said. “I’m incredibly proud that the core of our Capital Region and the 46th District, downtown Albany, will receive $400 million in transformative, once-in-a-generation funding. For years, I’ve engaged with our community to chart a new path forward for Albany that includes Reimagining I-787, making the State Museum a 21st Century destination-location, expanding the core of our Capital Region: downtown Albany, and so much more. That’s why I’m so proud this year’s budget includes $200 million for downtown revitalization, $150 million for upgrading the New York State Museum, $40 million for the next phase of the reimagining I-787 study, and $1 million for addressing public safety in our neighborhoods. Now, the hard work begins in earnest. I look forward to engaging our community, stakeholders, and residents as we move forward with this funding. Make no mistake: together, these initiatives will usher in a new day for the Capital Region, the impacts of which will be felt for years, if not generations to come—if we get it right. I want to thank my legislative colleagues and the Governor for recognizing the value of investing in our Capital City’s success, and for helping deliver this funding in this year’s state budget.”

    Assemblymember John T. McDonald III, RPh said “This historic funding is incredible news for the City of Albany and the entire Capital Region. The revitalization of the New York State Museum, the reimagining of I-787, much-needed improvements to the Empire State Plaza and other investments are transformative projects that will enhance connectivity, celebrate our history, and create new opportunities for residents and visitors alike. These efforts reflect years of advocacy and collaboration, and I thank Governor Hochul for her continued commitment to supporting the City of Albany and strengthening the Capital Region as a whole.”

    Assemblymember Gabriella A. Romero said, “These investments truly are an investment in Albany’s potential and in making it a city all New Yorkers can be proud to call our capital. Revitalizing downtown, strengthening small business, expanding affordable housing – these are all valuable steps to uplift Albany. I thank the Governor for her leadership in championing this historic investment and Championing Albany’s Potential.”

    Embedded Flickr Album

    Albany County Executive Daniel P. McCoy said, “Governor Hochul’s Championing Albany’s Potential (CAP) Initiative has the potential to be transformational. It’s a historic commitment to the heart of Albany County that will bring new housing, new business, and new life into downtown. A reimagined Albany is exactly what we need, and I’m proud to stand with the governor in this effort.”

    Albany Mayor Kathy Sheehan said, “This $400 million investment is a testament to the hard work of the City of Albany over the last 12 years to be ready to write the next great chapter in the history of New York’s Capital City. The pandemic taught us that we need to reimagine our downtowns to get more feet on the street by creating more housing, supporting our small businesses, enhancing public safety, and attracting world-class amenities, and this transformative investment will do just that and more. To steal a phrase from President Biden, this is truly a ‘big effing deal.’ My sincere thanks and appreciation to Governor Hochul for seeing what we all see in the City of Albany: a city that’s full of pride and potential and ready to soar to even greater heights. I also want to thank Senator Fahy, Assemblymember Romero, and Assemblymember McDonald, as well as the entire State Legislature for making this critical investment in their home away from home.”

    Advance Albany County Alliance CEO Kevin O’Connor said, “The Advance Albany County Alliance thanks Governor Hochul for her thoughtful leadership and timely commitment to revitalizing New York’s Capital City. The City of Albany is not only the front door of state government, it is the heartbeat of Upstate New York’s fastest-growing county and the springboard for the local economy. The Governor’s disciplined approach through the CAP Initiative will ensure that state funding achieves the greatest possible positive impact. Through this partnership, we will supercharge our placemaking efforts, improve public spaces, secure a safe and welcoming downtown environment, and stimulate the central corridor of the Capital Region.”

    Capitalize Albany Corporation President Ashley Mohl said, “With Governor Hochul’s focus and support fueled by this historic more than $400 million investment, New York’s capital city stands on the brink of transformative growth. Our board and staff look forward to working with ESD and MIG alongside our many local and other state economic development partners to maximize this funding and seize this incredible opportunity. To build on the Governor’s CAP Initiative, Capitalize Albany is looking forward to advancing its planned solicitation for qualified development teams interested in acquisition and redevelopment of the Liberty Park site. Our RFP will engage the market directly with the aim to attract strong interest and a range of RFP responses. If you’re a developer or team with a project for the Liberty Park site, we welcome your response.”

