Category: housing

  • MIL-OSI USA: SBA Relief Still Available to Texas Small Businesses, Nonprofits and Residents Affected by May Storms

    Source: United States Small Business Administration

    SACRAMENTO, Calif. – The U.S. Small Business Administration (SBA) is reminding eligible small businesses, nonprofits, and residents in Texas of the Aug. 1 deadline to apply for low interest federal disaster loans to offset physical damage caused by the severe storm and straight-line winds beginning May 8.

    The disaster declaration covers the Texas counties of Brooks, Duval, Jim Wells, Kleberg, Live Oak, Nueces and San Patricio.

    Small businesses and nonprofits are eligible to apply for business physical disaster loans and may borrow up to $2 million to repair or replace disaster-damaged or destroyed real estate, machinery and equipment, inventory, and other business assets.

    Homeowners and renters are eligible to apply for home and personal property loans and may borrow up to $100,000 to replace or repair personal property, such as clothing, furniture, cars, and appliances. Homeowners may apply for up to $500,000 to replace or repair their primary residence.

    Applicants may also be eligible for a loan increase of up to 20% of their physical damage, as verified by the SBA, for mitigation purposes. Eligible mitigation improvements include strengthening structures to protect against high wind damage, upgrading to wind rated garage doors, and installing a safe room or storm shelter to help protect property and occupants from future damage.

    “One distinct advantage of SBA’s disaster loan program is the opportunity to fund upgrades reducing the risk of future storm damage,” said Chris Stallings, associate administrator of the Office of Disaster Recovery and Resilience at the SBA. “I encourage businesses and homeowners to work with contractors and mitigation professionals to improve their storm readiness while taking advantage of SBA’s physical damage loans.”

    SBA’s Economic Injury Disaster Loan (EIDL) program is available to eligible small businesses, small agricultural cooperatives, nurseries and private nonprofit (PNP) organizations impacted by financial losses directly related to this disaster. The SBA is unable to provide disaster loans to agricultural producers, farmers, or ranchers, except for aquaculture enterprises.

    Interest rates can be as low as 4% for small businesses, 3.62% for PNPs, and 2.81% for homeowners and renters with terms up to 30 years. Interest does not begin to accrue, and payments are not due until 12 months from the date of the first loan disbursement. The SBA sets loan amounts and terms, based on each applicant’s financial condition.

    To apply online, visit sba.gov/disaster. Applicants may also call SBA’s Customer Service Center at (800) 659-2955 or email disastercustomerservice@sba.gov for more information on SBA disaster assistance. For people who are deaf, hard of hearing, or have a speech disability, please dial 7-1-1 to access telecommunications relay services.

    The deadline to return physical damage applications is Aug. 1.

    ###

    About the U.S. Small Business Administration

    The U.S. Small Business Administration helps power the American dream of business ownership. As the only go-to resource and voice for small businesses backed by the strength of the federal government, the SBA empowers entrepreneurs and small business owners with the resources and support they need to start, grow, expand their businesses, or recover from a declared disaster. It delivers services through an extensive network of SBA field offices and partnerships with public and private organizations. To learn more, visit www.sba.gov.

    MIL OSI USA News

  • MIL-OSI USA: SBA Relief Still Available to New Mexico Private Nonprofits Affected by Severe Storm and Flooding

    Source: United States Small Business Administration

    SACRAMENTO, Calif. – The U.S. Small Business Administration (SBA) is reminding eligible private nonprofit (PNP) organizations in New Mexico of the Aug. 1, 2025 deadline to apply for low interest federal disaster loans to offset economic losses caused by the severe storm and flooding occurring Oct. 19-20, 2024.

    The disaster declaration covers the New Mexico county of Chaves.

    Under this declaration, SBA’s Economic Injury Disaster Loan (EIDL) program is available to PNPs providing non-critical services of a governmental nature who suffered financial losses directly related to the disaster. Examples of eligible non-critical PNPs include, but are not limited to, food kitchens, homeless shelters, museums, libraries, community centers, schools and colleges.

    EIDLs are available for working capital needs caused by the disaster and are available even if the PNP did not suffer any physical damage. The loans may be used to pay fixed debts, payroll, accounts payable and other bills not paid due to the disaster.

    “SBA loans help eligible small businesses and private nonprofits cover operating expenses after a disaster, which is crucial for their recovery,” said Chris Stallings, associate administrator of the Office of Disaster Recovery and Resilience at the SBA. “These loans not only help business owners get back on their feet but also play a key role in sustaining local economies in the aftermath of a disaster.”

    The loan amount can be up to $2 million with interest rates as low as 3.25% for PNPs with terms up to 30 years. Interest does not accrue, and payments are not due until 12 months from the date of the first loan disbursement. The SBA sets loan amounts and terms based on each applicant’s financial condition.

    The SBA encourages applicants to submit their loan applications promptly. Applications will be prioritized in the order they are received, and the SBA remains committed to processing them as efficiently as possible.

    Applicants may apply online and receive additional disaster assistance information at sba.gov/disaster. Applicants may also call SBA’s Customer Service Center at (800) 659-2955 or email disastercustomerservice@sba.gov for more information on SBA disaster assistance. For people who are deaf, hard of hearing, or have a speech disability, please dial 7-1-1 to access telecommunications relay services.

    Submit completed loan applications to the SBA no later than Aug. 1.

    ###

    About the U.S. Small Business Administration

    The U.S. Small Business Administration helps power the American dream of business ownership. As the only go-to resource and voice for small businesses backed by the strength of the federal government, the SBA empowers entrepreneurs and small business owners with the resources and support they need to start, grow, expand their businesses, or recover from a declared disaster. It delivers services through an extensive network of SBA field offices and partnerships with public and private organizations. To learn more, visit www.sba.gov.

    MIL OSI USA News

  • MIL-OSI USA: SBA Relief Still Available to New Mexico Private Nonprofits Affected by Severe Storm and Flooding

    Source: United States Small Business Administration

    SACRAMENTO, Calif. – The U.S. Small Business Administration (SBA) is reminding eligible private nonprofit (PNP) organizations in New Mexico of the Aug. 1, 2025 deadline to apply for low interest federal disaster loans to offset economic losses caused by the severe storm and flooding occurring Oct. 19-20, 2024.

    The disaster declaration covers the New Mexico county of Chaves.

    Under this declaration, SBA’s Economic Injury Disaster Loan (EIDL) program is available to PNPs providing non-critical services of a governmental nature who suffered financial losses directly related to the disaster. Examples of eligible non-critical PNPs include, but are not limited to, food kitchens, homeless shelters, museums, libraries, community centers, schools and colleges.

    EIDLs are available for working capital needs caused by the disaster and are available even if the PNP did not suffer any physical damage. The loans may be used to pay fixed debts, payroll, accounts payable and other bills not paid due to the disaster.

    “SBA loans help eligible small businesses and private nonprofits cover operating expenses after a disaster, which is crucial for their recovery,” said Chris Stallings, associate administrator of the Office of Disaster Recovery and Resilience at the SBA. “These loans not only help business owners get back on their feet but also play a key role in sustaining local economies in the aftermath of a disaster.”

    The loan amount can be up to $2 million with interest rates as low as 3.25% for PNPs with terms up to 30 years. Interest does not accrue, and payments are not due until 12 months from the date of the first loan disbursement. The SBA sets loan amounts and terms based on each applicant’s financial condition.

    The SBA encourages applicants to submit their loan applications promptly. Applications will be prioritized in the order they are received, and the SBA remains committed to processing them as efficiently as possible.

    Applicants may apply online and receive additional disaster assistance information at sba.gov/disaster. Applicants may also call SBA’s Customer Service Center at (800) 659-2955 or email disastercustomerservice@sba.gov for more information on SBA disaster assistance. For people who are deaf, hard of hearing, or have a speech disability, please dial 7-1-1 to access telecommunications relay services.

    Submit completed loan applications to the SBA no later than Aug. 1.

    ###

    About the U.S. Small Business Administration

    The U.S. Small Business Administration helps power the American dream of business ownership. As the only go-to resource and voice for small businesses backed by the strength of the federal government, the SBA empowers entrepreneurs and small business owners with the resources and support they need to start, grow, expand their businesses, or recover from a declared disaster. It delivers services through an extensive network of SBA field offices and partnerships with public and private organizations. To learn more, visit www.sba.gov.

    MIL OSI USA News

  • MIL-OSI USA: SBA Relief Still Available to Cheyenne River Sioux Tribe Private Nonprofits Affected by July Storms

    Source: United States Small Business Administration

    SACRAMENTO, Calif. – The U.S. Small Business Administration (SBA) is reminding eligible private nonprofit (PNP) organizations in the Cheyenne River Sioux Tribe of the Aug. 1, 2025 deadline to apply for low interest federal disaster loans to offset economic losses caused by the severe storm, straight-line winds and flooding occurring July 13-14, 2024.

    Under this declaration, SBA’s Economic Injury Disaster Loan (EIDL) program is available to PNPs providing non-critical services of a governmental nature who suffered financial losses directly related to the disaster. Examples of eligible non-critical PNPs include, but are not limited to, food kitchens, homeless shelters, museums, libraries, community centers, schools and colleges.

    EIDLs are available for working capital needs caused by the disaster and are available even if the PNP did not suffer any physical damage. The loans may be used to pay fixed debts, payroll, accounts payable and other bills not paid due to the disaster.

    “SBA loans help eligible small businesses and private nonprofits cover operating expenses after a disaster, which is crucial for their recovery,” said Chris Stallings, associate administrator of the Office of Disaster Recovery and Resilience at the SBA. “These loans not only help business owners get back on their feet but also play a key role in sustaining local economies in the aftermath of a disaster.”

    The loan amount can be up to $2 million with interest rates as low as 3.25% and terms up to 30 years. Interest does not accrue, and payments are not due until 12 months from the date of the first loan disbursement. The SBA sets loan amounts and terms based on each applicant’s financial condition.

    The SBA encourages applicants to submit their loan applications promptly. Applications will be prioritized in the order they are received, and the SBA remains committed to processing them as efficiently as possible.

    Applicants may apply online and receive additional disaster assistance information at sba.gov/disaster. Applicants may also call SBA’s Customer Service Center at (800) 659-2955 or email disastercustomerservice@sba.gov for more information on SBA disaster assistance. For people who are deaf, hard of hearing, or have a speech disability, please dial 7-1-1 to access telecommunications relay services.

    Submit completed loan applications to the SBA no later than Aug. 1.

    ###

    About the U.S. Small Business Administration

    The U.S. Small Business Administration helps power the American dream of business ownership. As the only go-to resource and voice for small businesses backed by the strength of the federal government, the SBA empowers entrepreneurs and small business owners with the resources and support they need to start, grow, expand their businesses, or recover from a declared disaster. It delivers services through an extensive network of SBA field offices and partnerships with public and private organizations. To learn more, visit www.sba.gov.

    MIL OSI USA News

  • MIL-OSI USA: SBA Relief Still Available to Cheyenne River Sioux Tribe Private Nonprofits Affected by July Storms

    Source: United States Small Business Administration

    SACRAMENTO, Calif. – The U.S. Small Business Administration (SBA) is reminding eligible private nonprofit (PNP) organizations in the Cheyenne River Sioux Tribe of the Aug. 1, 2025 deadline to apply for low interest federal disaster loans to offset economic losses caused by the severe storm, straight-line winds and flooding occurring July 13-14, 2024.

    Under this declaration, SBA’s Economic Injury Disaster Loan (EIDL) program is available to PNPs providing non-critical services of a governmental nature who suffered financial losses directly related to the disaster. Examples of eligible non-critical PNPs include, but are not limited to, food kitchens, homeless shelters, museums, libraries, community centers, schools and colleges.

    EIDLs are available for working capital needs caused by the disaster and are available even if the PNP did not suffer any physical damage. The loans may be used to pay fixed debts, payroll, accounts payable and other bills not paid due to the disaster.

    “SBA loans help eligible small businesses and private nonprofits cover operating expenses after a disaster, which is crucial for their recovery,” said Chris Stallings, associate administrator of the Office of Disaster Recovery and Resilience at the SBA. “These loans not only help business owners get back on their feet but also play a key role in sustaining local economies in the aftermath of a disaster.”

    The loan amount can be up to $2 million with interest rates as low as 3.25% and terms up to 30 years. Interest does not accrue, and payments are not due until 12 months from the date of the first loan disbursement. The SBA sets loan amounts and terms based on each applicant’s financial condition.

    The SBA encourages applicants to submit their loan applications promptly. Applications will be prioritized in the order they are received, and the SBA remains committed to processing them as efficiently as possible.

    Applicants may apply online and receive additional disaster assistance information at sba.gov/disaster. Applicants may also call SBA’s Customer Service Center at (800) 659-2955 or email disastercustomerservice@sba.gov for more information on SBA disaster assistance. For people who are deaf, hard of hearing, or have a speech disability, please dial 7-1-1 to access telecommunications relay services.

    Submit completed loan applications to the SBA no later than Aug. 1.

    ###

    About the U.S. Small Business Administration

    The U.S. Small Business Administration helps power the American dream of business ownership. As the only go-to resource and voice for small businesses backed by the strength of the federal government, the SBA empowers entrepreneurs and small business owners with the resources and support they need to start, grow, expand their businesses, or recover from a declared disaster. It delivers services through an extensive network of SBA field offices and partnerships with public and private organizations. To learn more, visit www.sba.gov.

    MIL OSI USA News

  • MIL-OSI Economics: Podcast: Microsoft EVP Rajesh Jha on leading with courage in the AI era

    Source: Microsoft

    Headline: Podcast: Microsoft EVP Rajesh Jha on leading with courage in the AI era

    MOLLY WOOD: That was Rajesh Jha, Microsoft’s Executive Vice President for Experiences and Devices. As a key figure at the helm of Microsoft’s product innovation, he leads a team of tens of thousands of people around the world who have worked to integrate AI into Windows and tools like Microsoft 365, Teams, and more. He’s also a key member of the company’s senior leadership team, which works directly for Microsoft Chairman and CEO Satya Nadella. In this episode, Jha shares his perspective on navigating the complexities of how AI is changing the way we work, and he offers actionable advice on how leaders have to adapt, compete, and bring their people along with them. And now my conversation with Rajesh. Rajesh, thank you so much for being on WorkLab today.  

    RAJESH JHA: Thank you, Molly, for hosting me. It’s a real pleasure to be here with you.  

    MOLLY WOOD: You have more than 30,000 employees, and you run a $100 billion business, which is more than most CEOs do. What are just some of the many lessons I’m sure you have learned from running such a huge organization? 

    RAJESH JHA: It’s been a real privilege to be at Microsoft through so many of the growth years. When I reflect back on my career, there are a few things that are enduring. The mission matters because through the ups and downs, if you have a sense of purpose, you have a North Star, that really does matter. And Microsoft has been really great to always be grounded in our customer successes, our success—this theme of empowerment, from Bill into Steve into Satya. So that was definitely number one. The second thing that I would say is, it seems very trite, but it has really worked for me specifically and my team, is, whenever we are looking at a hard strategic call, we start from, how would the customer react to the decision that we’re making, that has been incredibly grounding, so that’s been enduring. Of course, the team matters, the culture matters, because that’s where the work gets done. And then finally, managing a large business is about, literally, about figuring out how to make elephants dance, because you have a large-scale business, customers expect us to have a certain level of quality and continuity and predictability. At the same time, they take a bet on us to innovate. And so how do you stay nimble and innovate while also being predictable and trustworthy for customers? That is a hard thing to go do, but absolutely essential. It’s an and, it just can’t be an or.  

    MOLLY WOOD: Well, and Microsoft is an elephant that has danced, quite nimbly, for the last 50 years— 

    RAJESH JHA: Sometime clumsily, sometimes nimbly, yes. [laughter]  

    MOLLY WOOD: We’ll focus on the nimble—or not, right, based on your experience in bringing new technologies to market and helping to effectuate some pretty major technological innovations. What insights do you have for leaders who are now navigating this AI transformation?  

    RAJESH JHA: I mean, now is the time for leaders to really consider how their businesses, how their teams, how their skill set—how does that evolve in a world where we are looking at, you know, something at the peer of electricity coming into society, or the internet coming into society. And so it’s time to lean forward, and lean forward in a way that makes sense for their businesses or their business process. It is such a big change that it’s going to probably take a decade to play out, but there is no avoiding the sea change that’s underway now. So some bravery, but bravery on customers’ terms. 

    MOLLY WOOD: Yeah. I’m thinking of leaders who may be wary, who may need a dose of that courage. You’ve spoken about being asked by Steve Ballmer to bring Office to cloud, as one example of a transformation that maybe you were a little wary about. Can you walk us through that experience and how it might give a shot of courage for folks today. 

    RAJESH JHA: This was, you know, back maybe 15 years ago, Microsoft was incredibly profitable and the cloud was a question mark for many at Microsoft. A) would this technology be mature enough? B) is the business model, because the margins were going to be lower on the cloud than our old business model of being on premises. Number three, would we be able to transform fast enough? Because Microsoft had grown up being a server company, a client company, and would we be able to transcend that to be about cloud and mobile. And they were all very important questions. And there was a lot of, you know, let’s hold back. Let’s see if this trend is really real or not. And Steve showed incredible courage by going all in. What Steve did was he gave license to people to go and learn, even if we were not perfect on day one. And so the big lesson for me in how Steve started that journey was, leaders, if you have hesitation, whether it’s a business model hesitation or cultural hesitation, skill hesitation, it’s very hard for the teams to rally behind something where the leader themselves are half-hearted. So that was a very big moment for us, because he was unambiguous about, hey, this is the way that software is going to be delivered in the future. This is the way we can democratize the value we bring to customers. And there were a lot of benefits, and we are just going to go all in.  

    MOLLY WOOD: So leaders have to go all in. But I would imagine it’s not a—progress is not always a straight line. 

    RAJESH JHA: No, it wasn’t. And even with us in the cloud, it wasn’t. But the main thing is, leaders have to lead. And when you’re taking a look, the hard things are process, business model change, culture change, skill change. They’re all incredibly hard, and that’s why there has to be a commitment from the top that we are going to see this through. And then we were eyes wide open as what our deficiencies were. And so we didn’t have the right skill set. We trained people, we brought in new people, we embraced the red—all the things that we were not doing well in this new transformation. We were very open, very honest. It just takes leadership to set the tone here and to set the things in motion. 

    MOLLY WOOD: Right, and to your point, persistence and belief that it is the right direction so that you stay on that road even when it gets hard.  

    RAJESH JHA: That is correct, Molly, absolutely. And then one additional point I would make with persistence and belief is, it’s one thing to say it, it’s another thing to allocate resources to that belief. We have a quote, which is, if you really want to see the strategy of an organization, you’ve got to see where they’re allocating resources.  

    MOLLY WOOD: On the one hand, it sounds like you’re saying, get comfortable with chaos—  

    RAJESH JHA: Controlled chaos, Molly. Controlled chaos.   

    MOLLY WOOD: Then of course there’s the question of how not to break things. You know, security becomes a big concern with incorporating AI, doing it in a way that doesn’t introduce more problems. What is your advice for having proper guardrails in place as you transform in the AI age?  

    RAJESH JHA: So, I’m gonna answer that in two parts. Part one is, what do I mean by controlled chaos? So Satya invited Scott Guthrie, myself, Charlie [Bell] as the three big product leaders at Microsoft to go over to Bill’s house to see GPT-4, and Satya’s exact comment to me at that time was, I’ve gotta get you guys to be believers. And he had already seen it. And so he and Kevin Scott, they were already on board about the capabilities. So anyway, we go over to Bill’s house, it was in the kitchen area, where the OpenAI folks had put in a demo and they had a grader who grades AP biology there. The thing that really got me was it was not just the multiple choice questions that the model was doing a great job of, it was doing a great job on the written answers. There was some of the AP biology stuff, I’ve studied some biology, but they were far above my ability to understand. And so I look at all of that, I’m completely blown away. But then, for me, the big moment was when Bill asked the question, what would you say to the parent of a sick child, and the empathy or the humanity, almost, that it was able to convey in the answer was like, I would’ve felt proud to have written such a thoughtful note. And I was like, god, this is really, I mean, we are leaving behind the low-altitude handshake between computing and humanity. We are taking a look at something that can be almost at the pure level. And so now, fast-forward, it’s not that long, two years, and we are at the point where we are talking about agents and digital labor and people working together. 

    MOLLY WOOD: But that was it, that worked. You became believers. 

    RAJESH JHA: For me, that was it. I lead a large organization, and I see lots of cool stuff all the time, and part of my job is to make sure the trains keep running on time, but make sure I’m open-minded about big things. And when big things show up, I try to scope it and manage it. I have never in my 30 years ever gone to my team and said, drop all your plans. And for me, that was it. None of the existing plans matter anymore. I huddled all my senior leaders, and I said, Folks, I want you all to run a hundred miles an hour. It’s going to be very uncomfortable, because we’re going to unleash some amount of chaos, but let’s make sure we harden our processes that this chaos does not make its way to customers. So what I mean by controlled chaos is, if you’re unleashing a lot of activity all at once, you need to have the mitigating controls and the guardrails to make sure the chaos is controlled and managed. And so we huddled together to make sure our processes were hardened. So that’s one of the things with controlled chaos. But one of the guardrails that is not negotiable is security, as you correctly pointed out. So in our implementation of AI, we started very much from the mindset of, how does the AI inherit all the existing security and governance controls that an organization already has? It’s one thing to come and tell them, hey, rethink all your business process, rethink your scaling, rethink how work is done, and rethink your security and governance. It’s just not doable. And so we architected this from the ground up, that, for example, when you use Microsoft Copilot, it is using your permissions, so it only has access to what you have access to. It can never do any more than what you might do as a human. And then we also made sure that it was the mindset of a copilot, not an autopilot, and so the humans were always in control. So this way, whatever governance, data classification, permissions, you know, conditional access, retention policies—whatever a customer had, and how they managed human-to-human conversations, all of that accreted to human-to-AI conversation. That was a very hard guardrail we knew we just could not compromise.  

    MOLLY WOOD: But I want to go back to the example that you just gave, this moment of having this experience and realizing how— 

    RAJESH JHA: Profound. 

    MOLLY WOOD: Profound—exactly—and sophisticated these models were, because those are the kind of moments that give you the faith to go all in. 

    Rajesh Jha: Just to go back to that moment, Molly, I mean, to think as an engineer, as somebody who’s been in the tech industry a long time, who’s been through so many of the transformations, the big takeaway for me was, you know, for the first time computing, so far, human and machine interaction has been very much—machines are very low level. You know, we interact with pixels, we click on things, we read stuff. When I come in to work, I don’t come in to work thinking, oh, I should do 16 minutes of email and then read four documents and then, you know, open that spreadsheet, take a look at that budget. I come in thinking, I’ve got to work on budget today. So I think at a high level of intent, but then my intent to decompose is, either on my device, on a bunch of icons I’m swiping through, flipping from application to application, or going really low level—reading emails and then clicking a link. And so high-level intent gets reduced to low-level clerical work, almost. So when I saw this demo, I was like, Wow, the interaction is going to change. It is not going to be intent and then reduced to low-level stuff. AI is going to have the capability to have a human-to-human-like conversation. So intent, high-level intent to high-level intent, and that was what was the big takeaway for me. This is the computing for the last 35 years. One thing that hadn’t changed was a fundamental interaction pattern between people and their devices, and that was going to change, because now you could express, hey, I want to write a document that has the following three ideas, take a look at the relevant stuff in my enterprise and on the web—and can you compose a report for me? That is the kind of thing that I would tell another human being if there was a new hire in my team and, you know, I was thinking about a project to give them. This is the kind of way I might express the project to them, and then they will go in and do the work, check in with me, and we go back and forth. Now that was going to be possible.  

    MOLLY WOOD: Let’s keep talking about that idea of leveling up. We now live in a world where I may get an email from your account and I may not know if it was written by you or an AI, and that may not matter.  

    RAJESH JHA: You know, in some ways, it’s not that different from what happens for some of us. Let’s say I was to send a large piece of email to my team. I would actually work with my staff and my leadership team to get the latest status on a few things, and then I would put it in my words, and I would send it out. Now, everybody has that ability, because what the copilot does, you know, if I’m responding to a customer today, I go to my engineer who’s working on the customer issues, and say, hey, what is the latest status on this? And I would take a look at some of the other past conversations. I would try and respond to the customer that way. Now the copilot is doing that for me. It’s taking a look at my past emails. It reaches out to the customer service database. It tells me the latest status on this. It creates me a draft that I then go write and I send it out. And in some ways, I get reminded of, my dad used to run a large steel plant in India, and I visited him about 20 years ago. I walked into his office and he was very proud, because they had just gotten email, and I was working at Microsoft, and he had just gotten email. His secretary walked in at that time, and she said, Mr. Jha, I’ve got your morning messages for you, and here’s a message that I’m just going to go reach out to your technical assistant or respond to this person. This one, I know what to do already. This one, what would you like me to tell the customer, this person’s asking for dinner tomorrow. You’re free. And they were done in 15 minutes, and she left. And I looked at my dad, and I said, god, you’re so old-fashioned. Somebody’s actually printing your email, reading and coming and talking to you about it, whereas, look at me, I’m carrying it on my phone. I can get to it anywhere. But now, you know, I understand he was a smart guy, and I’m a digital clerk. I do all the clerical work myself. You know, I’m sorting messages. I’m replying to staff. I don’t come in to work thinking I should be a digital clerk. I come in to work because I want to lead a team, build products and value. That is what AI is now going to do. It’s going to take the clerical part for all of us, and will automate a lot of clerical parts to let the human ingenuity and the creativity and really let us focus on the intent and the meaning of our work.  

    MOLLY WOOD: We need help, Rajesh. We need help. [laughter] Well, speaking of delivering that help to customers, it’s been about a year, year and a half, since Microsoft 365 Copilot launched. Do you have stories from the trenches? Are there fun examples you can share about how this has gone?  

    RAJESH JHA: Really well. Ever since I came to Microsoft, this is the fastest adoption we’ve seen. When a customer buys a license and gives it to an end user, because the copilot is integrated into your user flows in Office, or Teams in a meeting, or so on and so forth, we see very good uptake in usage and retention. Some things that surprised me a little bit—and in hindsight, perhaps not so surprising—is the amount of customizations that customers do want for AI. I have feedback from some customers saying, hey, your AI, I want it to engage more because, you know, we build safety into our AI so it will not engage on some topics. Some customers want it to engage more, some want it to engage less. So they want to customize that. One of the things that some customers ask for is, hey, I would like your AI to not reach out to the web. I only want it to work with the stuff that’s in my enterprise. And I say, yeah, we’ve got that configuration for you. But can I ask you why? If you allow your employees to be able to use the browser and search the web as a part of their job, why is it not okay for the copilot that’s acting on their behalf to reach out on the web and assist them? So I’m surprised with the amount of configuration that enterprises want, which is, of course, enterprises have different business rules and process, so we built many more customizations in M365 Copilot than I had anticipated coming in. 

    MOLLY WOOD: I read some research recently where one of the AI firms said that they had done some analysis and found themselves really surprised at how long the long tail of interactions with AI are.  

    RAJESH JHA: So true. This generation of AI is about information work. It changes how people write, learn, collaborate, read, and so there’s a long tail. Not all of us triage information the same way.  

    MOLLY WOOD: What are some best practices that are starting to emerge? Because certainly every enterprise is going to adopt differently, interact differently, and then have different use cases that may or may not make their experience work.  

    RAJESH JHA: That’s a great question. I would say the successful implementations that we see are the first stage, of course, is to enable people to get productivity boosts with the AI, where the AI is really assisting you. And then the next most important thing that customers end up doing that gives them a real return on investment is to rethink their high-value business process or high-cost business processes, and figure out how to reconfigure that with agents that can automate a bunch of those processes to be either more effective or more efficient. That, I think, is changing the way work happens. For example, if you’re a lawyer and you’re working with a bunch of documents, instead of having—somebody spent a lot of time going through the past relevant briefs and composing a new template. How do you change a new brief creation? How do you change an approval process? How do you change a customer support ticket handling? How do you change a marketing campaign? How do you change a developer workflow? I see customers actually taking a business process, and they are rewiring that for a world where people and AI can work together to automate that, to make it more effective, more efficient. So that is a good best practice, is not trying to solve a hundred business processes, but taking a few and going really deep and measuring the ROI and tweaking that, because then the payoff is right there. 

    MOLLY WOOD: Well, and to dig in a little further, it also sounds like what you’re saying is that companies and CIOs maybe need to commit. Like, if you don’t commit, if you don’t plug Copilot in, if you don’t enable the full Microsoft Graph, if you maybe don’t give access to the web, people are still going to find these tools and use some version of them that might not be as good as they could be if you really do go all in. 

    RAJESH JHA: Yeah, Molly, it’s exactly right. I mean, it goes back to the point we made, which is, leaders, have, you know, leaders have to lead. And the reason why they have to lead here in this transformation is, if a support organization, a marketing organization, engineering organization is wired to work the old way, they are not automatically going to rewire themselves for a world where AI can do a bunch of tasks and people’s tasks change. That’s not going to happen, bottom-up. It’s going to have to happen from the leaders leaning in and saying, okay, you know, am I sure that I have the right compliance and governance and security? Because those are non-negotiable. But once I have that, how do I lead the way where I empower and I get to a world where AI assisting, to agents and people working together? One of the concepts we’ve talked about, and it’s come out in the new Work Trend Index is, corporations, for the longest time, have had static org charts, and every once in a while you do a reorganization and you reconfigure teams for your new evolving business priorities. But those things are not very frequent, nor should they be very frequent, because there’s a huge lag to those things. The way work happens is people, it’s, teams are less static and they’re more outcome-driven. Some of this started to happen post-COVID also, where the fluidity of the team composition was not represented in the org chart. That thing is going to accelerate far more in a world where digital labor and people, agents and people, are going to work together as business processes get rewired. None of this is going to be possible without leaders committing to that. And the way you can commit to it is by taking a few processes that are incredibly important for your business’ top line or your profitability because it’s a high-cost thing, and trying to figure out how to reconfigure those things for people and agents working together in one team. 

    MOLLY WOOD: What do you wish business leaders understood about AI agents to help them make that commitment? 

    RAJESH JHA: The first thing I would just say is, like, it’s not some distant future, it’s happening now. My product management team, they ran a research today of a bunch of different organizations, and this time, you know, usually we talk to 30,000 people across different organizations, 30 different countries. This time, they also reached out to AI-native companies that have started to emerge, so-called frontier companies. And if you take a look at the frontier companies, it is very obvious that the way the distribution of human work and digital labor, how that gets constituted, there’s very interesting patterns that are starting to emerge. The first thing I would just tell leaders is—of established companies such as myself, my peers, and the rest of large organizations—it’s possible today to take full advantage of agents. The security model exists, the identity model exists, the user interface exists. The hard work here is to actually go pick the processes that give you the most bang for the buck and then be rigorous about measuring that. And this is why we invested in something called the Copilot Impact Dashboard, so customers can take their core KPIs and they can measure how the copilot is moving those KPIs. So be rigorous, but be forward-looking. It’s not, hey, let’s just take a leap of faith and let’s get agents everywhere. Be rigorous with security. Be rigorous with governance. Measure the ROI, but pick the processes that you’re going to go add agents to. 

    MOLLY WOOD: It seems like the other tension, in addition to going all in, right, in addition to commitment, is pace, the pace of introducing that change, going fast to keep up to, you know, be pushed properly by Frontier Firms, but not compromising security and guardrails. 

    RAJESH JHA: And so on the pace, it’s a super good tension that you pick up on, and we deal with the tension all the time ourselves at Microsoft. What is hard is to have pace at scale. But what’s not hard is to have pace at smaller scale. I’m not advocating for a large organization to go and say, go rewire all your business process, fast, into the frontier methodology. I’m saying, pick a few that are really important to you and go with base on those, learn from that. Meanwhile, invest in skilling. Meanwhile, invest in assistance for everybody else. And that’s what we do, too, in my team. We want to move very quickly, but we move very quickly in a scoped garden with a few processes, a few customers, and then once we are sure it is mature and it’s ready, do we then scale it out. So, moving fast doesn’t mean move fast all over, all at once, if you’re a large organization. It means you’re moving fast by having picked and assessed. And, you know, which way do you want to go fast and where do you want to go more cautiously, and then take the lessons from moving fast and more broadly. 

    MOLLY WOOD: Right. It’s so valuable to put a fine point on that, because any problem is manageable in component parts. 

    RAJESH JHA: Hundred percent. Hundred percent. And picking is the important thing. But if you pick something unimportant that you’re moving fast on, you’re not really learning a lot either. 

    MOLLY WOOD: Right. Then the other tension, the technology itself is moving really fast, so you might have incorporated something, you’re doing a great job measuring it, and now there’s a whole new tool. How do you advise business leaders to keep up?  

    RAJESH JHA: The playbook is still the same. You have to figure out how to move fast and stay predictable at the same time. And the way you do that is by managing where you move fast and by having rigorous measures of whether the ROI is working out or not. Because you’re a hundred percent right. I mean, the compression of innovation that I’m seeing in the AI wave is like nothing that we’ve seen before in the last 30 years. 

    MOLLY WOOD: So as we talk about committing, you know, it’s one thing to say, maybe give your model access to the web, but there’s this Microsoft Graph that it seems like really unlocks that power. 

    RAJESH JHA: The Microsoft Graph is really not Microsoft’s graph. It is a graph for the customer. It’s owned by the customer. And what it captures is how people inside of their organization work together—the meetings that are important, the documents that have been created, the chats and the projects that people are working on—the business processes that run in their organization, that is all a part of the Microsoft Graph. So you take the power of a reasoning model that now has access to the graph—remember again, the reasoning model has access to the same things that you would as an individual. So when I ask a reasoning model or an agent to work on my behalf on Microsoft Graph, it is working with my permissions. But now it has the ability to read far more, process far more than I would be able to. You take the unique intellectual property of the customer in the graph with all the right permissions overlaid, and then you let AI work on that, along with what’s available in the web, on the world knowledge, your enterprise knowledge—that is the real enabler. So what is great about the researcher in Microsoft 365 Copilot is that it works with your enterprise permissions and your enterprise data, everything that is in the graph. And that is what I think is a real breakthrough. Now you’ve got the makings of a digital employee, somebody who was able to come in, join an organization, and take advantage of all the intellectual property with all the permissioning honored, and take that and be a part of producing output for the company.  

    MOLLY WOOD: Right. I mean, it’s institutional knowledge, like, think about what a great employee I could be if I knew all the context and all the history that a company had gone through. 

    RAJESH JHA: Exactly. And all the relevant, you know, escalations, projects, all of that stuff. 

    MOLLY WOOD: Switching gears a little. You work very closely with Microsoft CEO Satya Nadella. Are there questions that he regularly asks you that you think all leaders should be asking their employees? 

    RAJESH JHA: I think fundamentally my boss, you know, Satya, I mean, he’s pushing me on exactly the set of questions you were asking, on my own organization. The way he describes the priorities that I have and my peer groups have, three priorities—quality, security, and AI transformation, are you moving fast? Fully understanding that quality and security and then moving fast, sometimes are intentions, but that’s what he’s saying. Are you doing your job to do all of these at the same time? A lot of the thrust of his conversations, questions are, are you evolving your own team to be frontier, and what’s getting in your way? Because whatever we learn then applies to our customers. So are we applying the same methodology to make your enterprise-grade securities non-negotiable. And then at the same time, are you moving fast to take full advantage? Are you really rethinking your production functions? So I would say all of his questions and interactions distill into these three things, and are we doing a good job balancing these three things.  

    MOLLY WOOD: This company has reinvented itself many times. What are the key lessons that we and all business leaders should take from those reinventions? 

    RAJESH JHA: I would say again, mission matters. Through those 50 years, our mission is a theme around empowerment, so number one. Number two, I would say is, team culture matters, of course, because the how and where the work—there’s no substitute for that. But then I would say you gotta do the and, it’s never an or. How do you stay scaled and perform while waiting and disrupting at the same time? That comes down to strong leadership, it comes down to good processes. Then, what you touched on that I want to reiterate is, you know, just resiliency. We didn’t get everything right in the last 50 years. We made mistakes, but being resilient, learning from the mistakes, embracing the red so we can do a better job the next time. I think those are all components that I would just say we benefited from having incredible CEOs from Bill and Steve and Satya, so that has been an amazing, you know, learning experience for me and many others to work with those three amazing individuals.  

    MOLLY WOOD: If our listeners could take away one actionable AI-related insight from you, what would it be? 

    RAJESH JHA: I would say, go embrace agents. Pick out your most important processes, reimagine them how agents and digital labor can rewire that. 

    MOLLY WOOD: We love to ask our WorkLab guests how they are using AI themselves, either at work or in your personal life. Are there use cases that have been really helpful for you that you’re willing to talk about? 

    RAJESH JHA: Yeah, the one thing we didn’t talk about that I feel is just mind-blowing, is this reasoning models. You know, today, Molly, you and I going back and forth, then you ask me a hard question, I’ll give you an answer off the cuff. But if you tell me, Rajesh, go think about it and come back to me. And, you know, I have a set of tools available to me and I come back to you, I’m going to give you a much better answer. And so with the reasoning model, that’s what’s happening. We are now letting the AI actually go reason over stuff, give it more time, more compute, and more tools. And so for me, the real breakthrough was every quarter I sit down with my leadership team to take a look at our plans for the next six months. So I ran the researcher model. The researcher model is a deep reasoning model in M365 Copilot that works with the graph and the web, and I asked it, hey, I’m about to have an off-site with my leadership team to take a look at the plans for the next six months, take a look at the competitive landscape, take a look at customer feedback, take a look at all the ideas that have been accumulating in the team, and try and give me a draft of what might be a good starting point for our off-site for the next six-month planning. It was incredible. It was able to get through my email and documents that I hadn’t fully read but my team was iterating on, it looked at the last year’s plans to take a look at the competitive landscape, gave me a great five-page, actually it was eight-page, document that I can now go and tweak and make it my own, and overlay my perspective and use as a starting point. The other one is, like, often I talk to customers, and before I get on the call, I ask my agent—it’s called a KYC agent that my team built, which is, know your customer—and so before I get on to a call with a customer, I go into that agent experience in M365 Copilot and say, can you bring me up to speed on this customer? And it’s able to get to the support tickets, their adoption, their past communications with me, all of that stuff. And I often end up showing the customer the output, and we walk through it, and their question is like, how did you generate that? And in personal life, you want to make a big purchase, you want to do a seven-day trip planning, you want to buy a new car. You know, instead of clicking on 40 links, they can do a lot of research for you and show you that. So I use it for a lot of that too. 

    MOLLY WOOD: Fast-forward for us, three to five years, if possible. What do you think could be the most profound change in the way we work? 

    RAJESH JHA: You know, I think it goes back to the reconstitution of the workforce between humans and digital labor. I think the way we think about org charts, the way we think about groups coming together, the way we think about production function. I mean, it is a big deal to have intelligence be abundant and for it to be affordable. At the same time, I feel very encouraged about what people can uniquely do when you take a lot of the grind and predictability and, you know, have a colleague that is intelligent. I mean, I feel very bullish about how the economy is going to evolve. It won’t be a straight line. There will be scale backs in some of the roles that we think about investing in today, but there will be new roles we’ll be creating. So it’s very hard to predict exactly how it’s going to play out or whether that’s a three-year horizon, five-year horizon, but I do think that is a very clear trend of where we are headed. 

    MOLLY WOOD: Rajesh Jha is Microsoft’s Executive Vice President of Experiences and Devices. Thank you so much for the time today. I couldn’t appreciate it more. 

    RAJESH JHA: Thank you, Molly. I really do appreciate the time as well. 

    MOLLY WOOD: That was Rajesh Jha, Microsoft’s Executive Vice President of Experiences and Devices. Thank you all so much for joining us on this final episode of this season of WorkLab. We’ll be back next season with more insights on how to stay ahead of the curve while the way we work is transforming so quickly. If you’ve got a question or a comment, please drop us an email at worklab@microsoft.com, and check out Microsoft’s Work Trend Indexes and the WorkLab digital publication, where you’ll find all our episodes along with thoughtful stories that explore how business leaders are thriving in today’s new world of work. You can find all of it at microsoft.com/worklab. As for this podcast, please, if you don’t mind, rate us, review us, and follow us wherever you listen. It helps us out a ton. The WorkLab podcast is a place for experts to share their insights and opinions. As students of the future of work, Microsoft values inputs from a diverse set of voices. That said, the opinions and findings of our guests are their own and they may not necessarily reflect Microsoft’s own research or positions. WorkLab is produced by Microsoft with Godfrey Dadich Partners and Reasonable Volume. I’m your host, Molly Wood. Sharon Kallander and Matthew Duncan produced this podcast. Jessica Voelker is the WorkLab editor. 

    MIL OSI Economics

  • MIL-OSI Economics: Podcast: Microsoft EVP Rajesh Jha on leading with courage in the AI era

    Source: Microsoft

    Headline: Podcast: Microsoft EVP Rajesh Jha on leading with courage in the AI era

    MOLLY WOOD: That was Rajesh Jha, Microsoft’s Executive Vice President for Experiences and Devices. As a key figure at the helm of Microsoft’s product innovation, he leads a team of tens of thousands of people around the world who have worked to integrate AI into Windows and tools like Microsoft 365, Teams, and more. He’s also a key member of the company’s senior leadership team, which works directly for Microsoft Chairman and CEO Satya Nadella. In this episode, Jha shares his perspective on navigating the complexities of how AI is changing the way we work, and he offers actionable advice on how leaders have to adapt, compete, and bring their people along with them. And now my conversation with Rajesh. Rajesh, thank you so much for being on WorkLab today.  

    RAJESH JHA: Thank you, Molly, for hosting me. It’s a real pleasure to be here with you.  

    MOLLY WOOD: You have more than 30,000 employees, and you run a $100 billion business, which is more than most CEOs do. What are just some of the many lessons I’m sure you have learned from running such a huge organization? 

    RAJESH JHA: It’s been a real privilege to be at Microsoft through so many of the growth years. When I reflect back on my career, there are a few things that are enduring. The mission matters because through the ups and downs, if you have a sense of purpose, you have a North Star, that really does matter. And Microsoft has been really great to always be grounded in our customer successes, our success—this theme of empowerment, from Bill into Steve into Satya. So that was definitely number one. The second thing that I would say is, it seems very trite, but it has really worked for me specifically and my team, is, whenever we are looking at a hard strategic call, we start from, how would the customer react to the decision that we’re making, that has been incredibly grounding, so that’s been enduring. Of course, the team matters, the culture matters, because that’s where the work gets done. And then finally, managing a large business is about, literally, about figuring out how to make elephants dance, because you have a large-scale business, customers expect us to have a certain level of quality and continuity and predictability. At the same time, they take a bet on us to innovate. And so how do you stay nimble and innovate while also being predictable and trustworthy for customers? That is a hard thing to go do, but absolutely essential. It’s an and, it just can’t be an or.  

    MOLLY WOOD: Well, and Microsoft is an elephant that has danced, quite nimbly, for the last 50 years— 

    RAJESH JHA: Sometime clumsily, sometimes nimbly, yes. [laughter]  

    MOLLY WOOD: We’ll focus on the nimble—or not, right, based on your experience in bringing new technologies to market and helping to effectuate some pretty major technological innovations. What insights do you have for leaders who are now navigating this AI transformation?  

    RAJESH JHA: I mean, now is the time for leaders to really consider how their businesses, how their teams, how their skill set—how does that evolve in a world where we are looking at, you know, something at the peer of electricity coming into society, or the internet coming into society. And so it’s time to lean forward, and lean forward in a way that makes sense for their businesses or their business process. It is such a big change that it’s going to probably take a decade to play out, but there is no avoiding the sea change that’s underway now. So some bravery, but bravery on customers’ terms. 

    MOLLY WOOD: Yeah. I’m thinking of leaders who may be wary, who may need a dose of that courage. You’ve spoken about being asked by Steve Ballmer to bring Office to cloud, as one example of a transformation that maybe you were a little wary about. Can you walk us through that experience and how it might give a shot of courage for folks today. 

    RAJESH JHA: This was, you know, back maybe 15 years ago, Microsoft was incredibly profitable and the cloud was a question mark for many at Microsoft. A) would this technology be mature enough? B) is the business model, because the margins were going to be lower on the cloud than our old business model of being on premises. Number three, would we be able to transform fast enough? Because Microsoft had grown up being a server company, a client company, and would we be able to transcend that to be about cloud and mobile. And they were all very important questions. And there was a lot of, you know, let’s hold back. Let’s see if this trend is really real or not. And Steve showed incredible courage by going all in. What Steve did was he gave license to people to go and learn, even if we were not perfect on day one. And so the big lesson for me in how Steve started that journey was, leaders, if you have hesitation, whether it’s a business model hesitation or cultural hesitation, skill hesitation, it’s very hard for the teams to rally behind something where the leader themselves are half-hearted. So that was a very big moment for us, because he was unambiguous about, hey, this is the way that software is going to be delivered in the future. This is the way we can democratize the value we bring to customers. And there were a lot of benefits, and we are just going to go all in.  