    Downtown Albany BID Executive Director Georgette Steffens said, “In my 25 years of doing economic development in Downtown Albany, this is the largest investment we’ve ever seen. On behalf of nearly 200 property owners and over 120 restaurants and retail-related businesses, I want to express my profound gratitude to Governor Hochul and the Legislature for their commitment to Albany. We are already seeing the effects of the CAP initiative, with a renewed wave of investment interest in Downtown Albany beginning to percolate. The future of our city’s core is incredibly bright thanks to the Governor’s investment, and I look forward to working together to make Downtown a stronger and more vibrant place to live, work, and experience.”

    MIL OSI USA News –

    May 22, 2025
  • MIL-Evening Report: Playing the crime card: do law and order campaigns win votes in Australia?

    Source: The Conversation (Au and NZ) – By Chloe Keel, Lecturer in Criminology and Criminal Justice, Griffith University

    Crime and public safety are usually the domain of state politics. But the Coalition tried to elevate them as key issues for voters in the recent federal election.

    Claiming crime had been “allowed to fester” under Labor, the opposition promised a A$750 million Operation Safer Communities plan, which included police strike teams targeting drugs, a national child sex offender register, and more money for Neighbourhood Watch.

    A Coalition government would also have given grants to community groups to install public lighting, bollards and CCTV cameras.

    But in the end, crime did not appear to be a deciding factor in the election, which was easily won by Labor.

    What does that tell us about leveraging public fear – either existing crime fears and general anxieties, or latent concerns that can be triggered – for political gain in Australia? Can it be a successful strategy?

    Stoking anxiety

    In culturally diverse countries, such as Australia and the United States, law and order rhetoric sometimes calls for supporting aggressive crime policies at the expense of racial and ethnic minorities, many of whom are immigrants.

    These policies can be effective in stoking public fear to win votes. US President Donald Trump’s exhortations on immigration and crime were a significant part of his election campaigns in 2016 and 2024.

    However, what experts call “protective factors”, such as strong communities and social cohesion, are important. They can reduce the influence of political narratives that try to define crime in narrowly punitive or racialised terms.

    Australia is not America

    Our peer-reviewed research, which will be published in the Journal of Criminology, investigated how public concerns about crime and safety in Australia and the US were associated with demographic factors that evolved over time. The study drew on data from the World Values Survey and indicated key differences in what makes Australians and Americans feel unsafe.

    We have found that in Australia in 2018, supporters of left-leaning parties (Labor/Green) reported feeling significantly safer than other voters. However, this gap disappeared when researchers took into account attitudes that blame crime problems on immigrants. This suggests immigrant-blaming in Australia can drive feelings of community fear and insecurity.

    The World Values Survey uncovered a different pattern in the US.

    Between 2011 and 2017, Republican voters reported feeling safer than other Americans – the opposite of Australia’s trend. The political divide in the US couldn’t be explained by immigrant-blaming attitudes. Rather, it was attributed to the “self-isolation” of American conservatives in more culturally homogeneous communities.

    Our study indicated that while immigration continued to influence safety perceptions in the US, it appeared to operate through different mechanisms than in Australia. Racial and ethnic minorities reported greater fear as the 2010s unfolded.

    Social connectedness also plays differently in each country. In Australia, trust in others and confidence in public institutions consistently influences safety perceptions. In the US, these factors have little impact.

    Social scientists have observed that in modern societies, responsibility for personal safety has increasingly shifted from the government to individuals. This trend is strong in the US, where market-focused, neoliberal economic and social policies dominate policies.

    By contrast, European research suggests stronger social welfare systems can reduce safety concerns by addressing underlying economic anxieties. Australia’s more robust social support appears to foster greater feelings of safety.

    Our research indicates social cohesion further helps reduce fear.

    Crime fears are not a vote winner

    Electoral strategies that seek to leverage public insecurities need to be understood in the context of these fear-mitigating factors. Media diversity can also counter fear-based messaging.

    In the 2018 Victorian election, crime became a prominent political issue through racialised commentary targeting “African gangs”. However, it failed to gain decisive political traction.

    Research found fear of crime was relatively rare in Victoria. Media reports of crime and comments by political leaders were distant from their own experiences

    With more diverse news sources and online platforms, political actors can no longer promote narratives unopposed. Fear-based messaging can backfire, especially when it overreaches.

    Outdated strategy

    Perceptions of crime are often shaped by a combination of actual crime rates and broader anxieties about social change, cultural difference, and uncertainty. This is frequently expressed as unease about the increasing presence of culturally diverse groups.

    While the coalition’s pivot to law-and-order rhetoric represented a familiar strategy, Labor positioned itself as the party of unity. This was underscored by Foreign Minister Penny Wong’s declaration after Labor won the election, in which she acknowledged

    […] the power in our 26 million people from more than 300 ancestries […] from the oldest continuing civilisation on the planet and I acknowledge the traditional owners. Friends, we love this country.

    Foreign Minister Penny Wong on election night.

    While harnessing fears of crime and cultural diversity was not effective in this election cycle, this is not the end of law and order politics. But the unique characteristics of this election appear to have rendered the formula less potent.

    Trump’s threat to democracy and the constitutional rule of law in the US may have fostered a sense of solidarity and social cohesion among Australian voters. Our research suggests this helped to mitigate fears about crime.

    The temptation to capitalise on law and order may continue to appeal to politicians. But in Australia, at least, there is no guarantee it will work.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    – ref. Playing the crime card: do law and order campaigns win votes in Australia? – https://theconversation.com/playing-the-crime-card-do-law-and-order-campaigns-win-votes-in-australia-256780

    MIL OSI Analysis – EveningReport.nz –

    May 22, 2025
  • MIL-OSI: Best Same Day Payday Loans for Quick Cash in 2025: MoneyMutual Picked as the Top Pick for Guaranteed Approval

    Source: GlobeNewswire (MIL-OSI)

    Las Vegas, NV, May 21, 2025 (GLOBE NEWSWIRE) —

    In today’s unpredictable economy, financial emergencies rarely come with a warning. A sudden car repair, medical bill, or missed paycheck can send even the most prepared households into a scramble. In such moments, speed isn’t just convenient, it’s essential.

    As Americans increasingly turn to fast, flexible lending options, the demand for same-day payday loans has surged. Just as we expect rapid food delivery and real-time updates, financial solutions must also keep pace. Consumers want cash in hand, not tomorrow, but today.

    Amid a crowded field of lenders and brokers, MoneyMutual has emerged as the leading online platform connecting borrowers with trusted same-day payday loan providers. Recognized for its efficiency, wide lender network, and secure process, MoneyMutual stands out as the top choice for those seeking fast financial relief in a pinch.

    Stay with us as we take a closer look at how MoneyMutual works and why it’s become the go-to resource for same-day lending solutions in 2025.

    >> Consider MoneyMutual for Same Payday Loans >>

    Overview of the Leading Same Day Payday Loan Connection Service – MoneyMutual

    When time is of the essence and financial relief can’t wait, MoneyMutual stands at the forefront of same-day payday loan connection services. With a reputation built on speed, simplicity, and trust, the platform offers a fast and accessible route for borrowers seeking immediate financial support.

    Speed of Potential Funding: One of MoneyMutual’s standout features is its ability to facilitate rapid access to funds, often as soon as the same business day. After submitting a short application, borrowers are swiftly connected with a lender from the platform’s expansive network. If approved, funds can be deposited directly into the applicant’s bank account within hours, depending on the lender’s processing times and bank policies.
    Extensive Lender Network: MoneyMutual doesn’t issue loans directly. Instead, it acts as a trusted intermediary, linking users to an array of verified online payday lenders. This expansive network increases the chances of loan approval by matching borrower needs with the criteria of various lending partners.

    >> Visit MoneyMutual to Find Out More >>

    Key Evaluation Factors

    To determine why MoneyMutual stands out among same-day payday loan connection services, several key factors were assessed, from lender quality to user experience.

    Quality and Size of Lender Network
    MoneyMutual partners with over 60 lenders, ranging from specialized payday providers to short-term installment loan companies. These are vetted for reliability and compliance, offering borrowers a better shot at finding a match tailored to their financial situation.