    MOLLY WOOD: So leaders have to go all in. But I would imagine it’s not a—progress is not always a straight line. 

    RAJESH JHA: No, it wasn’t. And even with us in the cloud, it wasn’t. But the main thing is, leaders have to lead. And when you’re taking a look, the hard things are process, business model change, culture change, skill change. They’re all incredibly hard, and that’s why there has to be a commitment from the top that we are going to see this through. And then we were eyes wide open as what our deficiencies were. And so we didn’t have the right skill set. We trained people, we brought in new people, we embraced the red—all the things that we were not doing well in this new transformation. We were very open, very honest. It just takes leadership to set the tone here and to set the things in motion. 

    MOLLY WOOD: Right, and to your point, persistence and belief that it is the right direction so that you stay on that road even when it gets hard.  

    RAJESH JHA: That is correct, Molly, absolutely. And then one additional point I would make with persistence and belief is, it’s one thing to say it, it’s another thing to allocate resources to that belief. We have a quote, which is, if you really want to see the strategy of an organization, you’ve got to see where they’re allocating resources.  

    MOLLY WOOD: On the one hand, it sounds like you’re saying, get comfortable with chaos—  

    RAJESH JHA: Controlled chaos, Molly. Controlled chaos.   

    MOLLY WOOD: Then of course there’s the question of how not to break things. You know, security becomes a big concern with incorporating AI, doing it in a way that doesn’t introduce more problems. What is your advice for having proper guardrails in place as you transform in the AI age?  

    RAJESH JHA: So, I’m gonna answer that in two parts. Part one is, what do I mean by controlled chaos? So Satya invited Scott Guthrie, myself, Charlie [Bell] as the three big product leaders at Microsoft to go over to Bill’s house to see GPT-4, and Satya’s exact comment to me at that time was, I’ve gotta get you guys to be believers. And he had already seen it. And so he and Kevin Scott, they were already on board about the capabilities. So anyway, we go over to Bill’s house, it was in the kitchen area, where the OpenAI folks had put in a demo and they had a grader who grades AP biology there. The thing that really got me was it was not just the multiple choice questions that the model was doing a great job of, it was doing a great job on the written answers. There was some of the AP biology stuff, I’ve studied some biology, but they were far above my ability to understand. And so I look at all of that, I’m completely blown away. But then, for me, the big moment was when Bill asked the question, what would you say to the parent of a sick child, and the empathy or the humanity, almost, that it was able to convey in the answer was like, I would’ve felt proud to have written such a thoughtful note. And I was like, god, this is really, I mean, we are leaving behind the low-altitude handshake between computing and humanity. We are taking a look at something that can be almost at the pure level. And so now, fast-forward, it’s not that long, two years, and we are at the point where we are talking about agents and digital labor and people working together. 

    MOLLY WOOD: But that was it, that worked. You became believers. 

    RAJESH JHA: For me, that was it. I lead a large organization, and I see lots of cool stuff all the time, and part of my job is to make sure the trains keep running on time, but make sure I’m open-minded about big things. And when big things show up, I try to scope it and manage it. I have never in my 30 years ever gone to my team and said, drop all your plans. And for me, that was it. None of the existing plans matter anymore. I huddled all my senior leaders, and I said, Folks, I want you all to run a hundred miles an hour. It’s going to be very uncomfortable, because we’re going to unleash some amount of chaos, but let’s make sure we harden our processes that this chaos does not make its way to customers. So what I mean by controlled chaos is, if you’re unleashing a lot of activity all at once, you need to have the mitigating controls and the guardrails to make sure the chaos is controlled and managed. And so we huddled together to make sure our processes were hardened. So that’s one of the things with controlled chaos. But one of the guardrails that is not negotiable is security, as you correctly pointed out. So in our implementation of AI, we started very much from the mindset of, how does the AI inherit all the existing security and governance controls that an organization already has? It’s one thing to come and tell them, hey, rethink all your business process, rethink your scaling, rethink how work is done, and rethink your security and governance. It’s just not doable. And so we architected this from the ground up, that, for example, when you use Microsoft Copilot, it is using your permissions, so it only has access to what you have access to. It can never do any more than what you might do as a human. And then we also made sure that it was the mindset of a copilot, not an autopilot, and so the humans were always in control. So this way, whatever governance, data classification, permissions, you know, conditional access, retention policies—whatever a customer had, and how they managed human-to-human conversations, all of that accreted to human-to-AI conversation. That was a very hard guardrail we knew we just could not compromise.  

    MOLLY WOOD: But I want to go back to the example that you just gave, this moment of having this experience and realizing how— 

    RAJESH JHA: Profound. 

    MOLLY WOOD: Profound—exactly—and sophisticated these models were, because those are the kind of moments that give you the faith to go all in. 

    Rajesh Jha: Just to go back to that moment, Molly, I mean, to think as an engineer, as somebody who’s been in the tech industry a long time, who’s been through so many of the transformations, the big takeaway for me was, you know, for the first time computing, so far, human and machine interaction has been very much—machines are very low level. You know, we interact with pixels, we click on things, we read stuff. When I come in to work, I don’t come in to work thinking, oh, I should do 16 minutes of email and then read four documents and then, you know, open that spreadsheet, take a look at that budget. I come in thinking, I’ve got to work on budget today. So I think at a high level of intent, but then my intent to decompose is, either on my device, on a bunch of icons I’m swiping through, flipping from application to application, or going really low level—reading emails and then clicking a link. And so high-level intent gets reduced to low-level clerical work, almost. So when I saw this demo, I was like, Wow, the interaction is going to change. It is not going to be intent and then reduced to low-level stuff. AI is going to have the capability to have a human-to-human-like conversation. So intent, high-level intent to high-level intent, and that was what was the big takeaway for me. This is the computing for the last 35 years. One thing that hadn’t changed was a fundamental interaction pattern between people and their devices, and that was going to change, because now you could express, hey, I want to write a document that has the following three ideas, take a look at the relevant stuff in my enterprise and on the web—and can you compose a report for me? That is the kind of thing that I would tell another human being if there was a new hire in my team and, you know, I was thinking about a project to give them. This is the kind of way I might express the project to them, and then they will go in and do the work, check in with me, and we go back and forth. Now that was going to be possible.  

    MOLLY WOOD: Let’s keep talking about that idea of leveling up. We now live in a world where I may get an email from your account and I may not know if it was written by you or an AI, and that may not matter.  

    RAJESH JHA: You know, in some ways, it’s not that different from what happens for some of us. Let’s say I was to send a large piece of email to my team. I would actually work with my staff and my leadership team to get the latest status on a few things, and then I would put it in my words, and I would send it out. Now, everybody has that ability, because what the copilot does, you know, if I’m responding to a customer today, I go to my engineer who’s working on the customer issues, and say, hey, what is the latest status on this? And I would take a look at some of the other past conversations. I would try and respond to the customer that way. Now the copilot is doing that for me. It’s taking a look at my past emails. It reaches out to the customer service database. It tells me the latest status on this. It creates me a draft that I then go write and I send it out. And in some ways, I get reminded of, my dad used to run a large steel plant in India, and I visited him about 20 years ago. I walked into his office and he was very proud, because they had just gotten email, and I was working at Microsoft, and he had just gotten email. His secretary walked in at that time, and she said, Mr. Jha, I’ve got your morning messages for you, and here’s a message that I’m just going to go reach out to your technical assistant or respond to this person. This one, I know what to do already. This one, what would you like me to tell the customer, this person’s asking for dinner tomorrow. You’re free. And they were done in 15 minutes, and she left. And I looked at my dad, and I said, god, you’re so old-fashioned. Somebody’s actually printing your email, reading and coming and talking to you about it, whereas, look at me, I’m carrying it on my phone. I can get to it anywhere. But now, you know, I understand he was a smart guy, and I’m a digital clerk. I do all the clerical work myself. You know, I’m sorting messages. I’m replying to staff. I don’t come in to work thinking I should be a digital clerk. I come in to work because I want to lead a team, build products and value. That is what AI is now going to do. It’s going to take the clerical part for all of us, and will automate a lot of clerical parts to let the human ingenuity and the creativity and really let us focus on the intent and the meaning of our work.  

    MOLLY WOOD: We need help, Rajesh. We need help. [laughter] Well, speaking of delivering that help to customers, it’s been about a year, year and a half, since Microsoft 365 Copilot launched. Do you have stories from the trenches? Are there fun examples you can share about how this has gone?  

    RAJESH JHA: Really well. Ever since I came to Microsoft, this is the fastest adoption we’ve seen. When a customer buys a license and gives it to an end user, because the copilot is integrated into your user flows in Office, or Teams in a meeting, or so on and so forth, we see very good uptake in usage and retention. Some things that surprised me a little bit—and in hindsight, perhaps not so surprising—is the amount of customizations that customers do want for AI. I have feedback from some customers saying, hey, your AI, I want it to engage more because, you know, we build safety into our AI so it will not engage on some topics. Some customers want it to engage more, some want it to engage less. So they want to customize that. One of the things that some customers ask for is, hey, I would like your AI to not reach out to the web. I only want it to work with the stuff that’s in my enterprise. And I say, yeah, we’ve got that configuration for you. But can I ask you why? If you allow your employees to be able to use the browser and search the web as a part of their job, why is it not okay for the copilot that’s acting on their behalf to reach out on the web and assist them? So I’m surprised with the amount of configuration that enterprises want, which is, of course, enterprises have different business rules and process, so we built many more customizations in M365 Copilot than I had anticipated coming in. 

    MOLLY WOOD: I read some research recently where one of the AI firms said that they had done some analysis and found themselves really surprised at how long the long tail of interactions with AI are.  

    RAJESH JHA: So true. This generation of AI is about information work. It changes how people write, learn, collaborate, read, and so there’s a long tail. Not all of us triage information the same way.  

    MOLLY WOOD: What are some best practices that are starting to emerge? Because certainly every enterprise is going to adopt differently, interact differently, and then have different use cases that may or may not make their experience work.  

    RAJESH JHA: That’s a great question. I would say the successful implementations that we see are the first stage, of course, is to enable people to get productivity boosts with the AI, where the AI is really assisting you. And then the next most important thing that customers end up doing that gives them a real return on investment is to rethink their high-value business process or high-cost business processes, and figure out how to reconfigure that with agents that can automate a bunch of those processes to be either more effective or more efficient. That, I think, is changing the way work happens. For example, if you’re a lawyer and you’re working with a bunch of documents, instead of having—somebody spent a lot of time going through the past relevant briefs and composing a new template. How do you change a new brief creation? How do you change an approval process? How do you change a customer support ticket handling? How do you change a marketing campaign? How do you change a developer workflow? I see customers actually taking a business process, and they are rewiring that for a world where people and AI can work together to automate that, to make it more effective, more efficient. So that is a good best practice, is not trying to solve a hundred business processes, but taking a few and going really deep and measuring the ROI and tweaking that, because then the payoff is right there. 

    MOLLY WOOD: Well, and to dig in a little further, it also sounds like what you’re saying is that companies and CIOs maybe need to commit. Like, if you don’t commit, if you don’t plug Copilot in, if you don’t enable the full Microsoft Graph, if you maybe don’t give access to the web, people are still going to find these tools and use some version of them that might not be as good as they could be if you really do go all in. 

    RAJESH JHA: Yeah, Molly, it’s exactly right. I mean, it goes back to the point we made, which is, leaders, have, you know, leaders have to lead. And the reason why they have to lead here in this transformation is, if a support organization, a marketing organization, engineering organization is wired to work the old way, they are not automatically going to rewire themselves for a world where AI can do a bunch of tasks and people’s tasks change. That’s not going to happen, bottom-up. It’s going to have to happen from the leaders leaning in and saying, okay, you know, am I sure that I have the right compliance and governance and security? Because those are non-negotiable. But once I have that, how do I lead the way where I empower and I get to a world where AI assisting, to agents and people working together? One of the concepts we’ve talked about, and it’s come out in the new Work Trend Index is, corporations, for the longest time, have had static org charts, and every once in a while you do a reorganization and you reconfigure teams for your new evolving business priorities. But those things are not very frequent, nor should they be very frequent, because there’s a huge lag to those things. The way work happens is people, it’s, teams are less static and they’re more outcome-driven. Some of this started to happen post-COVID also, where the fluidity of the team composition was not represented in the org chart. That thing is going to accelerate far more in a world where digital labor and people, agents and people, are going to work together as business processes get rewired. None of this is going to be possible without leaders committing to that. And the way you can commit to it is by taking a few processes that are incredibly important for your business’ top line or your profitability because it’s a high-cost thing, and trying to figure out how to reconfigure those things for people and agents working together in one team. 

    MOLLY WOOD: What do you wish business leaders understood about AI agents to help them make that commitment? 

    RAJESH JHA: The first thing I would just say is, like, it’s not some distant future, it’s happening now. My product management team, they ran a research today of a bunch of different organizations, and this time, you know, usually we talk to 30,000 people across different organizations, 30 different countries. This time, they also reached out to AI-native companies that have started to emerge, so-called frontier companies. And if you take a look at the frontier companies, it is very obvious that the way the distribution of human work and digital labor, how that gets constituted, there’s very interesting patterns that are starting to emerge. The first thing I would just tell leaders is—of established companies such as myself, my peers, and the rest of large organizations—it’s possible today to take full advantage of agents. The security model exists, the identity model exists, the user interface exists. The hard work here is to actually go pick the processes that give you the most bang for the buck and then be rigorous about measuring that. And this is why we invested in something called the Copilot Impact Dashboard, so customers can take their core KPIs and they can measure how the copilot is moving those KPIs. So be rigorous, but be forward-looking. It’s not, hey, let’s just take a leap of faith and let’s get agents everywhere. Be rigorous with security. Be rigorous with governance. Measure the ROI, but pick the processes that you’re going to go add agents to. 

    MOLLY WOOD: It seems like the other tension, in addition to going all in, right, in addition to commitment, is pace, the pace of introducing that change, going fast to keep up to, you know, be pushed properly by Frontier Firms, but not compromising security and guardrails. 

    RAJESH JHA: And so on the pace, it’s a super good tension that you pick up on, and we deal with the tension all the time ourselves at Microsoft. What is hard is to have pace at scale. But what’s not hard is to have pace at smaller scale. I’m not advocating for a large organization to go and say, go rewire all your business process, fast, into the frontier methodology. I’m saying, pick a few that are really important to you and go with base on those, learn from that. Meanwhile, invest in skilling. Meanwhile, invest in assistance for everybody else. And that’s what we do, too, in my team. We want to move very quickly, but we move very quickly in a scoped garden with a few processes, a few customers, and then once we are sure it is mature and it’s ready, do we then scale it out. So, moving fast doesn’t mean move fast all over, all at once, if you’re a large organization. It means you’re moving fast by having picked and assessed. And, you know, which way do you want to go fast and where do you want to go more cautiously, and then take the lessons from moving fast and more broadly. 

    MOLLY WOOD: Right. It’s so valuable to put a fine point on that, because any problem is manageable in component parts. 

    RAJESH JHA: Hundred percent. Hundred percent. And picking is the important thing. But if you pick something unimportant that you’re moving fast on, you’re not really learning a lot either. 

    MOLLY WOOD: Right. Then the other tension, the technology itself is moving really fast, so you might have incorporated something, you’re doing a great job measuring it, and now there’s a whole new tool. How do you advise business leaders to keep up?  

    RAJESH JHA: The playbook is still the same. You have to figure out how to move fast and stay predictable at the same time. And the way you do that is by managing where you move fast and by having rigorous measures of whether the ROI is working out or not. Because you’re a hundred percent right. I mean, the compression of innovation that I’m seeing in the AI wave is like nothing that we’ve seen before in the last 30 years. 

    MOLLY WOOD: So as we talk about committing, you know, it’s one thing to say, maybe give your model access to the web, but there’s this Microsoft Graph that it seems like really unlocks that power. 

    RAJESH JHA: The Microsoft Graph is really not Microsoft’s graph. It is a graph for the customer. It’s owned by the customer. And what it captures is how people inside of their organization work together—the meetings that are important, the documents that have been created, the chats and the projects that people are working on—the business processes that run in their organization, that is all a part of the Microsoft Graph. So you take the power of a reasoning model that now has access to the graph—remember again, the reasoning model has access to the same things that you would as an individual. So when I ask a reasoning model or an agent to work on my behalf on Microsoft Graph, it is working with my permissions. But now it has the ability to read far more, process far more than I would be able to. You take the unique intellectual property of the customer in the graph with all the right permissions overlaid, and then you let AI work on that, along with what’s available in the web, on the world knowledge, your enterprise knowledge—that is the real enabler. So what is great about the researcher in Microsoft 365 Copilot is that it works with your enterprise permissions and your enterprise data, everything that is in the graph. And that is what I think is a real breakthrough. Now you’ve got the makings of a digital employee, somebody who was able to come in, join an organization, and take advantage of all the intellectual property with all the permissioning honored, and take that and be a part of producing output for the company.  

    MOLLY WOOD: Right. I mean, it’s institutional knowledge, like, think about what a great employee I could be if I knew all the context and all the history that a company had gone through. 

    RAJESH JHA: Exactly. And all the relevant, you know, escalations, projects, all of that stuff. 

    MOLLY WOOD: Switching gears a little. You work very closely with Microsoft CEO Satya Nadella. Are there questions that he regularly asks you that you think all leaders should be asking their employees? 

    RAJESH JHA: I think fundamentally my boss, you know, Satya, I mean, he’s pushing me on exactly the set of questions you were asking, on my own organization. The way he describes the priorities that I have and my peer groups have, three priorities—quality, security, and AI transformation, are you moving fast? Fully understanding that quality and security and then moving fast, sometimes are intentions, but that’s what he’s saying. Are you doing your job to do all of these at the same time? A lot of the thrust of his conversations, questions are, are you evolving your own team to be frontier, and what’s getting in your way? Because whatever we learn then applies to our customers. So are we applying the same methodology to make your enterprise-grade securities non-negotiable. And then at the same time, are you moving fast to take full advantage? Are you really rethinking your production functions? So I would say all of his questions and interactions distill into these three things, and are we doing a good job balancing these three things.  

    MOLLY WOOD: This company has reinvented itself many times. What are the key lessons that we and all business leaders should take from those reinventions? 

    RAJESH JHA: I would say again, mission matters. Through those 50 years, our mission is a theme around empowerment, so number one. Number two, I would say is, team culture matters, of course, because the how and where the work—there’s no substitute for that. But then I would say you gotta do the and, it’s never an or. How do you stay scaled and perform while waiting and disrupting at the same time? That comes down to strong leadership, it comes down to good processes. Then, what you touched on that I want to reiterate is, you know, just resiliency. We didn’t get everything right in the last 50 years. We made mistakes, but being resilient, learning from the mistakes, embracing the red so we can do a better job the next time. I think those are all components that I would just say we benefited from having incredible CEOs from Bill and Steve and Satya, so that has been an amazing, you know, learning experience for me and many others to work with those three amazing individuals.  

    MOLLY WOOD: If our listeners could take away one actionable AI-related insight from you, what would it be? 

    RAJESH JHA: I would say, go embrace agents. Pick out your most important processes, reimagine them how agents and digital labor can rewire that. 

    MOLLY WOOD: We love to ask our WorkLab guests how they are using AI themselves, either at work or in your personal life. Are there use cases that have been really helpful for you that you’re willing to talk about? 

    RAJESH JHA: Yeah, the one thing we didn’t talk about that I feel is just mind-blowing, is this reasoning models. You know, today, Molly, you and I going back and forth, then you ask me a hard question, I’ll give you an answer off the cuff. But if you tell me, Rajesh, go think about it and come back to me. And, you know, I have a set of tools available to me and I come back to you, I’m going to give you a much better answer. And so with the reasoning model, that’s what’s happening. We are now letting the AI actually go reason over stuff, give it more time, more compute, and more tools. And so for me, the real breakthrough was every quarter I sit down with my leadership team to take a look at our plans for the next six months. So I ran the researcher model. The researcher model is a deep reasoning model in M365 Copilot that works with the graph and the web, and I asked it, hey, I’m about to have an off-site with my leadership team to take a look at the plans for the next six months, take a look at the competitive landscape, take a look at customer feedback, take a look at all the ideas that have been accumulating in the team, and try and give me a draft of what might be a good starting point for our off-site for the next six-month planning. It was incredible. It was able to get through my email and documents that I hadn’t fully read but my team was iterating on, it looked at the last year’s plans to take a look at the competitive landscape, gave me a great five-page, actually it was eight-page, document that I can now go and tweak and make it my own, and overlay my perspective and use as a starting point. The other one is, like, often I talk to customers, and before I get on the call, I ask my agent—it’s called a KYC agent that my team built, which is, know your customer—and so before I get on to a call with a customer, I go into that agent experience in M365 Copilot and say, can you bring me up to speed on this customer? And it’s able to get to the support tickets, their adoption, their past communications with me, all of that stuff. And I often end up showing the customer the output, and we walk through it, and their question is like, how did you generate that? And in personal life, you want to make a big purchase, you want to do a seven-day trip planning, you want to buy a new car. You know, instead of clicking on 40 links, they can do a lot of research for you and show you that. So I use it for a lot of that too. 

    MOLLY WOOD: Fast-forward for us, three to five years, if possible. What do you think could be the most profound change in the way we work? 

    RAJESH JHA: You know, I think it goes back to the reconstitution of the workforce between humans and digital labor. I think the way we think about org charts, the way we think about groups coming together, the way we think about production function. I mean, it is a big deal to have intelligence be abundant and for it to be affordable. At the same time, I feel very encouraged about what people can uniquely do when you take a lot of the grind and predictability and, you know, have a colleague that is intelligent. I mean, I feel very bullish about how the economy is going to evolve. It won’t be a straight line. There will be scale backs in some of the roles that we think about investing in today, but there will be new roles we’ll be creating. So it’s very hard to predict exactly how it’s going to play out or whether that’s a three-year horizon, five-year horizon, but I do think that is a very clear trend of where we are headed. 

    MOLLY WOOD: Rajesh Jha is Microsoft’s Executive Vice President of Experiences and Devices. Thank you so much for the time today. I couldn’t appreciate it more. 

    RAJESH JHA: Thank you, Molly. I really do appreciate the time as well. 