    Accessibility of Loan Options
    The platform supports a broad range of loan amounts, typically between $100 and $5,000, depending on individual lender terms and borrower qualifications. This flexibility accommodates everything from small emergencies to more urgent, moderate expenses.

    Potential for Rapid Funding
    Once connected with a lender, borrowers may receive funds as quickly as within 24 hours, and in some cases, the same day. This makes MoneyMutual a highly attractive option for those facing time-sensitive financial stressors.

    Platform Usability
    The MoneyMutual website is designed for ease and efficiency, featuring mobile compatibility and streamlined navigation. Borrowers can apply, review offers, and connect with lenders all within minutes.

    Simple Application Process
    Filling out MoneyMutual’s secure online form typically takes under five minutes. Applicants provide basic information about their income, employment status, and banking details. Once submitted, the platform immediately begins matching them with potential lenders.

    Features for Borrowers
    MoneyMutual allows users to compare loan offers from multiple lenders in one place. This increases transparency and empowers users to select the option that best meets their needs.

    Transparency of Lender Terms
    While MoneyMutual itself doesn’t dictate terms, it emphasizes partnerships with lenders that clearly disclose loan amounts, repayment dates, APRs, and fees, a crucial feature in helping borrowers make informed decisions.

    Ease of Navigation
    The website features a clean, modern interface with clear calls-to-action and informative content. Even first-time users will find it intuitive to use on desktop or mobile.

    Typical Loan Parameters
    Loan amounts facilitated through MoneyMutual generally range from $100 to $5,000, with repayment periods often between 14 and 30 days, depending on the lender and state regulations. Some lenders may offer extended terms for installment loans.

    >> Consider MoneyMutual for Same Payday Loans >>

    Pros and Cons of MoneyMutual for Same Day Payday Loans

    In a financial climate where speed often matters most, MoneyMutual has emerged as a go-to marketplace for borrowers seeking same day payday loans. But how does it really stack up? We take a closer look at the platform’s key advantages and potential drawbacks as more Americans turn to short-term lending for emergency expenses.

    Pros:

    • Potential for Fast Fund Access: Many users report receiving funds as soon as the next business day, sometimes even within hours, depending on the lender.
    • Large Network of Participating Lenders: MoneyMutual connects users with a broad pool of lenders, increasing the chances of finding a match, even with less-than-perfect credit.
    • Streamlined Online Application Process: The initial form takes just minutes to complete, making it ideal for time-sensitive borrowing needs.
    • User-Friendly Online Platform: The website is simple to navigate, guiding applicants from inquiry to lender match with minimal friction.
    • Opportunity to Compare Multiple Loan Offers: Users can review different offers and select terms that best align with their needs before committing.

    Cons:

    • MoneyMutual Is Not a Direct Lender: The platform acts as a facilitator, meaning users must evaluate and finalize terms with third-party lenders independently.
    • Loan Terms and Interest Rates Vary by Lender: APRs, repayment windows, and fees differ widely, and borrowers must scrutinize each offer carefully.
    • Payday Loans Typically Involve High Interest Rates and Fees: Even when fast cash is needed, these loans can become costly, especially if rolled over or extended.

    How to Utilize MoneyMutual for Potential Same Day Payday Loans

    As financial pressures grow for millions of Americans, platforms like MoneyMutual are seeing increased usage from borrowers in need of quick cash. Here’s how consumers can navigate the service to potentially access same day payday loans.

    Step-by-Step Process:

    • Visit the Official MoneyMutual Website: Begin by going to MoneyMutual.com, where users can start the loan inquiry process directly from the homepage.
    • Complete the Secure Online Application Form: Applicants are asked to enter basic personal and financial information. The form typically takes just a few minutes and is encrypted to protect sensitive data.
    • Review Loan Offers from Lenders in the Network: Once submitted, the system distributes the application to a network of participating payday lenders. Eligible borrowers may receive multiple offers to compare.
    • Examine Terms and Conditions Carefully Before Accepting: Each lender sets its own rates, fees, and repayment requirements. Experts caution that borrowers should read all terms closely and ensure they understand the total repayment cost before agreeing to any loan.