    MOLLY WOOD: That was Rajesh Jha, Microsoft’s Executive Vice President of Experiences and Devices. Thank you all so much for joining us on this final episode of this season of WorkLab. We’ll be back next season with more insights on how to stay ahead of the curve while the way we work is transforming so quickly. If you’ve got a question or a comment, please drop us an email at worklab@microsoft.com, and check out Microsoft’s Work Trend Indexes and the WorkLab digital publication, where you’ll find all our episodes along with thoughtful stories that explore how business leaders are thriving in today’s new world of work. You can find all of it at microsoft.com/worklab. As for this podcast, please, if you don’t mind, rate us, review us, and follow us wherever you listen. It helps us out a ton. The WorkLab podcast is a place for experts to share their insights and opinions. As students of the future of work, Microsoft values inputs from a diverse set of voices. That said, the opinions and findings of our guests are their own and they may not necessarily reflect Microsoft’s own research or positions. WorkLab is produced by Microsoft with Godfrey Dadich Partners and Reasonable Volume. I’m your host, Molly Wood. Sharon Kallander and Matthew Duncan produced this podcast. Jessica Voelker is the WorkLab editor. 

    MIL OSI Economics

  • MIL-OSI USA: Fischer Statement on Senate Passage of One Big Beautiful Bill

    US Senate News:

    Source: United States Senator for Nebraska Deb Fischer
    Fischer’s Paid Family and Medical Leave policy made permanent in bill—delivering long-term support for working families and employers
    Today, U.S. Senator Deb Fischer (R-Neb.) released the following statement after the U.S. Senate passed the One Big Beautiful Bill:  
    “Last November, Americans spoke loud and clear: they want safer communities, lower energy costs, and real relief for working families. Today, the Senate delivered—blocking a $4 trillion tax hike and investing in border security to keep America safe. This bill locks in the 2017 Tax Cuts and Jobs Act, saving the average Nebraska family $2,400 a year. It keeps taxes low, boosts small businesses, strengthens our military, supports farmers and ranchers, and makes energy more affordable for everyone.
    “I’m also pleased this bill makes permanent my Paid Family and Medical Leave (PFML) Tax Credit. Since I established the nation’s first and only federal PFML policy in 2017, this credit has empowered employers of all sizes to offer paid leave to their workers voluntarily, rather than through a government mandate. Now, employers across America have the certainty they need to support employees as they care for a newborn or an aging parent without sacrificing their job or paycheck.
    “I urge the House to take up this bill and send it to the president’s desk so we can deliver on our promises to empower working families and keep America safe, strong, and prosperous.”
     
    One Big Beautiful Bill Provisions:The One Big Beautiful Bill contains the following provisions championed by Fischer:
    Paid Family Medical Leave Tax Credit Extension and Enhancement Act: makes the PFML Employer Tax Credit—the country’s first-ever nationwide PFML policy—permanent, helping employers of all sizes to voluntarily – not through a government mandate—offer PFML plans to their employees; 
    A carve-out for the Department of Defense—for the first time in history—of specific spectrum bands (3, 7, and 8 gigahertz frequencies) from general Federal Communications Commission auction authority, which will safeguard the missile defense of the homeland, protect our military radars and sensors, and lay the groundwork for long-term defense innovation—including the Golden Dome Missile Defense Shield; and
    A modified version of her Protecting Rural Seniors Access to Care Act, which repeals a harmful Biden-era staffing mandate that would have forced several long-term care (LTC) facilities to close, depriving America’s seniors of care.
    It also includes the following tax provisions to benefit Nebraska families:
    Prevents a more-than $2,400 tax hike on the average Nebraska family;
    Protects over 44,000 family-owned farms in Nebraska from having their death tax exemption cut in half;
    Protects 37,000 jobs in Nebraska from being lost;
    Ensures more than 239,000 Nebraska households’ child tax credit is not cut in half;
    Makes sure more than 868,000 Nebraska families’ standard deduction is not cut in half;
    Establishes work requirements for able-bodied adults who are choosing not to work and do not have dependent children or elderly parents in their care; and
    Ensures no taxes on tips or overtime for millions of tipped and hourly workers.
    It also supports Nebraska’s agricultural industry by: 
    Extending the 45Z Clean Fuels Production Tax Credit to support Nebraska’s farmers and biofuel producers;
    Investing in and modernizing the farm safety net, including improvements to crop insurance;
    Expanding markets for Nebraska’s ag producers by investing in trade promotion;
    Increasing funding for foreign animal disease prevention to protect Nebraska’s ag industry; and
    Increasing funding for agricultural research.
    The bill invests in America’s border security through the following provisions:
    $46.5 billion for U.S. Customs and Border Patrol (CBP) to build the border wall and associated infrastructure;
    $45 billion to increase the detention of illegal migrants;
    $6 billion for improvements to surveillance at the border; and
    Funding for the U.S. Department of Homeland Security (DHS) to increase staffing and enhance migrant screening and vetting processes.
    The bill also makes crucial investments in America’s national security through the following provisions:
    $15 billion to modernize nuclear weapons and delivery systems and to invest in the infrastructure needed to restore America’s ability to manufacture nuclear weapons;
    $25 billion to accelerate procurement of key munitions and expand production capacity;
    $25 billion for America’s Golden Dome—building a layered missile defense shield and developing space-based assets to protect the homeland and deployed troops; and
    $1 billion to support Department of Defense personnel and logistics for border security and counterdrug operations.

    MIL OSI USA News

  • MIL-OSI USA: PRESS RELEASE: Reps. Barragán, Buchanan, Sánchez, and Bilirakis Reintroduce Bipartisan Resolution Recognizing June 2025 as Alzheimer’s and Brain Awareness Month

    Source: United States House of Representatives – Representative Nanette Diaz Barragán (CA-44)

    FOR IMMEDIATE RELEASE
    June 30, 2025

    Contact: Jin.Choi@mail.house.gov

    Reps. Barragán, Buchanan, Sánchez, and Bilirakis Reintroduce Bipartisan Resolution Recognizing June 2025 as Alzheimer’s and Brain Awareness Month

    Washington, D.C. – Today, Congresswoman Nanette Barragán (CA-44), Congressman Vern Buchanan (FL-16), Congresswoman Linda Sánchez (CA-38), and Congressman Gus Bilirakis (FL-12) reintroduced a bipartisan resolution to designate June 2025 as Alzheimer’s and Brain Awareness Month. The resolution seeks to increase public understanding of Alzheimer’s disease, support continued investment in research, and recognize the strength and sacrifice of individuals living with Alzheimer’s and their caregivers.

    “Nearly 7 million Americans, including my own mother, are living with Alzheimer’s or another form of dementia. This disease is deeply personal to me, and to the countless families who serve as caregivers while grappling with its emotional and financial toll,” said Rep. Barragán. “We must continue to raise awareness, advance research, and support caregivers, especially those in communities of color where disparities in diagnosis, access to care, and outcomes persist. I’m grateful to my colleagues, Reps. Buchanan, Sánchez, and Bilirakis, for their partnership in this bipartisan effort.”

    “As someone who cared for a parent with this horrible disease, I believe that it is critical for Congress to take steps to recognize the impact that Alzheimer’s and dementia have on the millions of Americans diagnosed every year,” said Rep. Buchanan. “I am proud to co-lead this bipartisan resolution with Reps. Barragán, Sánchez and Bilirakis to bring much-needed and continued awareness to these deadly diseases.”

    “As the daughter of two parents who suffered from Alzheimer’s, I can tell you firsthand how devastating the disease is, as well as the emotional toll it takes on families,” Congresswoman Linda T. Sánchez said. “This resolution recognizes the importance of early detection and screening, as well as how this disease disproportionately affects women, Latinos, and Black Americans. It is important that we continue raising awareness around the facts of this disease, and advancing research to eventually find a cure.”

    “As research continues to yield advancement in the development of more treatment options for patients with Alzheimer’s, we know that early detection, diagnosis and intervention offers the best promise for disease management which is why we must raise awareness of the signs, symptoms and impact this disease has on millions of Americans,” said Congressman Gus Bilirakis. “My family has coped with the devastating impacts of this horrific disease for more than a decade, so I understand the toll it takes on the patient and his or her loved ones as it progresses. We owe it to our fellow Americans to develop a system of care that prioritizes education, screening and assessment so that patients can enjoy the best possible quality of life.”

    “On behalf of the over 7 million Americans living with Alzheimer’s, thank you to Reps. Barragán, Buchanan, Bilirakis and Sánchez for recognizing June as Alzheimer’s & Brain Awareness Month and for your unwavering dedication to the Alzheimer’s community,” said Rachel Conant, Alzheimer’s Association senior vice president of public policy and AIM executive director. “Your commitment to bipartisan solutions is driving progress in the fight against this devastating disease.”

    The Alzheimer’s & Brain Awareness Month resolution is endorsed by the Alzheimer’s Association and Alzheimer’s Impact Movement (AIM).

    The full text of the legislation can be found here. 

    ###

    MIL OSI USA News

  • MIL-OSI USA: Statement on the Senate Passing Trump’s ‘Big Ugly Bill’

    Source: US State of New York

    ??Today, Senate Republicans moved one step closer to ripping health care away from millions of Americans to pay for massive tax breaks for billionaires.

    “From North Country farmers to downstate hospitals, Trump’s ‘Big Ugly Bill’ would devastate New Yorkers. Over one million people in our state would lose their health care. A quarter million would see cuts to SNAP. Nursing homes will close. Food prices will rise. Hospitals will shutter. All during a national affordability crisis.

    “Every single New York Republican in Congress backed this disaster. They helped write it, cheered it on, and voted to gut the very programs that keep their constituents alive. The bill slashes Medicaid, axes clean energy tax credits, and guts SNAP.

    “I will do everything in my power to shield New Yorkers from the fallout. But if this bill becomes law, there will be real pain. And the Republicans who helped inflict it won’t be able to hide from the consequences. Not in Washington. Not in New York. Not ever.”

    MIL OSI USA News

  • MIL-OSI: Old National Names Matt Keen Chief Information Officer

    Source: GlobeNewswire (MIL-OSI)

    MINNEAPOLIS and ST. PAUL, Minn., July 01, 2025 (GLOBE NEWSWIRE) — (NASDAQ: ONB) Old National Bancorp (“Old National”) has appointed Matt Keen as Chief Information Officer (CIO). In this role, Keen will join Old National’s Executive Leadership Team – the company’s senior-most group of C-suite executives.

    Keen brings more than three decades of experience in significant technology leadership roles at national companies, including leading architecture development, as well as experience with brokerage and banking services, cloud service optimization, and platform modernization.

    “As Old National continues our Midwest and Southeast expansion, our technology strategy and capabilities are also evolving to continue meeting our ever-growing clients’ needs and expectations,” said Old National Chairman & CEO Jim Ryan. “Matt’s wide-ranging technology expertise will be essential for helping us innovate and deliver client-focused solutions, while also supporting the personal relationships that have always been the heart of our success.”

    Keen’s previous technology leadership experience included consulting with American Express as part of his tenure at PriceWaterhouseCoopers, almost 15 years at Ameriprise Financial (formerly a division of American Express), and six years at Two Harbors Investments. Most recently, he served as CIO for Bremer Bank, which became a division of Old National Bank on May 1, 2025.

    As Old National’s CIO, Keen will lead a forward-thinking approach to leveraging technology as an enabler for business success. He will shape and execute the company’s technology strategy, working closely and collaboratively with all aspects of the business to identify ways to increase efficiencies and drive growth. With a particular emphasis on innovation, Keen and his team will use technology, as well as data and analytics, to effectively support and enhance the client and team member experience, to meet their ever-evolving expectations.

    “I’m looking forward to continuing to advance the strong technology foundation that has enabled Old National to achieve its growth goals,” Keen said. “Through a collaborative approach and intense focus on our clients, we’ll bring forward the best technology capabilities to serve the business and support the culture that our team members, clients, and communities expect and appreciate.”

    A resident of Chanhassen, Minn., Keen holds a degree in quantitative methods and computer science from the University of St. Thomas.

    Keen succeeds retiring Chief Information Officer Paul S. Kilroy, who joined Old National in 2020. During his tenure, Kilroy spearheaded a groundbreaking partnership with Infosys that vastly improved contact center quality and stabilized information quality metrics across the organization, leading to a 2024 “Tech Exec of the Year” honor from the Indianapolis Business Journal.

    ABOUT OLD NATIONAL
    Old National Bancorp (NASDAQ: ONB) is the holding company of Old National Bank. As the fifth largest commercial bank headquartered in the Midwest, Old National proudly serves clients primarily in the Midwest and Southeast. With approximately $70 billion of assets and $37 billion of assets under management (including Bremer Financial Corporation on a pro forma basis as of March 31, 2025), Old National ranks among the top 25 banking companies headquartered in the United States. Tracing our roots to 1834, Old National focuses on building long-term, highly valued partnerships with clients while also strengthening and supporting the communities we serve. In addition to providing extensive services in consumer and commercial banking, Old National offers comprehensive wealth management and capital markets services. For more information and financial data, please visit Investor Relations at oldnational.com. In 2025, Points of Light again named Old National one of “The Civic 50” — an honor reserved for the 50 most community-minded companies in the United States.

    Investor Relations:
    Lynell Durchholz
    (812) 464-1366
    lynell.durchholz@oldnational.com

    Media Relations:
    Rick Vach
    (904) 535-9489
    rick.vach@oldnational.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/5d64d8b1-0fab-4151-8bd2-c21133a36465

    The MIL Network

  • MIL-OSI USA: Senator Markey Statement on Senate Passage of Draconian Republican Health Care, Clean Energy Cuts

    US Senate News:

    Source: United States Senator for Massachusetts Ed Markey
    Senator Markey: “Senate Republicans abdicated their responsibility to the American people.”
    Washington (July 1, 2025) – Senator Edward J. Markey (D-Mass.) today released the following statement after Republicans voted to pass H.R. 1, Donald Trump’s so-called “Big Beautiful Bill.” The bill now heads to the House of Representatives for consideration.
    “Today, Senate Republicans abdicated their responsibility to the American people. They acted in service to Trump and billionaires while pursuing the largest cuts to health care, food security, and climate and clean energy in United States history. If these cuts pass into law and even one child goes hungry, one worker loses their job, or one person cannot get lifesaving care, the burden falls on Republicans for their record-setting cruelty.
    “People’s lives and livelihoods should not be treated as expendable. Hospitals, nursing homes, and community health centers should not be forced into financial emergency rooms. Families should not be poisoned by pollution or shoulder higher energy costs, and communities should not be left defenseless against the worsening climate crisis.
    “The fight is not over, but time is running out and inaction will cost lives. That’s why we cannot agonize – we must organize. As this Big Ugly Bill heads to the House of Representatives, we all need to continue to raise our voices even louder to stop Trump and Republicans from tearing health care, food assistance, and a livable future away from millions of Americans.”

    MIL OSI USA News

  • MIL-OSI USA: Boozman Statement on Passage of Budget Reconciliation Bill

    US Senate News:

    Source: United States Senator for Arkansas – John Boozman
    WASHINGTON—U.S. Senator John Boozman (R-AR) released the following statement after Senate passage of budget reconciliation legislation that advances President Trump and Congressional Republicans’ agenda:
    “This bill delivers the largest tax cut ever for working and middle-class Americans in addition to letting tipped and hourly workers, seniors and families keep more of their hard-earned income. It also eliminates waste, fraud and abuse so assistance programs can continue to serve the vulnerable, and provides transformational funding for border security, national security and energy security. These policies will help responsibly steward taxpayer dollars and make our nation stronger, safer and more prosperous.” 
    Boozman, who serves as Chairman of the Senate Agriculture, Nutrition, and Forestry Committee, also weighed in specifically on the committee-led provisions to deliver permanent tax relief to America’s farmers and invest in rural communities:
    “We make commonsense reforms to SNAP to ensure the program operates efficiently, is accountable to the taxpayers and helps those who truly need it. There is also good news for hardworking farmers, ranchers and producers who for too long were forced to operate under outdated policies. Our investments in farm country will support the long-term success of family farms and America’s agriculture industry, providing desperately needed and improved risk management tools as well as a modernized farm safety net.”
    Background
    The pro-growth legislation extends the Tax Cuts and Jobs Act of 2017, preventing the largest tax hike in history and providing additional tax relief to working families and small businesses. Expiration of these cuts would mean a $4 trillion tax increase, including a $2.6 trillion-plus tax hike on households earning less than $400,000 per year. The average Arkansan would avoid paying $2,325 more in taxes under the Senate-passed bill.
    Provisions addressing important tax priorities permanently include:
    Lowering tax rates and removing taxes on tips as well as overtime for millions of workers in addition to a sizable deduction for millions of low- and middle-income seniors;
    Increasing and enhancing the child tax credit and standard deduction claimed by over 90 percent of taxpayers;
    Extending the 20 percent small business deduction and enabling full expensing on capital investment as well as research and development; and
    Keeping the death tax from doubling for farm families and small business owners so they can be passed on to the next generation.
    Click here for more on the tax impact for Arkansans.

    MIL OSI USA News

  • MIL-OSI USA: McConnell on Senate Passage of President Trump’s One Big Beautiful Bill

    US Senate News:

    Source: United States Senator for Kentucky Mitch McConnell
    Washington, D.C. – U.S. Senator Mitch McConnell (R-KY) released the following statement today regarding passage of the Senate version of the Reconciliation Bill:
    “The American people sent President Trump and Republican majorities to Washington with a clear mandate: secure the border, restore peace through strength and American energy dominance, and give working families and small businesses relief from the Biden economy.
    “Our votes today are a step toward fulfilling that duty. We’re bolstering border security, investing in programs that assist our farmers, raising take-home pay for working Kentuckians, and preventing the largest tax hike in American history.
    “In the realm of national defense, there is still more to be done. Reconciliation was an opportunity to make an urgent, additive investment on top of a steadily increasing base budget, not an invitation to offload major annual priorities to a one-time injection of funds. Largely missing this opportunity makes the Congress’ work to secure robust topline defense funding even more important, and I will continue to urge my colleagues and the Administration to meet growing and coordinated threats to America’s security with the resources they demand.”

    MIL OSI USA News

  • MIL-OSI Analysis: Self determination theory: how to use it to boost wellbeing

    Source: The Conversation – UK – By Mark Fabian, Reader of Public Policy, University of Warwick

    Self-determination theory (SDT) is one of the most well established and powerful approaches to wellbeing in psychological research literature. Yet it doesn’t seem to have broken through into popular discussions about wellbeing, happiness and self-help. That’s a shame, because it has so much to contribute.

    A foundational idea in self-determination theory is that we have three basic psychological needs: for autonomy, competence and relatedness.

    Autonomy is the need to be in control of your own life rather than being controlled by others. Competence is the need to feel skilful at the tasks one values or needs to thrive. Relatedness refers to feeling loved and cared for, and a sense of belonging to a group that provides social support.

    If our basic psychological needs are met, then we are more likely to experience wellbeing. Symptoms include emotions such as joy, vitality and excitement because we’re doing the things we love, for example. We’ll probably have a sense of meaning and purpose because we live within a community whose culture we value.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    Conversely, when our basic needs are thwarted we should see symptoms of illbeing. Anger, frustration and boredom grow when our behaviour is controlled by parents, bureaucrats, bosses or other forces that press our energies towards their ends instead of ours.

    Depression is liable when we our competence is overwhelmed by failure. And anxiety is often a social emotion that arises when we’re worried about whether our group cares for us.

    So we should cultivate our basic psychological needs – but how? You need to discover what you want to do with your life, what skills to become competent in, who to relate to and what communities to contribute to.

    Using motivation to find your way

    Here’s where the second foundational idea in SDT can be super helpful, as I explain in my new book, Beyond Happy: How to rethink happiness and find fulfilment. SDT proposes a motivational spectrum running from extrinsic at one end to intrinsic at the other. Finding out where you are on the spectrum for a certain activity or task can help you work out how to be happier.

    The more extrinsically motivated something is, the more self-regulation it requires. For example, when refugees flee their homes due to encroaching war, there is often a large part of them that wants to stay. Willpower is required to act. In contrast, intrinsically motivated behaviour springs spontaneously from us. You don’t need willpower to get stuck into your hobbies.

    Each type of motivation comes with different emotional signals and deciphering them can help us find what values, behaviour and groups suit us.

    The spectrum of motivation according to self-determination theory.
    CC BY-NC

    “Identified” motivation, for example, sits between extrinsic and intrinsic motivation. It occurs when we value an activity but don’t inherently enjoy it. That’s why success in identified behaviour is usually met with a feeling of accomplishment or the warm and fuzzy feeling you get when you do the right thing, like going a bit out of your way to put your rubbish in a bin.

    In contrast, “introjected” motivation is where you value something contingent to the behaviour itself. Many of us loathe the gym, for example, but we want to be healthy. A child might not want to practice the cello, but they do want their parent’s approval.

    Because introjection is relatively extrinsic, it requires willpower, and probably a bit more of it than for identified behaviour. Completion of an introjected activity is often met with relief rather than accomplishment and little desire to keep going.

    Sometimes things that are dependent on introjected behaviour can make us unhappy. In teen dramas, for example, the protagonist often does something because they want to be popular, but when they win the approval of the cool kids they realise those kids are mean and lame.

    Why money, power and status won’t make you happy

    If that’s how you feel, you’ve found something inauthentic to you. Then there’s very little chance the introjected activity will lead to your wellbeing. In fact, SDT has identified some common values. You’ll recognise them immediately: popularity, fame, status, power, wealth and success.

    They’re extrinsic because they’re not peculiar to you. If you get rich doing the thing you love, that’s great, but many of us never even think about what we love because we’re too busy thinking about how to get rich.

    Extrinsic pursuits are ultimately bad for our wellbeing because they’re all poor substitutes for basic psychological needs. When our autonomy is thwarted by strict parents or disciplinarian teachers, we crave power. When we don’t know what sort of life to build and thus what skills we need competence in, we adopt other people’s notions of success instead.

    Extrinsic pursuits often emerge from a wounded place and a defensive reaction. When we’re lonely or feel unloved for who we are, for example, we might compensate by seeking fame or popularity. We’ll start talking about our accomplishments on LinkedIn, for example.

    The problem is that the people this attracts don’t value you specifically, only your power, status or money. You sense that if you ever lost those things, you would lose these people too.

    SDT can help you learn to listen to your emotions and interpret your motivations instead, and use them to guide you towards the values, activities and people that are right for you.