    With no obligation to accept an offer, MoneyMutual serves as a free intermediary rather than a direct lender. However, borrowers should be aware of state-specific payday loan regulations and consider all financial alternatives before proceeding.

    Types of Short-Term Financial Assistance Facilitated by MoneyMutual

    As rising costs and inflation strain household budgets, Americans are increasingly turning to alternative lending platforms for fast, flexible cash solutions. Among them, MoneyMutual has gained traction as a major online marketplace that connects borrowers with lenders offering a variety of short-term financial products. While the platform itself isn’t a direct lender, it facilitates access to multiple loan types tailored for immediate financial relief.

    Here’s a closer look at the key types of loans available through the MoneyMutual network:

    • Payday Loans: These are brief, high-cost loans intended to cover expenses until the borrower’s next paycheck. Loan amounts are typically small, often between $100 and $1,000, but carry high interest rates and fees. While controversial due to their cost, payday loans remain a common solution for those facing sudden emergencies like utility shutoff notices or medical expenses.
    • Short-Term Loans: This broader category includes installment loans and other forms of lending with short durations, usually ranging from a few weeks to several months. These loans may offer slightly more favorable repayment terms than traditional payday loans and can be used for a variety of needs, such as auto repairs, rent payments, or temporary income disruptions.
    • Bad Credit Loans: For borrowers with low credit scores or limited credit history, MoneyMutual helps facilitate access to lenders willing to work with higher-risk applicants. These loans come with elevated interest rates but offer a vital financial lifeline to consumers often excluded from traditional banking systems.
    • Cash Advances: Cash advances are designed for rapid disbursement, sometimes within 24 hours, and are ideal for extremely time-sensitive expenses. Typically repaid from the borrower’s next paycheck, these loans are often used to bridge the gap between pay periods or when an unexpected cost arises.

    While these financial products can offer short-term relief, experts caution they should be used carefully. Borrowers are urged to read loan terms closely, understand all associated fees, and assess whether repayment timelines align with their income schedule. Platforms like MoneyMutual may provide access, but financial responsibility lies squarely with the borrower.

    Customer Support and Resources Offered by MoneyMutual

    As more consumers turn to online lending marketplaces for fast financial relief, support and transparency have become increasingly important. MoneyMutual offers a basic but functional support system designed to guide users through the lending process.

    Unlike direct lenders, MoneyMutual serves as an intermediary, connecting users with its network of more than 60 short-term lenders. Because of this, its customer support doesn’t extend to loan management or repayment issues, which must be handled directly with the individual lender. However, the platform does provide users with access to key resources that help clarify how the loan matching process works.

    The company maintains a comprehensive FAQ section on its website, offering clear answers to common questions about eligibility, the loan request process, credit requirements, and fund disbursement. The site also outlines what borrowers can expect after being matched with a lender and encourages users to review terms carefully before signing any agreement.

    The platform doesn’t offer live chat or in-depth financial education tools, it emphasizes its role as a free service to connect borrowers with loan offers, placing the responsibility of further communication and decision-making on the user.

    Potential Disbursement Methods Through MoneyMutual’s Network

    As more consumers turn to online lending platforms for fast financial relief, how those funds are delivered becomes just as critical as loan approval itself. MoneyMutual, one of the most recognized payday loan marketplaces, connects borrowers with a wide range of lenders, each offering different methods of disbursing funds.

    • Direct Deposit to Bank Account: The most widely used and efficient method among lenders in the MoneyMutual network is direct deposit. Once approved, borrowers may receive funds directly into their checking account, often within 24 hours. For many facing urgent expenses, this speed and convenience are a significant advantage.
    • Other Methods (Varies by Lender): While direct deposit remains the standard, some lenders may offer alternative electronic disbursement options, such as ACH transfers or prepaid debit card funding. However, availability can vary by lender and borrower location, and these alternatives may affect how quickly funds are accessible.

    Borrowers using MoneyMutual should confirm disbursement methods and timelines directly with their matched lender to ensure there are no delays in accessing their funds.

    Navigating Same Day Payday Loans Responsibly: Important Cautions

    Same day payday loans can serve as a financial lifeline in moments of crisis, but they must be approached with caution. The high interest rates, short repayment terms, and risk of repeat borrowing make them a risky option for most consumers. 