    For example, if you feel joyful and fulfilled when you solve a complex puzzle, perhaps consider a career that involves that activity, such as law or engineering. If such puzzles feel like torture, that’s a signal too. Perhaps something more relational or intuitive, like social work, would work better.

    When you pursue things that are authentic to you it will nourish your sense of autonomy. You’ll build competence in those activities because they’re intrinsically motivated. And you’ll form deep relationships with the people you encounter because you genuinely like each other. Wellbeing will follow.

    Mark Fabian does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Self determination theory: how to use it to boost wellbeing – https://theconversation.com/self-determination-theory-how-to-use-it-to-boost-wellbeing-259829

    MIL OSI Analysis

  • MIL-OSI USA: Attorney General Bonta Sues Trump Administration for Illegally Sharing Californians’ Personal Health Data with ICE

    Source: US State of California

    OAKLAND – California Attorney General Rob Bonta today, leading a multistate coalition, is filing a lawsuit challenging the U.S. Department of Health and Human Services’ (HHS) decision to provide unfettered access to individual personal health data to the Department of Homeland Security (DHS), which houses Immigration and Customs Enforcement (ICE). In the seven decades since Congress enacted the Medicaid Act to provide medical assistance to vulnerable populations, federal law, policy, and practice has been clear: the personal healthcare data collected about beneficiaries of the program is confidential, to be shared only in certain narrow circumstances that benefit public health and the integrity of the Medicaid program itself. In today’s lawsuit filed in the U.S. District Court for the Northern District of California, Attorney General Bonta and the coalition argue that the mass transfer of this data violates the law and ask the court to block any new transfer or use of this data for immigration enforcement purposes. 

    “The Trump Administration has upended longstanding privacy protections with its decision to illegally share sensitive, personal health data with ICE. In doing so, it has created a culture of fear that will lead to fewer people seeking vital emergency medical care,” said Attorney General Bonta. “I’m sickened by this latest salvo in the President’s anti-immigrant campaign. We’re headed to court to prevent any further sharing of Medicaid data — and to ensure any of the data that’s already been shared is not used for immigration enforcement purposes.”

    Created in 1965, Medicaid is an essential source of health insurance for lower-income individuals and particular underserved population groups, including children, pregnant women, individuals with disabilities, and seniors. The Medicaid program allows each participating state to develop and administer its own unique health plans; states must meet threshold federal statutory criteria, but they can tailor their plans’ eligibility standards and coverage options to residents’ needs. As of January 2025, 78.4 million people were enrolled in Medicaid and the Children’s Health Insurance Program (CHIP) nationwide.  

    California’s Medi-Cal program provides healthcare coverage for one out of every three Californians, including more than two million noncitizens. Noncitizens include green card holders, refugees, individuals who hold temporary protected status, Deferred Action for Childhood Arrival recipients, and others. Not all noncitizens are eligible for federally funded Medi-Cal services, and so California uses state-only funds to provide a version of the Medi-Cal program to all eligible state residents, regardless of their immigration status. 

    A certain amount of personal data is routinely exchanged between the states and the federal government for purposes of administering Medicaid, including verifying eligibility for federal funding. Historically, DHS has acknowledged that the Medicaid Act and other federal healthcare authorities foreclose the use of Medicaid personal information for immigration enforcement purposes. Yet now, the federal government appears to have — without formal acknowledgment — adopted a new policy that allows for the wholesale disclosure and use of state residents’ personal Medicaid data for purposes unrelated to Medicaid program administration. On June 13, 2025, California and other states learned through news reports that HHS has transferred en masse their state’s Medicaid data files, containing personal health records representing millions of individuals, to DHS. Reports indicate that the federal government plans to create a sweeping database for “mass deportations” and other large-scale immigration enforcement purposes.

    The federal government claims it gave this data to DHS “to ensure that Medicaid benefits are reserved for individuals who are lawfully entitled to receive them.” But it is Congress that extended coverage and federal funds for emergency Medicaid to all individuals residing in the United States, regardless of immigration status. The states have and will continue to cooperate with federal oversight activities to ensure that the federal government pays only for those Medicaid services that are legally authorized.  

    In today’s lawsuit, Attorney General Bonta and the coalition highlight that the Trump Administration’s illegal actions are creating fear and confusion that will lead noncitizens and their family members to disenroll, or refuse to enroll, in emergency Medicaid for which they are otherwise eligible, leaving states and their safety net hospitals to foot the bill for federally mandated emergency healthcare services.  They may not get the emergency health services they need and will suffer negative health consequences — and even death — as a result. The coalition asks that the court find the Trump Administration’s actions arbitrary and capricious and rulemaking without proper procedure in violation of the Administrative Procedure Act, contrary to the Social Security Act, Health Insurance Portability and Accountability Act (HIPAA), Federal Information Security Modernization Act, and Privacy Act, and in violation of the Spending Clause. They ask the court to enjoin HHS from transferring personally identifiable Medicaid data to DHS or any other federal agency and DHS from using this data to conduct immigration enforcement.  

    Attorney General Bonta leads the attorneys general of Arizona, Colorado, Connecticut, Delaware, Hawaii, Illinois, Massachusetts, Maine, Maryland, Michigan, Minnesota, Nevada, New Jersey, New Mexico, New York, Oregon, Rhode Island, Vermont, and Washinton in filing the lawsuit. 

    A copy of the lawsuit will be posted online here when available.

    MIL OSI USA News

  • MIL-OSI USA: Justice Department Charges Two Individuals with Acting as Agents of the PRC Government

    Source: US State of California

    Arrests Disrupted Clandestine PRC Ministry of State Security Intelligence Network Operating in the United States

    Two nationals of the People’s Republic of China (PRC) made their initial appearances in federal court in Portland, Oregon, and Houston, Texas, yesterday to face charges issued out of the Northern District of California for acting as agents of the Government of the PRC without prior notification to the Attorney General. The defendants, Yuance Chen, 38, a PRC national and legal permanent resident who resides in Happy Valley, Oregon, and Liren “Ryan” Lai, 39, a PRC national who traveled from the PRC to Houston, Texas, on a tourist visa in April 2025, were arrested Friday on a criminal complaint charging them with overseeing and carrying out various clandestine intelligence taskings in the United States on behalf of the PRC Government’s principal foreign intelligence service, the Ministry of State Security (MSS). These activities included facilitating a “dead drop” payment of cash for information relating to the national security of the United States previously provided to the MSS, gathering intelligence about U.S. Navy service members and bases, and assisting with efforts to recruit other individuals from within the U.S. military as potential MSS assets.

    Chen and Lai were arrested on June 27, 2025, by the FBI in Happy Valley, Oregon, and Houston Texas, as part of a coordinated counterintelligence and law enforcement operation across multiple states.

    “This case underscores the Chinese government’s sustained and aggressive effort to infiltrate our military and undermine our national security from within,” said Attorney General Pamela Bondi. “The Justice Department will not stand by while hostile nations embed spies in our country – we will expose foreign operatives, hold their agents to account, and protect the American people from covert threats to our national security.”

    “The FBI arrested two Chinese nationals who were allegedly attempting to recruit U.S. military service members on behalf of the PRC,” said FBI Director Kash Patel. “The Chinese Communist Party thought they were getting away with their scheme to operate on U.S. soil, utilizing spy craft, like dead drops, to pay their sources. This case was a complex, coordinated effort and is an example of outstanding counterintelligence work done by FBI San Francisco, Portland, Houston, San Diego, and the Counterintelligence Division. The FBI will continue to vigilantly defend the homeland from China’s pervasive attempts to infiltrate our borders.”

    “Adverse foreign intelligence services like the PRC’s Ministry of State Security dedicate years to recruiting individuals and cultivating them as intelligence assets to do their bidding within the United States,” said Assistant Attorney General for National Security John A. Eisenberg. “Under my leadership, the National Security Division will continue to defend our nation and neutralize our adversaries’ clandestine spy networks.”

    “These charges reflect the breadth of the efforts by our foreign adversaries to target the United States — this time by conducting illegal intelligence-gathering operations aimed at our national security information and military service members,” said U.S. Attorney Craig H. Missakian for the Northern District of California. “My office and the FBI remain ever vigilant in guarding against these threats to the United States. We will continue to undertake counterespionage investigations and prosecutions, no matter how complex and sensitive, to disrupt attempts to weaken our national security.”

    As alleged in the criminal complaint unsealed yesterday, the PRC Government conducts intelligence activities against the United States through multiple arms, including the MSS. The MSS handles civilian intelligence collection for the PRC and is responsible for counterintelligence and foreign intelligence, as well as political security. The MSS and its bureaus seek to obtain information on political, economic, and security policies that might affect the PRC, along with military, scientific, and technical information of value to the PRC. The MSS and its bureaus are tasked with conducting clandestine and covert human source operations, of which the United States is a principal target.

    As alleged in the criminal complaint, Lai recruited Chen to work on behalf of the MSS in or about 2021. While in Guangzhou, China, in January 2022, Lai and Chen worked together to facilitate a dead-drop payment of at least $10,000 on behalf of the MSS, working with other individuals located in the United States to leave a backpack with the cash at a day-use locker at a recreational facility located in Livermore, California.

    Following the January 2022 dead drop, Lai and Chen continued to work on behalf of the MSS, including to help identify potential assets for MSS recruitment within the ranks of the U.S. Navy. For example, beginning in 2022, Chen was tasked by Lai and other agents of the MSS to contact a Navy employee over social media, and then later, in 2025, arranged for a tour with the employee of the USS Abraham Lincoln and provided information about the employee to the MSS. In 2022 and 2023, Chen was tasked to visit a U.S. Naval installation in Washington State and a U.S. Navy recruitment center in San Gabriel, California. While in the recruitment center, Chen obtained photographs of a bulletin board containing the names, programs, and hometowns of recent Navy recruits, the majority of whom listed their hometown as “China,” which he appears to have transmitted to an MSS intelligence officer in China. The complaint also alleges that Chen received instruction from the MSS on what to say to potential recruits regarding potential payment that could be made by the MSS, preferred Naval job assignments for potential recruits, and methods for minimizing Chen’s risk of exposure. The complaint alleges that in 2023, Lai flew to the United States from the PRC and provided Chen with a cellphone that Chen then used to communicate with the MSS. The complaint also alleges that Chen traveled to Guangzhou and met with MSS intelligence officers in April 2024 and March 2025 in order to discuss compensation and specific taskings.

    The complaint also alleges that Lai traveled to Houston, Texas, in April 2025, claiming that the purpose of his visit was related to his business as an online retail seller, and that he would be staying in the Houston area for two weeks. However, on May 9, 2025 – more than four weeks after his arrival in the United States – Lai traveled by car with a companion from Houston to Southern California, via New Mexico and Tucson, Arizona, before returning to Texas, on May 15, 2025.

    Chen and Lai are charged with violating Title 18, United States Code, Section 951, which makes it a crime for a person to operate or agree to operate within the United States as an agent of a foreign government without notification to the Attorney General of the United States. If convicted, the defendants face a fine of up to $250,000 and a term of imprisonment of up to 10 years.

    The FBI San Francisco Field Office is leading the investigation, with valuable assistance provided by the FBI Portland, Houston, and San Diego Field Offices. The Naval Criminal Investigative Service (NCIS) also provided valuable assistance during the operation. 

    The National Security and Special Prosecutions Section of the U.S. Attorney’s Office for the Northern District of California and the National Security Division’s Counterintelligence and Export Control Section are in charge of the prosecution. Significant operational support and assistance is also being provided by the District of Oregon, the Southern District of Texas, and the Southern District of California.

    A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Africa: African Development Bank approves ZAR 2.5 billion loan to City of Johannesburg for critical urban infrastructure development


    Download logo

    The Board of Directors of the African Development Bank Group (www.AfDB.org) has approved a ZAR 2.5 billion (approximately $139 million) corporate loan to the City of Johannesburg Metropolitan Municipality, marking the Bank’s first direct lending to a subnational entity in Africa.  

    The transaction will finance critical infrastructure projects in electricity, water, sanitation, and solid waste management, directly benefiting over 6 million residents in South Africa’s economic powerhouse. 

    The approval marks a transformative moment for municipal financing across Africa, operationalizing the African Development Bank’s Guidelines for Subnational Finance for the first time. The funding will exclusively support trading services infrastructure that generates revenue, ensuring sustainable debt repayment, while addressing urgent challenges in service delivery. 

    “This landmark transaction, led by the African Development Bank’s Infrastructure and Urban Development Department, in coordination with the Water and Sanitation Department,  and the Power Department, signals a new era in how the African Development Bank can empower cities,” said the Bank’s Vice President for Private Sector, Infrastructure & Industrialization, Solomon Quaynor. “By directly financing Johannesburg, we are unlocking a scalable model for subnational lending that enables multi-sectoral infrastructure delivery and positions the Bank as a trusted partner in driving sustainable, inclusive urban development across Africa.” 

    The loan will finance over 100 carefully selected projects across four vital sectors: upgrading distribution networks, installing smart meters, expanding renewable energy capacity, and connecting 3,200 new households to the grid; rehabilitating aging pipelines, upgrading treatment facilities, and reducing water losses from 46% to 37%;  and improving landfill compliance, expanding recycling facilities, and enhancing waste collection services. 

    “This historic transaction demonstrates the African Development Bank’s commitment to supporting creditworthy cities as engines of economic growth,” said the African Development Bank’s Director General for Southern Africa, Kennedy  Mbekeani. “Johannesburg is not just South Africa’s largest city – it contributes 16% to the country’s GDP and serves as a gateway for investment across the continent. By strengthening its infrastructure backbone, we’re investing in Africa’s urban future.” 

    The City of Johannesburg faces significant infrastructure challenges, with annual electricity losses of 30% for the past three years and water losses of 46.1%. The project is expected to create 2,869 jobs during construction and substantially improve service reliability for millions of residents. 

    An additional $1.5 million grant through the Bank’s Urban and Municipal Development Fund is being sought to support municipal reforms, governance and climate-resilient planning initiatives. 

    Beyond infrastructure improvements, the project will deliver significant socioeconomic benefits:  

    • 592 full-time equivalent jobs, with 14% reserved for women and 23% for youth. 
    • Reduced electricity and water interruptions will boost productivity for 65% of electricity and 5% of water consumed by industry. 
    •  Enhanced free basic services for 160,000 indigent households.  
    • ZAR 500 million in contracts earmarked for small and medium enterprises, with 40% reserved for women-owned businesses and 50% for youth entrepreneurs. 

    The African Development Bank has included comprehensive safeguards in the project to assure robust monitoring and oversight, transparency, compliance, and sound financial management throughout the loan lifecycle. 

    Distributed by APO Group on behalf of African Development Bank Group (AfDB).

    Media contact: 
    Emeka Anuforo
    Communication and External Relations Department
    media@afdb.org

    About the African Development Bank Group:
    The African Development Bank Group is Africa’s premier development finance institution. It comprises three distinct entities: the African Development Bank (AfDB), the African Development Fund (ADF) and the Nigeria Trust Fund (NTF). On the ground in 41 African countries with an external office in Japan, the Bank contributes to the economic development and the social progress of its 54 regional member states.

    For more information: www.AfDB.org

    MIL OSI Africa

  • MIL-OSI Africa: Liberia: Totota Peace Hut Setting the Pace for Rural Women Empowerment


    Download logo

    The thriving, lively rural town of Totota, Bong County will never be the same, according to women beneficiaries of the Totota Peace Hut. “This town is growing and changing in terms of mentoring and improving the attitude, skills, and public-speaking confidence of women so we can reach to that height we all aspire to acquire in life,” said Annie G. Saah, 53, member of the peace hut and Chairlady of the One Voice Group.

    “Our peace hut in Totota has helped in improving the lives of women and young girls. Through this peace hut, women and girls have gained valuable skills in literacy, computer training, group and individual farming, village savings and loan scheme as well as conflict resolution and mediation outreach at household and community-levels, and I am one such example. I have my individual potatoes garden, my house-side bag garden together with a group farm. We use the proceeds for our children’s tuition and other family needs,” added Annie G. Saah.

    Annie, Miatta Borbor, and nearly 50 other women meet at the peace hut on a weekly basis to support one another in peacebuilding, literacy, computer skills, petty business management, and small-scale farming. “Thanks to UN Women, Plan International, Orange Foundation, and the Peacebuilding Fund for their support in giving women the skills they need to become marketable and active contributors not just to our families but also to the community of Totota,” said Miatta Borbor, a member of One Voice Group at the peace hut.

    True to Annie and Miatta’s words on the empowerment of women, in November 2024, during an indoor programme at Totota Peace Hut in Bong County, visiting Peacebuilding Commission Chair and Sweden’s Ambassador to the UN in New York, Amb. Nicola Clase and delegation witnessed a life-changing moment. Three formerly illiterate women – Mary Sheriff, Gbentelo Kennedy, and Oretha Jallah – proudly demonstrated their peace hut-acquired literacy skills by writing their names and telephone numbers on paper to the admiration of the visitors. The audience applauded them for their literacy achievements. Ma Mary Sandiman, Chairlady of Totota Peace Hut, emphasized the need to continue the peace hut: “This peace hut must continue here so more women can learn to read and write and to enhance women’s unity so women themselves can drive the change they need.”

    The vegetable gardens, small businesses, the conflict mediation roles, and the computer training have all had tremendous impact on women beneficiaries by enabling them to earn money, support their households, participate in public and community discussions, and enhance peaceful co-existence among people. Rev Fahnlon A. Mulbah, Coordinator of the Orange Digital Center (ODC) within the Totota Peace Hut, underscored the life-improving results of the peace hut and the ODC on young women. “Computer literacy is a globally required skills area especially for women and girls to earn income and advertise their work on phone and on a computer.” He disclosed that Grace Pope, a resident of Totota, acquired digital skills in the application of cell phone for business and started advertizing and doing Orange Mobile Money, and then relocated to Monrovia where she’s living and working.

    The empowerment and results-oriented achievements at the Totota Peace Hut was made possible through the seamless collaboration among UN Women, Plan International, Government of Liberia, Orange Foundation, and other partners with funding from the UN Peacebuilding Fund. Each organization lent its own comparative advantage, garnered resources, and provided backstopping and technical inputs to make the peace hut functional and effective.

    Peace huts across Liberia have become a useful model for driving rural women’s collective empowerment. According to UN Women, the women of Liberia gained national and international acclaim as champions of peace through their mass action campaign that pressured warring factions to agree to a peace settlement in 2003.  As part of this effort, the women, under the banner “Liberian Women Mass Action for Peace”, launched the Peace Hut model in 2004 to provide a space for community women to discuss issues of peace, including ongoing community and domestic violence. Since then, the Peace Huts have evolved into a multi-faceted platform that promotes gender equality and the empowerment of women especially in rural communities.

    Distributed by APO Group on behalf of UN Women – Africa.

    MIL OSI Africa

  • MIL-OSI Russia: State Council Commission Meeting at the State University of Management: Technical Innovations and Traditional Values Will Become Priorities of Russian Education Until 2036

    Translation. Region: Russian Federal

    Source: State University of Management – Official website of the State –

    On July 1, 2025, a joint meeting of the commissions of the State Council of the Russian Federation in the areas of “Personnel”, “Youth and Children”, “Family” was held at the site of the State University of Management to consider the draft Strategy for the Development of Education in the Russian Federation until 2036.

    The moderator of the meeting, Russian journalist and TV presenter Ernest Matskyavichyus, introduced the main participants in the discussion and reported that more than 1,000 experts worked on the text of the Education Development Strategy, many of whom are present at the meeting.

    The Chairman of the Commission of the State Council of the Russian Federation on “Personnel”, Governor of the Kaluga Region, and graduate of the State University of Management Vladislav Shapsha noted in his welcoming speech that the education system should be flexible and adaptive, integrated into the real sector of the economy and continuous.

    “Today, a situation has arisen where one specialty is no longer enough for an educated person; at least two are needed to always be prepared for the changing situation on the labor market. Qualified specialists of a new type must think innovatively and be able to solve problems in the context of rapid digital transformation and global competition. The key tasks now are: synchronizing education with the labor market, overcoming imbalances in personnel training and forming a system of advanced training, since in the future the situation will change even faster, and artificial intelligence can sharply reduce employment in many areas of labor activity,” warned Vladislav Shapsha.

    The Chairman of the State Council of Russia Commission on “Youth and Children”, Governor of the Yamalo-Nenets Autonomous Okrug Dmitry Artyukhov expressed pleasure at the representative meeting on such a comprehensive topic.

    “Education is a vital area that concerns absolutely everyone: teachers, parents, and millions of children and young people across the country. We have done serious work on the Education Development Strategy on the instructions of the President. Now it is time to move on to action – to focus on implementing our plans. Together, we are laying the foundation for the future of Russian education. This is a vital state task, because it is education that solves key problems for the country: it provides knowledge and skills, trains personnel for the economy, and most importantly, brings up a new generation of Russians,” said Dmitry Artyukhov.

    The Chairman of the State Council of Russia’s Commission on the “Family” Direction, Head of the Republic of Mordovia Artem Zdunov drew the attention of those gathered to the fact that the document under discussion will determine the development vectors not only of education itself, but also through it of the entire country as a whole.

    “I will note two key priorities of the Strategy. The first is the further implementation of high-quality education regardless of the place of residence and social status of the family. Much has already been done for this: new schools and kindergartens have been built, major repairs have been carried out, and institutions have been equipped with modern equipment. The second priority is that the education system should be built on the basis of traditional Russian values, including a strong family. Efforts in this direction should be systemic and continuous, starting from kindergarten to university. The cult of large families should be spread everywhere, similar to how this year we widely celebrate the 80th anniversary of Victory in the Great Patriotic War – information should be broadcast from TV screens, from the Internet, from billboards on city streets and in educational institutions,” said Artem Zdunov.

    Deputy Minister of Education of the Russian Federation Irina Shvartsman said that a public opinion poll was conducted to prepare the draft Strategy for the Development of Education, which affected 338 thousand people. The structure of the Strategy was developed by 15 working groups, including representatives of all departments, the Presidential Administration, the Russian Academy of Education and other experts.

    “The strategy does not hide the problems, it is designed to identify and eliminate them. These are the problems of a shortage of personnel and wages, dilapidated buildings, bureaucratic burden on teachers, and the ideological gap between teachers and students. One of the main values in the education system should be a person. The rights of children and teachers should be equally protected. And to achieve humanitarian and scientific-technical leadership of Russia in the world, it is necessary not only to train qualified specialists, but also to work systematically in the direction of patriotic education,” said Irina Shvartsman.