    By understanding the costs, reading loan terms carefully, and seeking alternative financial solutions where possible, borrowers can protect themselves from unnecessary financial hardship. Responsible borrowing begins with informed decision-making, and when in doubt, seeking professional financial guidance is always a wise move.

    Understand the High Costs
    Same day payday loans may provide fast funds, but they are among the most expensive forms of borrowing available. These loans typically carry high interest rates, with annual percentage rates (APRs) that can reach or exceed 300%. 

    In many cases, the fees and interest owed may be nearly as much as the original loan amount. For example, borrowing $300 could cause repaying $375 or more in just two weeks. Without a clear repayment strategy, the costs can escalate quickly, especially if the borrower is forced to extend or roll over the loan.

    Review Loan Terms Carefully
    Payday loans are legally required to disclose all terms and fees, but borrowers often overlook the fine print. Each lender may have different repayment policies, fees for late or missed payments, or clauses that allow for automatic withdrawal from a borrower’s checking account. 

    Carefully reviewing these terms before accepting a loan is essential. Understanding the total repayment amount, due date, and what happens if repayment is delayed can help prevent surprises and avoid spiraling fees.

    Borrow Only What You Can Repay
    It may tempt you to borrow the maximum amount offered, especially when facing financial stress. However, payday loans are due in full within a short timeframe, usually on your next payday. Borrowing more than you can reasonably afford to repay can quickly result in bounced payments, overdraft fees, or the need to take out additional loans.

    A good rule of thumb is to borrow the minimum amount needed and ensure that full repayment can be made from your next paycheck without jeopardizing other essential expenses.

    Be Aware of Short Repayment Periods
    Unlike personal loans or credit cards that allow for flexible monthly payments, payday loans are typically due in a lump sum within 14 to 30 days. This compressed repayment window can strain already tight budgets.

    Missing the repayment deadline can trigger additional fees and result in a cycle of borrowing and debt accumulation. Many borrowers find themselves having to take out new payday loans just to cover the previous ones, further increasing financial stress.

    Consider Alternatives First
    Before committing to a payday loan, it’s worth exploring other, less expensive borrowing options. Credit unions often offer Payday Alternative Loans (PALs), which feature lower interest rates and longer repayment periods. Some banks provide small-dollar personal loans with predictable terms. 

    Other alternatives include negotiating payment plans with utility companies, seeking temporary hardship assistance from local nonprofits, or utilizing buy now, pay later services for specific purchases. These alternatives may not offer instant cash, but they typically come with fewer long-term risks and better repayment flexibility.

    Recognize the Risk of Debt Traps
    One of the most concerning aspects of payday loans is the potential for borrowers to fall into a debt trap. Many payday loan users find themselves unable to repay the full balance on time and must take out another loan to cover the previous one. This cycle of borrowing and repayment often continues for months, with fees compounding at every step. 

    Over time, a small loan can grow into a major debt burden, affecting a borrower’s ability to meet other financial obligations and damaging their overall financial stability.

    Seek Financial Advice if Needed
    For those considering payday loans or currently struggling with repayment, seeking help from a financial advisor or credit counselor can be a valuable step. Nonprofit credit counseling agencies offer free or low-cost services that include budgeting support, debt management plans, and guidance on safer borrowing options. 

    Some states and local governments also provide financial education programs to help consumers better understand loan terms and credit usage. Accessing these resources can provide long-term financial strategies that reduce reliance on high-cost, short-term loans.

    Frequently Asked Questions

    If you’re considering a same-day payday loan, it’s important to understand exactly how these loans work, what they cost, and what to expect from the process. Below are answers to the most common questions borrowers ask before applying.

    What Is a Same-Day Payday Loan?
    A same-day payday loan is a short-term, high-interest loan designed to give borrowers quick access to cash, usually on the same day they apply. These loans are used to cover urgent expenses such as medical bills, car repairs, or unexpected utility payments. The loan amount is usually small (often between $100 and $1,000) and must be repaid in full on your next payday, usually within two to four weeks.