    Deputy Minister of Science and Higher Education of the Russian Federation Dmitry Afanasyev noted that for the first time in Russia a single document on issues of education development is appearing.

    “In response to current challenges, the Ministry of Education and Science proposes to create a new list of specialties that meet the country’s strategic objectives, reboot and update state programs such as “Priority 2030” and “Advanced Engineering Schools”, and continue to build new university campuses. In addition, it is necessary to strengthen the influence of domestic education abroad, develop online forms of education, and promote the Russian language as the language of international communication. In this area, the Strategy still requires revision,” Dmitry Afanasyev said.

    Rector of the State University of Management Vladimir Stroyev noted the significant number of GUU graduates at a meeting of the State Council commissions and spoke about the work of the university.

    “The need to change the education system is obvious, but its conservatism can also have its advantages. Until the 1990s, GUU was not a management university, but an engineering and economics university. And we managed to preserve elements of the previous system. Starting in 2022, we are actively reviving the system of training industry managers who understand and know the production base well. For this purpose, GUU is implementing a system of seamless project-based learning. The structure of the university includes the Pre-University – a budget school where, in addition to studying general subjects, students begin to get used to practice-oriented learning. GUU is probably the only university in the country where project-based learning is practiced in 100% of areas of education, starting from the 1st year, which by the end of the study leads to a high level of graduate employment. In addition, we do not forget about the meanings – we are a leading university in the field of educational work, we support student families, and we encourage employees to have children. Our task is not only to raise a competent manager, but also to educate him as a responsible citizen who works for the benefit of the state and society,” said Vladimir Stroyev.

    In addition, the rector of the State University of Management introduced the meeting participants to the scientific and technical achievements of the university, in particular, to the system of work of the inter-university design bureau, and invited those interested to take a tour of the university.

    The meeting was also attended by: Deputy Head of the Secretariat of the Deputy Prime Minister of the Russian Government Antony Shvindt, Director of the Department of Personnel Policy of the Ministry of Education and Science of the Russian Federation Alexey Svistunov, Deputy Governor of the Kaluga Region Tatyana Leonova, Deputy Head of the Federal Service for Supervision in Education and Science Evgeny Semchenko and many other experts.

    Summing up the panel discussion, the Chairman of the State Council of the Russian Federation Commission on Personnel Vladislav Shapsha particularly highlighted the topic raised by many speakers about the key role of education within the Education Development Strategy. “You can teach a lot, but if a person does not have a moral core, then his technical skills can be harmful. The Russian person has always been spiritual. You cannot understand Russia with your mind, you cannot measure it with a common yardstick…”, Vladislav Valerievich concluded the meeting of the State Council commissions with a quote from a poem by Fyodor Tyutchev.

    After the end of the panel discussion, the participants of the meeting of the State Council commissions were given a tour of the State University of Management, as promised by the rector. In addition to the experts, the moderator of the discussion, Ernest Matskyavichyus, did not miss this opportunity.

    The guests were shown the new workshop of the student design bureau “Innovative Solutions”, the Engineering Project Management Center and the Media Center of the State University of Management. Antoniy Shvindt paid special attention to the scientific and technical developments of the State University of Management. Aleksey Svistunov appreciated the comfort and equipment of the premises. Ernest Matskyavichyus, naturally, was most interested in the studios, and Tatyana Leonova even proposed a project for a series of short educational videos on the topic of management science.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI USA: AFSCME’s Saunders: The Senate’s distorted priorities will leave working people footing the bill

    Source: American Federation of State, County and Municipal Employees Union

    WASHINGTON – AFSCME President Lee Saunders released the following statement after the Senate passed its version of the budget reconciliation bill, which would bring even deeper cuts to Medicaid while also slashing food assistance and public services nationwide:

    “We are deeply disappointed by the Senate’s decision to pass a dangerous budget that tears health care away from over 20 million people, leaves millions without food assistance, and saddles working families with higher costs. From the caregivers who rely on Medicaid to keep their loved ones at home, to the hardworking parents struggling to afford groceries, to the nurses worried about their patients losing care, everyday people will foot the bill for a budget that hands more tax cuts to billionaires at the expense of our communities.

    “For months, AFSCME members have urged Congress to reject this morally bankrupt budget and put working families ahead of debt-exploding tax cuts for the ultra-wealthy. Instead, a narrow majority in the United States Senate sold out their own constituents by gutting the health care, food assistance and public services our communities count on. Their distorted priorities will not only increase costs for working people but also ignite a fiscal catastrophe that will force states, counties, cities and towns to slash funding for local schools, hospitals, nursing homes, emergency response centers, colleges and other basic services or shut them down entirely.

    “This budget bill is deeply unpopular for a reason: It is the largest transfer of wealth from working families to billionaires and big corporations in American history, and it will cost lives and jobs. But this fight is not yet over. As this budget bill moves back to the House for final passage, AFSCME members will be getting organized and fighting tooth and nail to protect our communities.”

    MIL OSI USA News

  • MIL-OSI Security: Justice Department Charges Two Individuals with Acting as Agents of the PRC Government

    Source: United States Attorneys General 7

    Arrests Disrupted Clandestine PRC Ministry of State Security Intelligence Network Operating in the United States

    Two nationals of the People’s Republic of China (PRC) made their initial appearances in federal court in Portland, Oregon, and Houston, Texas, yesterday to face charges issued out of the Northern District of California for acting as agents of the Government of the PRC without prior notification to the Attorney General. The defendants, Yuance Chen, 38, a PRC national and legal permanent resident who resides in Happy Valley, Oregon, and Liren “Ryan” Lai, 39, a PRC national who traveled from the PRC to Houston, Texas, on a tourist visa in April 2025, were arrested Friday on a criminal complaint charging them with overseeing and carrying out various clandestine intelligence taskings in the United States on behalf of the PRC Government’s principal foreign intelligence service, the Ministry of State Security (MSS). These activities included facilitating a “dead drop” payment of cash for information relating to the national security of the United States previously provided to the MSS, gathering intelligence about U.S. Navy service members and bases, and assisting with efforts to recruit other individuals from within the U.S. military as potential MSS assets.

    Chen and Lai were arrested on June 27, 2025, by the FBI in Happy Valley, Oregon, and Houston Texas, as part of a coordinated counterintelligence and law enforcement operation across multiple states.

    “This case underscores the Chinese government’s sustained and aggressive effort to infiltrate our military and undermine our national security from within,” said Attorney General Pamela Bondi. “The Justice Department will not stand by while hostile nations embed spies in our country – we will expose foreign operatives, hold their agents to account, and protect the American people from covert threats to our national security.”

    “The FBI arrested two Chinese nationals who were allegedly attempting to recruit U.S. military service members on behalf of the PRC,” said FBI Director Kash Patel. “The Chinese Communist Party thought they were getting away with their scheme to operate on U.S. soil, utilizing spy craft, like dead drops, to pay their sources. This case was a complex, coordinated effort and is an example of outstanding counterintelligence work done by FBI San Francisco, Portland, Houston, San Diego, and the Counterintelligence Division. The FBI will continue to vigilantly defend the homeland from China’s pervasive attempts to infiltrate our borders.”

    “Adverse foreign intelligence services like the PRC’s Ministry of State Security dedicate years to recruiting individuals and cultivating them as intelligence assets to do their bidding within the United States,” said Assistant Attorney General for National Security John A. Eisenberg. “Under my leadership, the National Security Division will continue to defend our nation and neutralize our adversaries’ clandestine spy networks.”

    “These charges reflect the breadth of the efforts by our foreign adversaries to target the United States — this time by conducting illegal intelligence-gathering operations aimed at our national security information and military service members,” said U.S. Attorney Craig H. Missakian for the Northern District of California. “My office and the FBI remain ever vigilant in guarding against these threats to the United States. We will continue to undertake counterespionage investigations and prosecutions, no matter how complex and sensitive, to disrupt attempts to weaken our national security.”

    As alleged in the criminal complaint unsealed yesterday, the PRC Government conducts intelligence activities against the United States through multiple arms, including the MSS. The MSS handles civilian intelligence collection for the PRC and is responsible for counterintelligence and foreign intelligence, as well as political security. The MSS and its bureaus seek to obtain information on political, economic, and security policies that might affect the PRC, along with military, scientific, and technical information of value to the PRC. The MSS and its bureaus are tasked with conducting clandestine and covert human source operations, of which the United States is a principal target.

    As alleged in the criminal complaint, Lai recruited Chen to work on behalf of the MSS in or about 2021. While in Guangzhou, China, in January 2022, Lai and Chen worked together to facilitate a dead-drop payment of at least $10,000 on behalf of the MSS, working with other individuals located in the United States to leave a backpack with the cash at a day-use locker at a recreational facility located in Livermore, California.

    Following the January 2022 dead drop, Lai and Chen continued to work on behalf of the MSS, including to help identify potential assets for MSS recruitment within the ranks of the U.S. Navy. For example, beginning in 2022, Chen was tasked by Lai and other agents of the MSS to contact a Navy employee over social media, and then later, in 2025, arranged for a tour with the employee of the USS Abraham Lincoln and provided information about the employee to the MSS. In 2022 and 2023, Chen was tasked to visit a U.S. Naval installation in Washington State and a U.S. Navy recruitment center in San Gabriel, California. While in the recruitment center, Chen obtained photographs of a bulletin board containing the names, programs, and hometowns of recent Navy recruits, the majority of whom listed their hometown as “China,” which he appears to have transmitted to an MSS intelligence officer in China. The complaint also alleges that Chen received instruction from the MSS on what to say to potential recruits regarding potential payment that could be made by the MSS, preferred Naval job assignments for potential recruits, and methods for minimizing Chen’s risk of exposure. The complaint alleges that in 2023, Lai flew to the United States from the PRC and provided Chen with a cellphone that Chen then used to communicate with the MSS. The complaint also alleges that Chen traveled to Guangzhou and met with MSS intelligence officers in April 2024 and March 2025 in order to discuss compensation and specific taskings.

    The complaint also alleges that Lai traveled to Houston, Texas, in April 2025, claiming that the purpose of his visit was related to his business as an online retail seller, and that he would be staying in the Houston area for two weeks. However, on May 9, 2025 – more than four weeks after his arrival in the United States – Lai traveled by car with a companion from Houston to Southern California, via New Mexico and Tucson, Arizona, before returning to Texas, on May 15, 2025.

    Chen and Lai are charged with violating Title 18, United States Code, Section 951, which makes it a crime for a person to operate or agree to operate within the United States as an agent of a foreign government without notification to the Attorney General of the United States. If convicted, the defendants face a fine of up to $250,000 and a term of imprisonment of up to 10 years.

    The FBI San Francisco Field Office is leading the investigation, with valuable assistance provided by the FBI Portland, Houston, and San Diego Field Offices. The Naval Criminal Investigative Service (NCIS) also provided valuable assistance during the operation. 

    The National Security and Special Prosecutions Section of the U.S. Attorney’s Office for the Northern District of California and the National Security Division’s Counterintelligence and Export Control Section are in charge of the prosecution. Significant operational support and assistance is also being provided by the District of Oregon, the Southern District of Texas, and the Southern District of California.

    A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI: No Credit Check Loans Guaranteed Approval No credit Check- Radcred Launches New Features To Offer Instant Loans For US Borrowers In Need

    Source: GlobeNewswire (MIL-OSI)

    Glendale, California, July 01, 2025 (GLOBE NEWSWIRE) — RadCred, a leading innovator in financial technology, has launched a new platform designed to provide no credit check loans with guaranteed approval for U.S. consumers with bad credit. Unlike traditional banks, which often deny loans based on FICO scores, RadCred’s platform evaluates borrowers based on their income and repayment ability, ensuring that even those with low credit scores can access the funds they need.

    With same day funding and no hard credit checks, RadCred provides fast financial relief for urgent needs like medical bills, car repairs, or rent payments. RadCred’s platform guarantees approval for bad credit personal loans for eligible applicants, offering loans up to $5,000, making it an ideal solution for those who might otherwise be rejected by traditional lenders. Whether you’re seeking quick loans for bad credit or an emergency loan for bad credit with guaranteed approval, RadCred ensures you can get the funds you need when you need them most.

    What are No Credit Check Loans?

    No credit check loans are a type of personal loan for bad credit where the lender does not perform a hard credit inquiry, which can negatively impact a borrower’s credit score. Instead, these no credit check loans focus on a borrower’s income and ability to repay. RadCred’s no credit check loans guaranteed approval provide immediate access to cash without the usual barriers imposed by traditional lenders.

    Unlike traditional loans, which rely heavily on a borrower’s credit history, RadCred’s no credit check loans allow individuals with bad credit to access fast funding. RadCred uses a soft credit check to evaluate applications, meaning your credit score remains unaffected by the loan application process. This makes RadCred’s no credit check payday loans and bad credit personal loans guaranteed approval $5,000 ideal for people with low credit scores looking for fast financial relief.

    How RadCred Solves the Problem

    Many individuals with bad credit face barriers when seeking financial help. Traditional banks often reject loan applications from borrowers with a low credit score, leaving them without options in times of need. RadCred’s no credit check loans address this gap by focusing on income verification rather than credit history, making it easier for individuals to obtain loans for bad credit even with a credit score below 600.

    RadCred’s process is simple, transparent, and fast. Borrowers can apply for no credit check payday loans from the comfort of their home and get same day payday loans. By evaluating applicants based on income, RadCred ensures more inclusive access to bad credit personal loans guaranteed approval $5,000, making it one of the most reliable lenders for bad credit borrowers.

    Key Features of RadCred’s No Credit Check Loans:

    • Guaranteed Approval: Guaranteed approval for eligible applicants based on income, not FICO score. Borrowers with bad credit have a high chance of approval.
    • No Hard Credit Check: RadCred uses a soft credit inquiry, ensuring your credit score is not impacted by the loan application.
    • Same-Day Funding: Funds are typically deposited directly into your bank account the same day, providing fast access to cash.
    • Flexible Loan Terms: RadCred offers flexible repayment plans, allowing borrowers to choose a term length that suits their financial situation.
    • Transparent Terms: RadCred discloses APR, fees, and repayment schedules upfront, ensuring no hidden charges.

    How to Get Guaranteed Approval for No Credit Check Loans

    Applying for no credit check loans with guaranteed approval is easy with RadCred’s streamlined online process:

    1. Apply Online: Complete a short application form with basic personal and financial information.
    2. Soft Credit Check: RadCred uses a soft credit check, so your credit score is not affected by the application.
    3. Receive Multiple Offers: RadCred’s system matches you with lenders based on your income and requested loan amount, giving you options to compare.
    4. Choose Your Offer: Select the loan offer that best fits your needs.
    5. Receive Funds: After approval, funds are typically transferred to your bank account within hours.

    Eligibility for No Credit Check Loans

    To apply for no credit check loans through RadCred, borrowers must meet the following criteria:

    • Must be at least 18 years old.
    • Must be a U.S. resident with a valid U.S. address.
    • Must have stable income (e.g., employment, benefits).
    • Must have an active bank account for loan disbursement.
    • No credit score requirement, though income and repayment ability are key factors.

    Why RadCred is the Ideal Choice for Bad Credit Borrowers

    RadCred stands out as a reliable solution for individuals seeking no credit check loans with guaranteed approval, especially those with bad credit. Here are some key advantages of choosing RadCred:

    • Same-Day Funding: RadCred offers fast access to funds, ensuring you get the money you need when emergencies arise.
    • No Hidden Fees: The platform provides transparent APRs and terms, ensuring borrowers won’t face unexpected charges or surprises.
    • Flexible Terms: You can select a loan amount and repayment plan that best fits your financial situation, offering more control over your loan.
    • Trustworthy Network: RadCred partners exclusively with licensed lenders who adhere to ethical lending practices, ensuring a safe borrowing experience.
    • Safe and Secure: With advanced encryption, RadCred protects your personal and financial data, giving you peace of mind throughout the process.

    RadCred’s no credit check loans provide a transparent, secure, and flexible way for bad credit borrowers to access urgent financial relief.

    RadCred Offers Various No Credit Check Loan Options for Borrowers with Bad Credit

    RadCred’s platform is designed to help individuals facing financial difficulties, especially those with bad credit, by providing a range of no credit check loan options. With a focus on income and repayment ability, RadCred ensures a quick and seamless loan process, making it a reliable choice for borrowers who may have been turned down by traditional banks.

    Types of No Credit Check Loans Provided by RadCred

    1. Payday Loans Online (Same Day):
      RadCred connects borrowers with lenders who offer payday loans online with same-day funding. These short-term loans are ideal for those who need urgent financial assistance before their next paycheck.
    2. Bad Credit Payday Loans:
      Tailored for individuals with poor credit scores, RadCred’s bad credit payday loans provide quick access to funds with guaranteed approval based on income verification, rather than credit history.
    3. Installment Loans No Credit Check:
      For larger expenses, RadCred offers installment loans with flexible repayment terms. These loans are ideal for those who need more time to repay their borrowed amount.
    4. Emergency Loans Without Credit Checks:
      RadCred provides emergency loans to cover unexpected expenses such as medical bills or urgent home repairs. The process is fast and efficient, ensuring that funds are available when needed most.
    5. 1-Hour Payday Loans:
      For immediate financial needs, RadCred offers 1-hour payday loans, providing quick funding for those in urgent need of cash.

    These loan types offer flexibility and quick access to cash, all while ensuring that borrowers do not face the traditional barriers imposed by credit score checks.

    How RadCred’s No Credit Check Loans Compare to Traditional Loans

    Traditional Loans:

    • Strict credit score requirements: Traditional lenders, such as banks and credit unions, heavily rely on credit scores to determine eligibility. Individuals with bad credit or a low credit score often face difficulty in securing loans. If your score is below 600, the chances of qualifying for a traditional loan are significantly reduced.
    • Longer approval processes: The approval process for traditional loans is often lengthy and involves numerous steps. Applicants typically need to submit extensive paperwork, including proof of income and assets. The long waiting time is a major disadvantage for those needing immediate access to funds for emergencies.
    • Higher risk of rejection for bad credit borrowers: Traditional loans are usually not accessible to individuals with bad credit. The rejection rate is high for bad credit borrowers because traditional lenders focus primarily on the applicant’s credit history. As a result, those with poor credit scores or limited credit history are often denied financial assistance.

    RadCred No Credit Check Loans:

    • Focus on income and repayment ability: Unlike traditional lenders, RadCred evaluates applicants based on their income and repayment ability, rather than credit scores. This provides an opportunity for borrowers with bad credit to qualify for loans.
    • Guaranteed approval for eligible applicants: RadCred offers guaranteed approval to borrowers who meet the basic eligibility criteria, ensuring that more individuals can secure funds.
    • Fast, same-day funding with no hard credit checks: RadCred’s platform offers same day funding and does not perform hard credit checks, which means applying will not impact your credit score. This makes it an ideal choice for those needing immediate funds for emergencies.

    In comparison to traditional loans, RadCred is a faster, more inclusive, and accessible lending solution, especially for individuals with bad credit.

    Frequently Asked Questions (FAQs)

    Q1: What is the maximum loan amount for no credit check loans?
    RadCred offers loans up to $5,000 for eligible applicants, depending on income and other factors. Some lenders in RadCred’s network may even offer amounts up to $10,000 based on your financial profile.

    Q2: How fast will I receive the money?
    Once approved, RadCred typically transfers funds to your bank account the same day. The exact timing can depend on your bank’s processing times.

    Q3: Will applying for a loan affect my credit score?
    No, RadCred uses a soft credit check, which will not impact your credit score. This ensures you can apply for loans with confidence, even with a low credit score.

    Q4: Are there any hidden fees?
    No, RadCred is committed to transparency. All fees, APR, and repayment terms are disclosed upfront, so you won’t face any unexpected charges.

    Final Thoughts on RadCred’s No Credit Check Loans

    RadCred’s no credit check loans offer a flexible, accessible solution for individuals who need bad credit loans. With guaranteed approval based on income and a no credit check approach, RadCred makes it easier for U.S. residents to access funds when they need them most. Whether you need emergency loans for bad credit or are simply looking for a way to manage unexpected expenses, RadCred offers a fast, secure, and reliable platform for financial relief.

    Disclaimer:

    RadCred’s loan offers are subject to meeting lender requirements and state-specific regulations. While RadCred provides high approval rates for bad credit applicants, no loan is truly guaranteed for everyone. Borrowers must meet basic eligibility criteria. RadCred uses a soft credit check, so your credit score won’t be affected by applying. Loan terms and amounts vary based on lender and borrower profile. Funds are typically deposited the same day, though exact timing may differ.

    The MIL Network

  • MIL-OSI Global: Where does the UK most need more public EV chargers?

    Source: The Conversation – UK – By Labib Azzouz, Research Associate in Transport and Energy Innovation, University of Oxford

    Electric vehicle chargers at a motorway service station in Grantham, England. Angus Reid/Shutterstock

    The automotive and EV industry has repeatedly insisted that the UK needs more electric vehicle (EV) chargers to help motorists make the switch from conventional fossil-fuel burning cars.

    The Labour government has announced £400 million to install EV chargers, mainly on streets in poorer residential neighbourhoods, in place of the Conservative’s £950 million rapid charging fund that was directed at installing chargers in motorway service stations.

    Does it matter where these chargers are – and who pays to build them?

    The short answer is yes, it does matter. Our research conducted at motorway and local EV charging stations across England – including those located in residential areas, high streets and community centres – indicates that these two types of infrastructure serve distinct groups of users and fulfil different purposes.

    Suggesting that one can substitute for the other risks sending mixed signals to both the industry and the driving public.

    We found that motorway charging stations tend to cater to wealthier men, who are more likely to own premium EVs with long-range batteries and better performance. Many of these drivers have access to home chargers, so their use of public chargers is only for occasional, long-distance travel for business, leisure, or holidays – trips that require chargers along motorways.

    Convenience and charging speed are often more important than the price of public charging, particularly when the travel costs of these drivers are covered by their employers.

    Local public charging stations, on the other hand, serve more diverse groups. These include drivers from lower-income households who are more likely to own older and smaller EVs with shorter ranges. Access to home charging is often limited, especially for people living in flats or urban areas without driveways, garages or off-street parking.

    Not everyone can plug in at home.
    Andersen EV/Shutterstock

    Local chargers are also vital for taxi and delivery drivers who depend on their vehicles for work and make frequent short trips throughout the day. There are many professional drivers without access to workplace charging stations who need alternative local provision – something the Conservative government recognised in its 2022 EV charging strategy.

    Ultimately, the transition to EVs should take a balanced approach that carefully considers social equity, economic viability and environmental impact.

    Different locations serve different drivers

    Motorway charging stations are commercially attractive to private investors, such as energy companies, specialist charging providers and car manufacturers, despite their higher upfront costs and complex requirements.

    This is because service stations offer greater short-term revenue due to their ability to set premium prices. This is a result of there being limited alternatives and high demand for rapid charging, especially among long-distance travellers, and the willingness of EV drivers to pay for speed and convenience – unlike in more price-sensitive neighbourhood settings.

    Unsurprisingly, the government found that the rapid deployment of motorway chargers in recent years has been largely driven by the private sector. Our research highlighted that these revenues could be enhanced by a broader range of retail, dining and relaxation amenities, turning the time waiting for a car to charge into a more productive and pleasurable experience.

    Residential charging stations may not offer high profits per charge, but they typically require lower capital investment and benefit from consistent and predictable use. They are also suited to measures for reducing strain on the grid and balancing energy supply and demand.

    These measures include tariffs that make it cheaper to charge EVs during off-peak hours, or technology that allows cars to feed electricity stored in batteries back into the grid. These features make them appropriate for public funding, where return on investment is measured not just in profit but in value for the public.

    Considering that local EV charging serves those who do not have access to home charging and who drive for a living, the case for public funding is even stronger. These sorts of chargers make switching to an EV easier for different groups.

    For example, safe and carefully placed public chargers could help more women switch to EVs – although our research suggests that, while “careful placement” might refer to residential areas, it doesn’t necessarily mean on streets. Well-lit car parks and community destinations are sometimes considered safer options.

    Charging points outside a community centre in the Outer Hebrides, Scotland.
    AlanMorris/Shutterstock

    By helping EV drivers make frequent short trips, local chargers can also significantly reduce urban air pollution, emissions and noise, contributing to more liveable, healthier cities.

    That said, motorway charging stations and those near key transport corridors still play a crucial role in a comprehensive national network, and public funding may be required in more peripheral and rural areas of the UK where installations lag and commercial interest is limited.

    While long-distance trips are less frequent than short ones, they account for a disproportionately large share of energy use and emissions. Switching such trips to electric will be essential to reaching net zero goals.

    It seems reasonable to prioritise public investment in local EV charging infrastructure to support a fairer EV transition, but this should not be limited to on-street chargers. Investment is needed in residential and non-residential areas, public car parks, community centres and workplaces.

    Different types of EV charging are not interchangeable – all are needed to support the switch.


    Don’t have time to read about climate change as much as you’d like?

    Get a weekly roundup in your inbox instead. Every Wednesday, The Conversation’s environment editor writes Imagine, a short email that goes a little deeper into just one climate issue. Join the 45,000+ readers who’ve subscribed so far.


    Labib Azzouz has received funding from the UK Research and Innovation via the UK Energy Research Centre and Innovate UK as part of the Energy Superhub Oxford (ESO) project.

    Hannah Budnitz receives government funding from UK Research and Innovation grants via the Economic and Social Research Council and the Engineering and Physical Sciences Research Council. She has also previously received funding from Innovate UK and the Department for Transport.

    ref. Where does the UK most need more public EV chargers? – https://theconversation.com/where-does-the-uk-most-need-more-public-ev-chargers-259623

    MIL OSI – Global Reports

  • MIL-OSI Global: Five ways to avoid illness like the Lionesses

    Source: The Conversation – UK – By Samantha Abbott, Doctoral Researcher, Department of Sport Science, Nottingham Trent University

    England’s Beth Mead cheering on podium after win v Germany in the Women European Championship Final 2022 photographyjp/Shutterstock

    Think back to the last time you had a cold or the flu. Now imagine stepping onto the pitch for a European Cup final, while battling through those symptoms. For elite athletes, illness can strike at the worst possible time – and it could hit women harder.

    Research suggests that female athletes are more susceptible to cold and flu-like illnesses than their male counterparts. For England women’s national football team, the Lionesses, this risk only increases before a major tournament like the Euros.

    Close contact, shared kit, disrupted sleep and travel all add up to a perfect storm for infection. But targeted nutritional strategies, alongside good sleep and hand hygiene, can offer a crucial line of defence.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    1. Fuel first: energy matters for immunity

    Before anything else, players need to eat enough. Energy supports both performance and immune function. In fact, female athletes who didn’t meet their energy needs in the run-up to the 2016 Olympics were four times more likely to report cold or flu symptoms.

    This is especially relevant in women’s football, where low energy and carbohydrate intake has been documented among professional players and recreational players too. Regular meals and snacks that include carbohydrate-rich foods like oats, bread and pasta, especially around training, are essential to meet energy demands and support immune health.

    2. Eat the rainbow

    Athletes are often encouraged to go beyond the public’s five-a-day fruit and veg target, aiming instead for eight to ten portions daily. Why? Because colourful plant foods are packed with vitamins, minerals, antioxidants and anti-inflammatory compounds: all vital for immunity.




    Read more:
    We’re told to ‘eat a rainbow’ of fruit and vegetables. Here’s what each colour does in our body


    Each colour offers unique benefits. For instance, red fruits and vegetables, such as tomatoes, contain lycopene, a powerful antioxidant. Orange produce like carrots get their colour from beta-carotene, which is converted by the body into vitamin A – a key vitamin for immune health.

    Eating a rainbow of colours means getting a wide range of nutrients.

    3. Vitamin C: powerful but timing matters

    Vitamin C has long been linked with reducing the risk and severity of cold and flu symptoms. One Cochrane review found that regular vitamin C intake halved the risk of illness in physically active people.

    However, more isn’t always better. Long-term use of high-dose vitamin C supplements could blunt training adaptations – the structural and functional changes the body undergoes in response to repeated exercise – because of its anti-inflammatory effects. That’s why vitamin C is most effective when used strategically, such as during high-risk periods like travel or intense competition. Good food sources include oranges, kiwis, blackcurrants, red and yellow peppers, broccoli and even potatoes.

    4. Gut health supports immune health

    Around 70% of the immune system is located in the gut, making gut health a key player in illness prevention. This is where probiotics (live bacteria) and prebiotics (which feed those bacteria) come in.

    Probiotics, found in fermented foods like kefir and kimchi or in supplement form, have been shown to reduce the duration and severity of respiratory illnesses in athletes. Prebiotics have similarly shown promise. In one study, a 24-week prebiotic intervention in elite rugby players reduced the duration of cold and flu symptoms by over two days.




    Read more:
    Gut microbiome: meet Lactobacillus acidophilus – the gut health superhero


    In the build-up to the Euros, including probiotic-rich foods in their diet or taking a daily prebiotic and probiotic supplement may help players stay healthy and return to training faster if they do get ill.

    5. Zinc lozenges: first aid for a sore throat

    If cold-like symptoms do appear, zinc lozenges can offer fast-acting relief. Zinc has antiviral, antioxidant and anti-inflammatory properties. When zinc is delivered as a lozenge, it acts directly in the throat, where many infections begin. Taken within 24 hours of symptoms starting, zinc lozenges could shorten illness duration by a third.

    But caution is key. Long-term use of high-dose zinc supplements can actually suppress immune function. Zinc lozenges should only be used short-term at symptom onset, not as a daily supplement.

    Staying match-ready during major tournaments means more than just tactical drills and fitness. Nutrition is a powerful ally in illness prevention, especially for women’s teams like the Lionesses. From fuelling adequately to supporting gut health and knowing when to supplement, these nutritional strategies can make the difference between sitting on the bench and bringing a trophy home.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Five ways to avoid illness like the Lionesses – https://theconversation.com/five-ways-to-avoid-illness-like-the-lionesses-259302

    MIL OSI – Global Reports

  • MIL-OSI USA: Welch Votes No on Republicans’ Disastrous Tax Bill 

    US Senate News:

    Source: United States Senator Peter Welch (D-Vermont)

    WASHINGTON, D.C. — U.S. Senator Peter Welch (D-Vt.), a member of the Senate Finance and Judiciary Committees, and Ranking Member of the Senate Agriculture Subcommittee on Rural Development, Energy, and Credit, released the following statement after voting in strong opposition against Senate Republicans’ disastrous tax bill:   
    “We have an obligation to put the constituents and hardworking families we represent first. Instead of helping everyday people, Republicans’ tax bill capitulates to President Trump and harms communities large and small. This cruel bill will take us back decades by exacerbating income inequality, ripping away health care, and rolling back progress on climate change. It will also raise costs and weaken the economy. All of this pain has been caused to help pay for tax cuts for the very wealthy—a top priority of President Trump. I am grateful to the few Republicans—Senators Tillis, Paul, and Collins—who voted against this terrible bill,” said Senator Welch. “The irony is all these hardships will be faced by citizens in red and blue states—the pain is bipartisan. It’s outrageous that families will now face untold hardships because of the Trump Administration’s cuts. I voted no on this bill and will fight to reverse these policies in any way I can.”  
    Republicans’ reckless tax and spending bill will block access to health care for 17 million people, rip away vital food assistance for millions, cut clean energy incentives and add a tax to wind and solar energy, raise utility bills and grocery prices, and tank the economy—all to pay for tax cuts for the very wealthy.    
    Senator Welch filed amendments and changes to Republicans’ One Big Beautiful Bill Act to strengthen the economy, protect access to health care and nutrition programs, and provide more stability for families and rural communities, including provisions to: 
    Protect Access to Health Care and Support Rural Hospitals:  

    Welch proposed requiring the Finance Committee to rewrite the bill to prevent harm to rural health care and the fiscal wellbeing of rural hospitals;  

    Welch proposed requiring the Finance Committee to exempt managed care programs operated by state governments like Vermont from any changes proposed to state directed payments.  

    Welch proposed requiring the Finance Committee to strike any changes to provider taxes, including changes that would impact states like Vermont with Medicaid expansion;  

    Welch proposed requiring the Health, Education, Labor and Pensions (HELP) Committee to make it easier to verify eligibility for the Affordable Care Act’s premium tax credits and expand special enrollment periods under certain circumstances. 

    Defend Food Assistance Programs:  

    Welch proposed requiring the Agriculture Committee to strike any cost-shifts of administering SNAP to states, which would kick American families off the food assistance they need and strain state budgets;  

    Welch proposed an amendment to strike administrative cost-shifts for SNAP;  

    Welch proposed an amendment to adjust the Thrifty Food Plan for cities, counties, and regions where the price of food is 10% higher than the national average;  

    Welch proposed an amendment that places a floor on SNAP allotments to households instead of a ceiling;  

    Welch proposed an amendment preserving the standard utility deduction, which cuts administrative red tape and boosts benefits by providing a more accurate portrayal of a household’s available resources for food when determining SNAP eligibility; 

    Welch proposed requiring the Agriculture Committee to rewrite the bill to allow volunteer work to qualify under SNAP’s work requirements.   

    Protect Programs and Government Services:  

    Welch proposed requiring the Finance Committee to rewrite the bill to maintain the energy efficient home improvement tax credit at current levels through 2028;  

    Welch proposed an amendment to strike the repeal of several home energy efficiency tax credits, including credits for home energy, rooftop solar, energy efficient homes for homebuilders, and more;  

    Welch proposed striking language in the bill that would rescind funding for state-based contractor training grants, as required in Welch’s HOPE for HOMES Act, passed as part of the Inflation Reduction Act;  

    Welch proposed striking language in the bill that would institute taxes on international remittances.  

    Welch proposed an amendment to dedicate funding for residential reentry centers, which are needed in Vermont;  

    Welch proposed an amendment to dedicate funding for the federal public defenders program, which is currently underfunded. 

    Senator Welch has been an outspoken opponent of the President Trump’s One Big Beautiful Bill Act, which Republicans are advancing through reconciliation process without Democratic support. Late Sunday evening, Senator Welch took to the Senate floor to reveal how Republicans’ disastrous tax and spending bill will force millions of working Americans in Vermont, West Virginia, and across the country to lose their health coverage, rip away vital food assistance for more than 42 million Americans, cut clean energy incentives and add a tax to wind and solar energy, raise utility bills and grocery prices, and tank the economy—all to pay for tax cuts for the very wealthy.   
    Welch has slammed the bill for threatening access to health care and cutting food assistance, and has sounded the alarm about how this bill will add more than $4 trillion to the national debt and tank the economy.    

    MIL OSI USA News

  • President Murmu inaugurates and lays foundation stones for key projects at Mahayogi Gorakhnath University

    Source: Government of India

    Source: Government of India (4)

    President Droupadi Murmu on Tuesday inaugurated and laid the foundation stone for multiple development projects at Mahayogi Gorakhnath University in Gorakhpur. The projects include the inauguration of the University’s Auditorium, Academic Block, and Panchkarma Kendra, as well as the foundation stone-laying for a new Girls’ Hostel.

    Addressing the gathering, the President praised the University for promoting a holistic approach to medicine by integrating allopathy and Ayurveda education and healthcare services through its Medical College, Ayurveda College, and affiliated hospitals. She also acknowledged the efforts of Gorakshanath Medical College Hospital and Research Centre, which is in the process of establishing a state-of-the-art 1800-bed hospital.

    Highlighting the role of private educational institutions in nation-building, the President emphasized that those committed to philanthropy and public service would play a key role in realizing the objectives of the National Education Policy (NEP) 2020. 

    Murmu noted that Mahayogi Gorakhnath University is the first private university in Gorakhpur and has, within just four years of its establishment, emerged as a significant centre for higher and employment-oriented education in eastern Uttar Pradesh.

    The President expressed her particular delight in laying the foundation stone for the new Girls’ Hostel, calling it a vital initiative for women’s empowerment. She stressed that lack of safe residential facilities often hinders girls’ access to higher education. In this regard, the University’s step to build a dedicated hostel for female students would make higher education more accessible and secure for women.

    “Education is the most effective means of empowerment,” the President said, applauding the University’s efforts in contributing to gender equity in education.

    Murmu also said that the overall health and educational development of Purvanchal, the eastern region of Uttar Pradesh, would significantly contribute to the inclusive growth of the entire state. “When Uttar Pradesh, the most populous state in the country, progresses rapidly, India as a whole will set new benchmarks in development,” she added.

  • MIL-OSI: SIMPPLE Ltd. Provides Compliance Updates with Nasdaq’s Continued Listing Requirements

    Source: GlobeNewswire (MIL-OSI)

    Singapore, July 01, 2025 (GLOBE NEWSWIRE) — SIMPPLE Ltd. (NASDAQ: SPPL) (“SIMPPLE” or “the Company”), a leading technology provider and innovator in the facilities management (FM) sector, today announced that it believes it has regained compliance with the minimum shareholders’ equity requirement under Nasdaq Listing Rule 5550(b)(1) due to strong financial performance and closing of a financing round, as well as the requirement to hold an annual meeting of shareholders under Nasdaq Listing Rule 5620(a).

    Shareholders’ Equity Compliance

    As of the date of this report, the Company believes its shareholders’ equity is above the Nasdaq $2.5 million requirement. This increase is partially attributable to the closing of a private investment in public equity (“PIPE”) offering for total gross proceeds of $2,000,001.00. The objective of this fund raise is to accelerate product development and to increase market share, especially in the Australia and New Zealand (ANZ) markets. In addition, the Company expects to continue strengthening its financial position for the full year, supported by robust operating performance for the first half of 2025. Based on these trends and internal forecasts, the Company projects that it will continue to meet and exceed shareholders’ equity requirement by year-end.

    Annual General Meeting Compliance

    Separately, the Company confirms that it has successfully concluded its Annual General Meeting of Shareholders (“AGM”), which was held at 9:00am Eastern Time, on June 30, 2025. The convening of this AGM satisfies the requirement under Nasdaq Listing Rule 5620(a) to hold an annual meeting of shareholders within the required timeframe. It is, however, also noted that the Company has announced earlier this year that it will rely on Cayman Islands home country exemption with regards to AGM requirements in the future.

    The Company will continue to monitor its ongoing compliance with all applicable Nasdaq listing standards and will provide further updates as appropriate.

    About SIMPPLE LTD.

    Headquartered in Singapore, SIMPPLE LTD. is an advanced technology solution provider in the emerging PropTech space, focused on helping facilities owners and managers manage facilities autonomously. Founded in 2016, the Company has a strong foothold in the Singapore facilities management market, serving over 60 clients in both the public and private sectors and extending out of Singapore into Australia and the Middle East. The Company has developed its proprietary SIMPPLE Ecosystem, to create an automated workforce management tool for building maintenance, surveillance and cleaning comprised of a mix of software and hardware solutions such as robotics (both cleaning and security) and Internet-of-Things (“IoT”) devices. 

    For more information on SIMPPLE, please visit: https://www.simpple.ai

    Safe Harbor Statement

    This press release contains forward-looking statements. In addition, from time to time, we or our representatives may make forward-looking statements orally or in writing. We base these forward-looking statements on our expectations and projections about future events, which we derive from the information currently available to us. Such forward-looking statements relate to future events or our future performance, including: our financial performance and projections; our growth in revenue and earnings; and our business prospects and opportunities. You can identify forward-looking statements by those that are not historical in nature, particularly those that use terminology such as “may,” “should,” “expects,” “anticipates,” “contemplates,” “estimates,” “believes,” “plans,” “projected,” “predicts,” “potential,” or “hopes” or the negative of these or similar terms. In evaluating these forward-looking statements, you should consider various factors, including: our ability to change the direction of the Company; our ability to keep pace with new technology and changing market needs; and the competitive environment of our business. These and other factors may cause our actual results to differ materially from any forward-looking statement.

    Forward-looking statements are only predictions. The forward-looking events discussed in this press release and other statements made from time to time by us or our representatives, may not occur, and actual events and results may differ materially and are subject to risks, uncertainties, and assumptions about us. We are not obligated to publicly update or revise any forward-looking statement, whether as a result of uncertainties and assumptions, the forward-looking events discussed in this press release and other statements made from time to time by us or our representatives might not occur.

    The MIL Network

  • MIL-OSI Economics: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Source: Microsoft

    Headline: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Since 2024, Microsoft Threat Intelligence has observed remote information technology (IT) workers deployed by North Korea leveraging AI to improve the scale and sophistication of their operations, steal data, and generate revenue for the Democratic People’s Republic of Korea (DPRK). Among the changes noted in the North Korean remote IT worker tactics, techniques, and procedures (TTPs) include the use of AI tools to replace images in stolen employment and identity documents and enhance North Korean IT worker photos to make them appear more professional. We’ve also observed that they’ve been utilizing voice-changing software.

    North Korea has deployed thousands of remote IT workers to assume jobs in software and web development as part of a revenue generation scheme for the North Korean government. These highly skilled workers are most often located in North Korea, China, and Russia, and use tools such as virtual private networks (VPNs) and remote monitoring and management (RMM) tools together with witting accomplices to conceal their locations and identities.

    Historically, North Korea’s fraudulent remote worker scheme has focused on targeting United States (US) companies in the technology, critical manufacturing, and transportation sectors. However, we’ve observed North Korean remote workers evolving to broaden their scope to target various industries globally that offer technology-related roles. Since 2020, the US government and cybersecurity community have identified thousands of North Korean workers infiltrating companies across various industries.

    Organizations can protect themselves from this threat by implementing stricter pre-employment vetting measures and creating policies to block unapproved IT management tools. For example, when evaluating potential employees, employers and recruiters should ensure that the candidates’ social media and professional accounts are unique and verify their contact information and digital footprint. Organizations should also be particularly cautious with staffing company employees, check for consistency in resumes, and use video calls to confirm a worker’s identity.

    Microsoft Threat Intelligence tracks North Korean IT remote worker activity as Jasper Sleet (formerly known as Storm-0287). We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet. To disrupt this activity and protect our customers, we’ve suspended 3,000 known Microsoft consumer accounts (Outlook/Hotmail) created by North Korean IT workers. We have also implemented several detections to alert our customers of this activity through Microsoft Entra ID Protection and Microsoft Defender XDR as noted at the end of this blog. As with any observed nation-state threat actor activity, Microsoft has directly notified targeted or compromised customers, providing them with important information needed to secure their environments. As we continue to observe more attempts by threat actors to leverage AI, not only do we report on them, but we also have principles in place to take action against them.

    This blog provides additional information on the North Korean remote IT worker operations we published previously, including Jasper Sleet’s usual TTPs to secure employment, such as using fraudulent identities and facilitators. We also provide recent observations regarding their use of AI tools. Finally, we share detailed guidance on how to investigate, monitor, and remediate possible North Korean remote IT worker activity, as well as detections and hunting capabilities to surface this threat.

    From North Korea to the world: The remote IT workforce

    Since at least early 2020, Microsoft has tracked a global operation conducted by North Korea in which skilled IT workers apply for remote job opportunities to generate revenue and support state interests. These workers present themselves as foreign (non-North Korean) or domestic-based teleworkers and use a variety of fraudulent means to bypass employment verification controls.

    North Korea’s fraudulent remote worker scheme has since evolved, establishing itself as a well-developed operation that has allowed North Korean remote workers to infiltrate technology-related roles across various industries. In some cases, victim organizations have even reported that remote IT workers were some of their most talented employees. Historically, this operation has focused on applying for IT, software development, and administrator positions in the technology sector. Such positions provide North Korean threat actors access to highly sensitive information to conduct information theft and extortion, among other operations.

    North Korean IT workers are a multifaceted threat because not only do they generate revenue for the North Korean regime, which violates international sanctions, they also use their access to steal sensitive intellectual property, source code, or trade secrets. In some cases, these North Korean workers even extort their employer into paying them in exchange for not publicly disclosing the company’s data.

    Between 2020 and 2022, the US government found that over 300 US companies in multiple industries, including several Fortune 500 companies, had unknowingly employed these workers, indicating the magnitude of this threat. The workers also attempted to gain access to information at two government agencies. Since then, the cybersecurity community has continued to detect thousands of North Korean workers. On January 3, 2025, the Justice Department released an indictment identifying two North Korean nationals and three facilitators responsible for conducting fraudulent work between 2018 and 2024. The indicted individuals generated a revenue of at least US$866,255 from only ten of the at least 64 infiltrated US companies.

    North Korean threat actors are evolving across the threat landscape to incorporate more sophisticated tactics and tools to conduct malicious employment-related activity, including the use of custom and AI-enabled software.

    Tactics and techniques

    The tactics and techniques employed by North Korean remote IT workers involve a sophisticated ecosystem of crafting fake personas, performing remote work, and securing payments. North Korean IT workers apply for remote roles, in various sectors, at organizations across the globe.