    How Quickly Can I Get the Money?
    If approved, many lenders can deposit funds into your bank account within a few hours or by the end of the business day. However, actual timing depends on when you apply, the lender’s processing speed, and your bank’s deposit policies. Some lenders offer instant funding or same-day direct deposit if applications are submitted early in the day, while others may require overnight processing.

    Do I Need Good Credit to Get a Same-Day Payday Loan?
    No, same-day payday loans are generally accessible to borrowers with poor credit or no credit history at all. Most lenders don’t perform hard credit checks and instead focus on your income, employment status, and ability to repay the loan. Proof of a steady income, a valid ID, and an active checking account are typically the main requirements for approval.

    What Are the Costs Associated With Same-Day Payday Loans?
    Same-day payday loans can be very expensive. While the fees may seem modest upfront, the annual percentage rates (APRs) can reach 300% or more. For example, a $300 loan with a $45 fee for two weeks equates to a 391% APR. Failing to repay the loan on time can lead to additional fees, interest, and in some cases, collection activity. Always review the full cost of borrowing before committing.

    Can I Extend or Roll Over My Payday Loan If I Can’t Repay It on Time?
    Some lenders may offer extensions or rollovers, which allow you to delay repayment by paying an additional fee. However, this often leads to a cycle of debt, as the interest continues to accrue. Rolling over a loan once or multiple times can double or even triple your repayment obligation. If you’re struggling to repay, it’s best to contact the lender early and explore options, or seek help from a nonprofit credit counselor to avoid escalating costs.

    Editorial Note
    This article is provided solely for informational and entertainment purposes. Nothing within should be interpreted as legal, financial, or professional advice. Readers should carry out their own research before participating in payday loans.

    Affiliate Transparency
    This article may include affiliate links. If you click on a link and make a purchase or register, a commission may be earned, at no extra cost to you.

    Syndication and Liability Disclaimer
    Any third-party publishers, media platforms, or syndication partners that republish this content do so understanding that it’s meant for informational purposes only. These entities aren’t responsible for the legality, relevance, or interpretation of the material.

    Contact

    • Company: MoneyMutual
    • Address: 2510 E. Sunset Rd. Ste 6, #85 Las Vegas NV, 89120
    • Email: customerservice@moneymutual.com
    • Phone Support: 844-276-2063

    Attachment

    • MoneyMutual

    The MIL Network –

    May 22, 2025
  • MIL-OSI Security: Major strike against Italian-Albanian drug trafficking network: 52 suspects targeted

    Source: Eurojust

    During the action day, authorities in both countries seized assets worth at least several millions euros, including apartments and companies, as well as various luxury vehicles. . Large amounts of cash and quantities of cocaine and heroin were also seized. A full and complete evaluation of the seizures will be carried out in the coming days.

    No complete estimate of the total profits of the cooperation between the three OCGs is available. However, information obtained through the JIT shows that the criminal networks were involved in payments, often in cash, of close to EUR 5 million and the trafficking of at least 1 800 kilos of cocaine and heroin.

    Investigations into the linked criminal organisations were initiated in 2016 by the Public Prosecutor’s Office of Bari and the Special Anti-Corruption and Organised Crime Prosecutor’s Office of Tirana and the Albanian Police. On the Albanian side, one OCG, which operated from Durres, was responsible for the transport and wholesale distribution of large quantities of cocaine, heroin and cannabis trafficked between the Balkans, Northern Europe, South America and Puglia in Italy.

    Two Italian-led criminal gangs carried out the cutting and packaging of illicit drugs and supplied cocaine and heroin from Latin America and Turkey to local gangs in organisations in Bari, Brindisi and Lecce.

    The arrests in Italy and Albania are the result of a long-term collaboration through the JIT. This involved the use of wiretaps, intensive video surveillance, the monitoring of suspects and the analysis of encrypted chats. These chats were decrypted following intensive cooperation through Eurojust.

    Since 2020, Eurojust has supported the authorities in Italy and Albania with the JIT. Furthermore, the Agency provided assistance with the execution of requests for Mutual Legal Assistance during the action day and gave cross-border judicial support. Albania is one of the twelve countries outside the European Union with a Liaison Prosecutor at Eurojust. The investigations were also coordinated and supported by the office of the dedicated security expert at the Italian Embassy in Tirana.