    They create, rent, or procure stolen identities that match the geo-location of their target organizations (for example, they would establish a US-based identity to apply for roles at US-based companies), create email accounts and social media profiles, and establish legitimacy through fake portfolios and profiles on developer platforms like GitHub and LinkedIn. Additionally, they leverage AI tools to enhance their operations, including image creation and voice-changing software. Facilitators play a crucial role in validating fraudulent identities and managing logistics, such as forwarding company hardware and creating accounts on freelance job websites. To evade detection, these workers use VPNs, virtual private servers (VPSs), and proxy services as well as RMM tools to connect to a device housed at a facilitator’s laptop farm located in the country of the job.

    Figure 1. The North Korean IT worker ecosystem

    Crafting fake personas and profiles

    The North Korean remote IT worker fraud scheme begins with the procurement of identities for the workers. These identities, which can be stolen or “rented” from witting individuals, include names, national identification numbers, and dates of birth. The workers might also leverage services that generate fraudulent identities, complete with seemingly legitimate documentation, to fabricate their personas. They then create email accounts and social media pages they use to apply for jobs, often indirectly through staffing or contracting companies. They also apply for freelance opportunities through freelancer sites as an additional avenue for revenue generation. Notably, they often use the same names/profiles repeatedly rather than creating unique personas for each successful infiltration.

    Additionally, the North Korean IT workers have used fake profiles on LinkedIn to communicate with recruiters and apply for jobs.

    Figure 2. An example of a North Korean IT worker LinkedIn profile that has since been taken down.

    The workers tailor their fake resumes and profiles to match the requirements for specific remote IT positions, thus increasing their chances of getting selected. Over time, we’ve observed these fake resumes and employee documents noticeably improving in quality, now appearing more polished and lacking grammatical errors facilitated by AI.

    After creating their fake personas, the North Korean IT workers then attempt to establish legitimacy by creating digital footprints for these fake personas. They typically leverage communication, networking, and developer platforms, (for example, GitHub) to showcase their supposed portfolio of previous work samples:

    Figure 3. Example profile used by a North Korean IT worker that has since been taken down.

    Using AI to improve operations

    Microsoft Threat intelligence has observed North Korean remote IT workers leveraging AI to improve the quantity and quality of their operations. For example, in October 2024, we found a public repository containing actual and AI-enhanced images of suspected North Korean IT workers:

    Figure 4. Photos of potential North Korean IT workers

    The repository also contained the resumes and email accounts used by the said workers, along with the following tools and resources they can use to secure employment and to do their work:

    • VPS and VPN accounts, along with specific VPS IP addresses
    • Playbooks on conducting identity theft and creating and bidding jobs on freelancer websites
    • Wallet information and suspected payments made to facilitators
    • LinkedIn, GitHub, Upwork, TeamViewer, Telegram, and Skype accounts
    • Tracking sheet of work performed, and payments received by the IT workers

    Image creation

    Based on our review of the repository mentioned previously, North Korean IT workers appear to conduct identity theft and then use AI tools like Faceswap to move their pictures over to the stolen employment and identity documents. The attackers also use these AI tools to take pictures of the workers and move them to more professional looking settings. The workers then use these AI-generated pictures on one or more resumes or profiles when applying for jobs.

    Figure 5. Use of AI apps to modify photos used for North Korean IT workers’ resumes and profiles
    Figure 6. Examples of resumes for North Korean IT workers. These two resumes use different versions of the same photo.

    Communications

    Microsoft Threat Intelligence has observed that North Korean IT workers are also experimenting with other AI technologies such as voice-changing software. While we haven’t observed threat actors using combined AI voice and video products as a tactic first hand, we do recognize that combining these technologies could allow future threat actor campaigns to trick interviewers into thinking they aren’t communicating with a North Korean IT worker. If successful, this tactic could allow the North Korean IT workers to do interviews directly and no longer rely on facilitators standing in for them on interviews or selling them account access.

    Facilitators for initial access

    North Korean Remote IT workers require assistance from a witting facilitator to help find jobs, pass the employment verification process, and once hired, successfully work remotely. We’ve observed Jasper Sleet advertising job opportunities for facilitator roles under the guise of partnering with a remote job candidate to help secure an IT role in a competitive market:

    Figure 7. Example of a job opportunity for a facilitator role

    The IT workers may have the facilitators assist in creating accounts on remote and freelance job websites. They might also ask the facilitator to perform the following tasks as their relationship builds:

    • Create a bank account for the North Korean IT worker, or lend their (the facilitator’s) own account to the worker
    • Purchase mobile phone numbers or SIM cards

    During the employment verification process, the witting accomplice helps the North Korean IT workers validate the latter’s fraudulent identities using online background check service providers. The documents submitted by the workers include fake or stolen drivers’ licenses, social security cards, passports, and permanent resident identification cards. Workers train using interview scripts, which include a justification for why the employee must work remotely.

    Once hired, the remote workers direct company laptops and hardware to be sent to the address of the accomplice. The accomplice then either runs a laptop farm that provides the laptops with an internet connection at the geo-location of the role or forwards the items internationally. For hardware that remain in the country of the role, the accomplice signs into the computers and installs software that enables the workers to connect remotely. Remote IT workers might also access devices remotely using IP-based KVM devices, like PiKVM or TinyPilot.

    Defense evasion and persistence

    To conceal their physical location as well as maintain persistence and blend into the target organization’s environment, the workers typically use VPNs (particularly Astrill VPN), VPSs, proxy services, and RMM tools. Microsoft Threat Intelligence has observed the persistent use of JumpConnect, TinyPilot, Rust Desk, TeamViewer, AnyViewer, and Anydesk. When an in-person presence or face-to-face meeting is required, for example to confirm banking information or attend a meeting, the workers have been known to pay accomplices to stand in for them. When possible, however, the workers eliminate all face-to-face contact, offering fraudulent excuses for why they are not on camera during video teleconferencing calls or speaking.

    Attribution

    Microsoft Threat Intelligence uses the name Jasper Sleet (formerly known as Storm-0287) to represent activity associated with North Korean’s remote IT worker program. These workers are primarily focused on revenue generation, use remote access tools, and likely fall under a particular leadership structure in North Korea. We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet.

    How Microsoft disrupts North Korean remote IT worker operations with machine learning

    Microsoft has successfully scaled analyst tradecraft to accelerate the identification and disruption of North Korean IT workers in customer environments by developing a custom machine learning solution. This has been achieved by leveraging Microsoft’s existing threat intelligence and weak signals generated by monitoring for many of the red flags listed in this blog, among others. For example, this solution uses impossible time travel risk detections, most commonly between a Western nation and China or Russia. The machine learning workflow uses these features to surface suspect accounts most likely to be North Korean IT workers for assessment by Microsoft Threat Intelligence analysts.

    Once Microsoft Threat Intelligence reviews and confirms that an account is indeed associated with a North Korean IT worker, customers are then notified with a Microsoft Entra ID Protection risk detection warning of a risky sign-in based on Microsoft’s threat intelligence. Microsoft Defender XDR customers also receive the alert Sign-in activity by a suspected North Korean entity in the Microsoft Defender portal.

    Defending against North Korean remote IT worker infiltration

    Defending against the threats from North Korean remote IT workers involves a threefold strategy:

    • Ensuring a proper vetting approach is in place for freelance workers and vendors
    • Monitoring for anomalous user activity
    • Responding to suspected Jasper Sleet signals in close coordination with your insider risk team

    Investigate

    How can you identify a North Korean remote IT worker in the hiring process?

    To protect your organization against a potential North Korean insider threat, it is important for your organization to prioritize a process for verifying employees to identify potential risks. The following can be used to assess potential employees:

    • Confirm the potential employee has a digital footprint and look for signs of authenticity. This includes a real phone number (not VoIP), a residential address, and social media accounts. Ensure the potential employee’s social media/professional accounts are not highly similar to the accounts of other individuals. In addition, check that the contact phone number listed on the potential employee’s account is unique and not also used by other accounts.
    • Scrutinize resumes and background checks for consistency of names, addresses, and dates. Consider contacting references by phone or video-teleconference rather than email only.
    • Exercise greater scrutiny for employees of staffing companies, since this is the easiest avenue for North Korean workers to infiltrate target companies.
    • Search whether a potential employee is employed at multiple companies using the same persona.
    • Ensure the potential employee is seen on camera during multiple video telecommunication sessions. If the potential employee reports video and/or microphone issues that prohibit participation, this should be considered a red flag.
    • During video verification, request individuals to physically hold driver’s licenses, passports, or identity documents up to camera.
    • Keep records, including recordings of video interviews, of all interactions with potential employees.
    • Require notarized proof of identity.

    Monitor

    How can your organization prevent falling victim to the North Korean remote IT worker technique?

    To prevent the risks associated with North Korean insider threats, it’s vital to monitor for activity typically associated with this fraudulent scheme.

    Monitor for identifiable characteristics of North Korean remote workers

    Microsoft has identified the following characteristics of a North Korean remote worker. Note that not all the criteria are necessarily required, and further, a positive identification of a remote worker doesn’t guarantee that the worker is North Korean.

    • The employee lists a Chinese phone number on social media accounts that is used by other accounts.
    • The worker’s work-issued laptop authenticates from an IP address of a known North Korean IT worker laptop farm, or from foreign—most commonly Chinese or Russian—IP addresses even though the worker is supposed to have a different work location.
    • The worker is employed at multiple companies using the same persona. Employees of staffing companies require heightened scrutiny, given this is the easiest way for North Korean workers to infiltrate target companies.
    • Once a laptop is issued to the worker, RMM software is immediately downloaded onto it and used in combination with a VPN.
    • The worker has never been seen on camera during a video telecommunication session or is only seen a few times. The worker may also report video and/or microphone issues that prohibit participation from the start.
    • The worker’s online activity doesn’t align with routine co-worker hours, with limited engagement across approved communication platforms.

    Monitor for activity associated with Jasper Sleet access

    • If RMM tools are used in your environment, enforce security settings where possible, to implement MFA:
      • If an unapproved installation is discovered, reset passwords for accounts used to install the RMM services. If a system-level account was used to install the software, further investigation may be warranted.
    • Monitor for impossible travel—for example, a supposedly US-based employee signing in from China or Russia.
    • Monitor for use of public VPNs such as Astrill. For example, IP addresses associated with VPNs known to be used by Jasper Sleet can be added to Sentinel watchlists. Or, Microsoft Defender for Identity can integrate with your VPN solution to provide more information about user activity, such as extra detection for abnormal VPN connections.
    • Monitor for signals of insider threats in your environment. Microsoft Purview Insider Risk Management can help identify potentially malicious or inadvertent insider risks.
    • Monitor for consistent user activity outside of typical working hours.

    Remediate

    What are the next steps if you positively identify a North Korean remote IT worker employed at your company?

    Because Jasper Sleet activity follows legitimate job offers and authorized access, Microsoft recommends approaching confirmed or suspected Jasper Sleet intrusions with an insider risk approach using your organization’s insider risk response plan or incident response provider like Microsoft Incident Response. Some steps might include:

    • Restrict response efforts to a small, trusted insider risk working group, trained in operational security (OPSEC) to avoid tipping off subjects and potential collaborators.
    • Rapidly evaluate the subject’s proximity to critical assets, such as:
      • Leadership or sensitive teams
      • Direct reports or vendor staff the subject has influence over
      • Suppliers or vendors
      • People/non-people accounts, production/pre-production environments, shared accounts, security groups, third-party accounts, security groups, distribution groups, data clusters, and more
    • Conduct preliminary link analysis to:
      • Detect relationships with potential collaborators, supporters, or other potential aliases operated by the same actor
      • Identify shared indicators (for example, shared IP addresses, behavioral overlap)
      • Avoid premature action that might alert other Jasper Sleet operators
    • Conduct a risk-based prioritization of efforts, informed by:
      • Placement and access to critical assets (not necessarily where you identified them)
      • Stakeholder insight from potentially impacted business units
      • Business impact considerations of containment (which might support additional collection/analysis) or mitigation (for example, eviction)
    • Conduct open-source intelligence (OSINT) collection and analysis to:
      • Determine if the identity associated with the threat actor is associated with a real person. For example, North Korean IT workers have leveraged stolen identities of real US persons to facilitate their fraud. Conduct OSINT on all available personally identifiable information (PII) provided by the actor (name, date of birth, SSN, home of record, phone number, emergency contact, and others) and determine if these items are linked to additional North Korean actors, and/or real persons’ identities.
      • Gather all known external accounts operated by the alias/persona (for example, LinkedIn, GitHub, freelance working sites, bug bounty programs).
      • Perform analysis on account images using open-source tools such as FaceForensics++ to determine prevalence of AI-generated content. Detection opportunities within video and imagery include: 
        • Temporal consistency issues: Rapid movements cause noticeable artifacts in video deepfakes as the tracking system struggles to maintain accurate landmark positioning. 
        • Occlusion handling: When objects pass over the AI-generated content such as the face, deepfake systems tend to fail at properly reconstructing the partially obscured face.
        • Lighting adaptation: Changes in lighting conditions might reveal inconsistencies in the rendering of the face
        • Audio-visual synchronization: Slight delays between lip movements and speech are detectable under careful observation
          • Exaggerated facial expressions. 
          • Duplicative or improperly placed appendages.
          • Pixelation or tearing at edges of face, eyes, ears, and glasses.
    • Engage counterintelligence or insider risk/threat teams to:
      • Understand tradecraft and likely next steps
      • Gain national-level threat context, if applicable
    • Make incremental, risk-based investigative and response decisions with the support of your insider threat working group and your insider threat stakeholder group; one providing tactical feedback and the other providing risk tolerance feedback.
    • Preserve evidence and document findings.
    • Share lessons learned and increase awareness.
    • Educate employees on the risks associated with insider threats and provide regular security training for employees to recognize and respond to threats, including a section on the unique threat posed by North Korean IT workers.

    After an insider risk response to Jasper Sleet, it might be necessary to also conduct a thorough forensic investigation of all systems that the employee had access to for indicators of persistence, such as RMM tools or system/resource modifications.

    For additional resources, refer to CISA’s Insider Threat Mitigation Guide. If you suspect your organization is being targeted by nation-state cyber activity, report it to the appropriate national authority. For US-based organizations, the Federal Bureau of Investigation (FBI) recommends reporting North Korean remote IT worker activity to the Internet Crime Complaint Center (IC3).

    Microsoft Defender XDR detections

    Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, apps to provide integrated protection against attacks like the threat discussed in this blog.

    Customers with provisioned access can also use Microsoft Security Copilot in Microsoft Defender to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.

    Microsoft Defender XDR

    Alerts with the following titles in the security center can indicate threat activity on your network:

    • Sign-in activity by a suspected North Korean entity

    Microsoft Defender for Endpoint

    Alerts with the following titles in the security center can indicate Jasper Sleet RMM activity on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Suspicious usage of remote management software
    • Suspicious connection to remote access software

    Microsoft Defender for Identity

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Atypical travel
    • Suspicious behavior: Impossible travel activity

    Microsoft EntraID Protection

    Microsoft Entra ID Protection risk detections inform Entra ID user risk events and can indicate associated threat activity, including unusual user activity consistent with known patterns identified by Microsoft Threat Intelligence research. Note, however, that these alerts can be also triggered by unrelated threat activity.

    • Microsoft Entra threat intelligence (sign-in): (RiskEventType: investigationsThreatIntelligence)

    Microsoft Defender for Cloud Apps

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Impossible travel activity

    Microsoft Security Copilot

    Security Copilot customers can use the standalone experience to create their own prompts or run the following pre-built promptbooks to automate incident response or investigation tasks related to this threat:

    • Incident investigation
    • Microsoft User analysis
    • Threat actor profile

    Note that some promptbooks require access to plugins for Microsoft products such as Microsoft Defender XDR or Microsoft Sentinel.

    Hunting queries

    Microsoft Defender XDR

    Because organizations might have legitimate and frequent uses for RMM software, we recommend using the Microsoft Defender XDR advanced hunting queries available on GitHub to locate RMM software that hasn’t been endorsed by your organization for further investigation. In some cases, these results might include benign activity from legitimate users. Regardless of use case, all newly installed RMM instances should be scrutinized and investigated.

    If any queries have high fidelity for discovering unsanctioned RMM instances in your environment, and don’t detect benign activity, you can create a custom detection rule from the advanced hunting query in the Microsoft Defender portal. 

    Microsoft Sentinel

    The alert Insider Risk Sensitive Data Access Outside Organizational Geo-locationjoins Azure Information Protection logs (InformationProtectionLogs_CL) with Microsoft Entra ID sign-in logs (SigninLogs) to provide a correlation of sensitive data access by geo-location. Results include:

    • User principal name
    • Label name
    • Activity
    • City
    • State
    • Country/Region
    • Time generated

    The recommended configuration is to include (or exclude) sign-in geo-locations (city, state, country and/or region) for trusted organizational locations. There is an option for configuration of correlations against Microsoft Sentinel watchlists. Accessing sensitive data from a new or unauthorized geo-location warrants further review.

    References

    Acknowledgments

    For more information on North Korean remote IT worker operations, we recommend reviewing DTEX’s in-depth analysis in the report Exposing DPRK’s Cyber Syndicate and IT Workforce.

    Learn more

    Meet the experts behind Microsoft Threat Intelligence, Incident Response, and the Microsoft Security Response Center at our VIP Mixer at Black Hat 2025. Discover how our end-to-end platform can help you strengthen resilience and elevate your security posture.

    For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog. 

    To get notified about new publications and to join discussions on social media, follow us on LinkedIn, X (formerly Twitter), and Bluesky. 

    To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast. 

    MIL OSI Economics

  • MIL-OSI USA: Sen. Budd Votes for the One Big Beautiful Bill Act ToDeliver Historic Tax Cuts for North Carolina Families

    US Senate News:

    Source: United States Senator Ted Budd (R-North Carolina)
    Washington, D.C. — U.S. Senator Ted Budd (R-N.C.) released the following statement after voting in support of President Trump’s One Big Beautiful Bill Act, historic legislation that lowers taxes for families, makes America safer and more secure, and unleashes economic growth for the future:
    “I voted in favor of the One Big Beautiful Bill Act because the people of North Carolina deserve more of their hard-earned wages, a more secure border, a reinvigorated military, responsible spending reforms for government programs, and a thriving economy. My colleagues and I fought successfully to protect North Carolina’s tobacco growers to help them stay competitive with China. I am also grateful that this bill included my PELL Act, which will help Americans earn in-demand credentials for rewarding careers. I hope my colleagues in the House quickly get this bill on President Trump’s desk because Americans cannot afford the largest tax increase in our nation’s history,” said Sen. Budd. 
    Here’s How the One Big Beautiful Bill Act Directly Benefits North Carolina:
    Provides Unprecedented Tax Relief for Families
    This legislation helps Americans keep more money in their pockets by extending key provisions of President Trump’s 2017 Tax Cuts and Jobs Act. Preventing the largest tax increase in American history will save the average North Carolinian $2,474 in 2026.
    Working families will receive significant savings with the increase and permanence of the child tax credit, expanded tax credits for paid leave, enhanced 529 savings accounts, and additional childcare access.
    This legislation lowers taxes for seniors relying on Social Security.
    Gives Workers the Tools They Need to Advance Their Careers
    Sen. Budd fought to have his PELL Act included in this legislation, a provision that expands Pell Grant eligibility for high-quality, short-term workforce programs. This would benefit individuals seeking to advance their careers without long-term debt while also providing American businesses with a broader, better-prepared talent pool ready to meet the demands of a rapidly evolving economy.
    Protects North Carolina Agriculture
    Sen. Budd successfully defended tobacco’s eligibility to receive the “duty drawback,” allowing tobacco manufacturers to receive reimbursement for the tariffs they pay on materials used to produce tobacco products that they ship to international markets. This will protect North Carolina growers and prevent the tobacco market from being flooded with cheaper, lower-quality products from China and Brazil.
    This legislation provides serious tax relief for North Carolina farmers by raising the death tax exemption, ensuring family farms can be passed down to future generations, rather than being broken up and sold.
    Unlocks Economic Growth & American Manufacturing
    This legislation will create a renaissance in American manufacturing by delivering full expensing for companies that build new factories and invest in equipment and machinery. This will help create new, good-paying jobs.
    By enhancing the small business deduction and making it permanent, small businesses will be able to hire more workers.
    Increasing deductions for small businesses’ equipment and property will quickly help businesses grow.
    Reduces Government Spending to Preserve & Protect Government Programs
    This legislation contains the first structural reforms to address waste, fraud, and abuse in key government programs like SNAP and Medicaid in over three decades. Slowing the rate of exponential cost increases will result in significant deficit savings and will preserve and protect these programs for future generations.
    Invests in America’s National Defense
    Sen. Budd helped secure funding to boost manufacturing capacity for the next generation of the F-15, the F-15EX, which will sustain the training mission at Seymour Johnson far into the future. 
    This legislation also includes significant funding to enhance America’s air superiority by preventing the retirement of the F-15E aircraft flying out of Seymour Johnson Air Force Base. 
    America’s troops deserve a pay raise. This legislation increases pay and allowances while making improvements to housing, healthcare, childcare, and education.
    This legislation makes generational investments in our military readiness that will protect the American homeland and deter our adversaries by boosting America’s missile defense by building the “Golden Dome.”
    Sen. Budd worked to secure investments to improve housing at Fort Bragg and Seymour Johnson and funds for restoration and modernization at Camp Lejeune.
    This legislation creates new production lines to scale innovative, cost-effective munitions, so we are no longer shooting $4M missiles at $50,000 drones.
    This legislation makes the largest ever investment in the Coast Guard’s history, which will purchase more than 40 new helicopters and six new C-130J aircraft, which will be serviced at the Aviation Technical Training Center in Elizabeth City. The legislation also funds 17 new icebreakers to protect American interests and 21 new cutters to combat drug runners and human traffickers.
    Keeps America’s Border Secure
    While President Trump’s policies have resulted in a dramatic drop-off of illegal immigration, this legislation also boosts America’s border security by surging funding for 3,000 new Border Patrol agents and 10,000 new ICE agents. The One Big Beautiful Bill also increases funding to finish President Trump’s border wall.
    Ushers in Next-Generation Technologies
    This legislation includes funding for the transformational air traffic control modernization project underway at the FAA. This will quickly update aging and failing technologies to keep Americans safe in the sky.
    This legislation makes a historic amount of spectrum available for commercial use, which will create new jobs and unleash the next generation of wireless technology. This will ensure America remains the premier destination for innovation and help unleash a new area of advanced manufacturing. This will also make the internet faster & more dependable across the country through commercial success stories like 5G, 6G, wi-fi, and private networks using CBRS.

    MIL OSI USA News