    The judicial cooperation between Italy and Albania has already proven effective in recent years. Between 2018 and 2021, the Anti-Mafia Investigation Directorate of Bari issued and executed 118 arrest warrants against alleged drug traffickers operating in both countries. As a result, various defendants were sentenced up to 20 years imprisonment.

    This week’s operation was carried out at the request of and by the following authorities:

    • Italy: Public Prosecutor’s Office Bari – District Anti-Mafia Directorate; Anti-Mafia Investigation Directorate Bari, under the coordination of the National Anti-Mafia and Anti-Terrorism Directorate Rome, with support of the Office of the Security Expert at the Italian Embassy in Tirana
    • Albania: Special Anti-Corruption and Organised Crime Prosecutor’s Office (SPAK) of Tirana; Albanian Police

    MIL Security OSI –

    May 22, 2025
  • MIL-OSI Security: St. Augustine Felon Sentenced To More Than Four Years For Illegally Possessing And Selling Firearms

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    Jacksonville, Florida – U.S. District Judge Harvey Schlesinger has sentenced Alton Wayne Cope, III (64, St. Augustine) to four years and three months in federal prison for possessing a firearm as a convicted felon and conspiring to deal firearms without a license. Cope entered a guilty plea in October 2024.

    According to court documents, agents began investigating Cope and a co-conspirator when agents learned that Cope may have been illegally selling firearms. During the summer of 2024, agents conducted multiple controlled purchase operations during which they purchased 11 firearms from Cope and a co-conspirator. Throughout the investigation, agents learned that Braden Hobbs was the original purchaser of multiple firearms purchased from Cope and a co-conspirator. Cellphone records later showed that the co-conspirator regularly purchased firearms from Hobbs. Additionally, at least two of the firearms sold by Cope and a co-conspirator had previously been reported stolen. In August 2024, agents executed a federal search warrant at Cope’s residence. During the search, agents found an additional firearm in his bedroom.

    Although he engaged in the business of dealing firearms, Cope is not a federally licensed firearms dealer, as required by federal law. Additionally, Cope was previously convicted of multiple felonies, including two counts of possession of cocaine and possession of a firearm by a convicted felon. Therefore, he is prohibited from possessing firearms or ammunition under federal law.

    In related court proceedings, co-conspirator Braden Hobbs has been charged by indictment and is scheduled for trial later this year. If convicted, Hobbs faces a minimum sentence of 5 years, up to 95 years, in federal prison. An indictment is merely a formal charge that a defendant has committed one or more violations of federal criminal law, and every defendant is presumed innocent unless, and until, proven guilty.

    This case was investigated by the Bureau of Alcohol, Tobacco, Firearms and Explosives, the Internal Revenue Service – Criminal Investigation, the United States Secret Service, the North Florida HIDTA Tri-County Narcotics Task Force with the Florida Department of Law Enforcement, the St. Johns County Sheriff’s Office, and the Jacksonville Sheriff’s Office. It is being prosecuted by Assistant United States Attorney Elisibeth Adams.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    MIL Security OSI –

    May 22, 2025
  • MIL-OSI USA: Russian GRU Targeting Western Logistics Entities and Technology Companies

    News In Brief – Source: US Computer Emergency Readiness Team

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc. 

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions

    T1098.002 

    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication

    T1556.006 

    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    T1110.001 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    T1110.003 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    T1003.003 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    T1552.006 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    T1627.001 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    T1021.001 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    T1114.002 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    T1560.001 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    CVE-2023-38831 

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    CVE-2023-23397 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    CVE-2021-44026 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    CVE-2020-35730 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    CVE-2020-12641 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    D3-DNSDL 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    D3-JFAPA 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL OSI USA News -

    May 22, 2025
←Previous Page
1 … 139 140 141 142 143 … 474
Next Page→
NewzIntel.com

NewzIntel.com

MIL Open Source Intelligence

  • Blog
  • About
  • FAQs
  • Authors
  • Events
  • Shop
  • Patterns
  • Themes

Twenty Twenty-Five

Designed with WordPress