Category: Intelligence Agencies

  • MIL-OSI Security: Chester County Man Pleads Guilty to Selling Meth

    Source: Office of United States Attorneys

    COLUMBIA, S.C. —Alexander Wright, 37, of Chester, has pleaded guilty to distribution of methamphetamine.

    Evidence obtained in the investigation revealed that the Federal Bureau of Investigation, Department of Homeland Security Investigations, and the Chester County Sheriff’s Department began investigating Wright after complaints from his neighbors. The neighbors reported several cars coming to his home and staying for short periods of time and leaving. Law enforcement began watching the home and confirmed the reports from the neighbors.

    After confirming the information, the police used an informant to make several buys from Wright. On June 5, 2023, the informant contacted Wright to purchase methamphetamine. Under surveillance by the police, the informant went to Wright’s home and purchased 2 ounces of methamphetamine. The informant was instructed by Wright that the drugs were in the rear passenger door of a car parked in his yard and told the informant to leave the money in the car.   After the deal and still under surveillance, the informant returned to law enforcement. The drugs were recovered and were tested with a 96% purity rate for methamphetamine and weighed 56.42 grams.

    Wright faces a maximum penalty of life in federal prison.  He also faces a fine of up to $10 million, and five years of supervision to follow the term of imprisonment. United States District Judge Mary Geiger Lewis accepted the guilty plea and will sentence Wright after receiving and reviewing a sentencing report prepared by the U.S. Probation Office.

    This case was investigated by the FBI Columbia Field Office, Department of Homeland Security Investigations, Bureau of Alcohol, Tobacco, Firearms and Explosives, and the Chester County Sheriff’s Office. Assistant U.S. Attorney William K. Witherspoon is prosecuting the case.

    ###

    MIL Security OSI

  • MIL-OSI Security: Former Cleveland City Council Member Sentenced to Prison

    Source: Federal Bureau of Investigation (FBI) State Crime News

    CLEVELAND – Basheer Jones, 40, of Cleveland, Ohio, has been sentenced to 28 months in prison by U.S. District Judge J. Philip Calabrese, after pleading guilty to conspiring to commit wire fraud and honest services fraud by using his role as a public official for personal financial gain by seeking to defraud multiple community stakeholders out of more than $200,000. He was also ordered to serve three years of supervised release after imprisonment and pay $143,598.47 in restitution to local nonprofits.

    According to court documents, from about December 2018 to June 2021, the former Cleveland city councilman for Ward 7 persuaded several local nonprofits to enter into arrangements that benefitted Jones and his romantic partner and co-conspirator. Jones sought and obtained funds from the nonprofits under the guise of working on projects to redevelop Ward 7. Throughout the scheme, he took steps to ensure that his personal connection to his romantic partner, through whom he benefited from these arrangements, was not discovered.

    “Mr. Jones used his position to dishonestly line his pockets with tens of thousands of dollars,” said Acting U.S. Attorney Carol M. Skutnik for the Northern District of Ohio. “He betrayed the city of Cleveland and its citizens, who elected him to serve as a leader in our community. With his deceptive actions, he also violated federal laws. Anyone who thinks they can use a public office to defraud nonprofits and obtain bribes will face consequences and pay the price for those decisions, and my office will prosecute you to the fullest extent of the law.”

    The defendant’s schemes worked by convincing nonprofits to make payments toward projects they believed were for Ward 7 revitalization projects, including to buy real estate from purported third parties. Instead, the money went into bank accounts that his romantic partner controlled. Jones then instructed her to divert those funds to herself, to himself, and to others he chose.

    Jones also convinced a nonprofit to make payments to an entity controlled by his co-conspiring partner, all while knowing that the funds would flow back to himself. Jones recommended that the nonprofit should hire a consultant for community outreach. Unbeknownst to the nonprofit, the consultant was actually Jones’s romantic partner. She submitted invoices to the unsuspecting nonprofit and was subsequently paid through her consulting business.

    Jones later defrauded the same nonprofit out of an additional $50,000, again through his partner’s consulting business. Jones claimed that he needed $50,000 to plan a community event, which included buying backpacks for schoolchildren, and falsely promised that the city would reimburse the organization. Instead, after the funds were paid, no event was held, and Jones again directed his romantic partner to divide the money amongst herself, Jones, and others Jones chose.

    “Public corruption at any level of government will not be tolerated. Jones abused his position of trust for personal gain while scheming against the people he was elected to serve, including non-profit entities and well-meaning leaders,” said FBI Cleveland Acting Special Agent in Charge Charles Johnston. “Elected officials who demonstrate a reckless disregard for violating the oath they swore to uphold is detestable. Today’s sentence underscores the FBIs commitment to ensuring that those who engage in fraud and corruption will be investigated and held accountable. We will continue working with our law enforcement partners to root out corruption and ensure elected officials are serving with honesty, fairness, and integrity.”

    Some of the projects Jones pushed included seeking community funding to rehabilitate certain distressed properties while concealing his financial interest in them. In one instance, Jones devised a bribery scheme under which he arranged for co-conspirators, including his romantic partner, to acquire a dilapidated property on Superior Road, and used his position as councilperson to pass ordinances allocating city funds to buy that property from them. Jones arranged for a co-conspirator to buy the property a minimal cost. After asking a nonprofit to purchase and rehabilitate the property, and promising city funding, Jones sponsored an emergency ordinance to fund the nonprofit’s purchase and renovation of the property. When Jones was unable to convince the nonprofit to proceed, he arranged to transfer the property to his romantic partner’s consulting business, with the understanding that she would share the proceeds of the sale with him. After sponsoring another ordinance to reauthorize city funding for the same project, Jones sought to finalize the nonprofit’s purchase of the property from his partner’s entity for $80,000. Ultimately that scheme failed when the nonprofit decided not to proceed with the purchase.

    However, Jones and his romantic partner did succeed in obtaining funds for the sale of a different property to another nonprofit. He misled them to believe that he was assisting with the acquisition of the property from the original owner. Instead, he was simultaneously arranging for his partner to acquire the property from the original owner in the name of another business entity, and then immediately to resell it to the nonprofit. Jones and his romantic partner arranged to purchase the property for only $1, promising to pay a $40,500 city demolition bill. But without paying that bill or disclosing it, Jones’s romantic partner immediately re-sold the property to the nonprofit for $45,000.

    “Basheer Jones abused his position of trust by deliberately engaging in fraudulent schemes to divert HUD money – funds meant to improve the community— for his own personal gain,” said Special Agent in Charge Shawn Rice with the U.S. Department of Housing and Urban Development (HUD), Office of Inspector General (OIG). “HUD OIG will continue to work with the U.S. Attorney’s Office and law enforcement to investigate and hold accountable bad actors who exploit HUD-funded programs for their own benefit.”

    This case was investigated by the FBI Cleveland Division, the U.S. Department of Housing and Urban Development Office of the Inspector General, and the IRS – Criminal Investigation.

    The case is being prosecuted by Assistant U.S. Attorneys Erica Barnhill and Elliot Morrison for the Northern District of Ohio.

    To report fraud, visit justice.gov/action-center/report-crime-or-submit-complaint.

    MIL Security OSI

  • MIL-OSI USA: Duckworth, Durbin, Schumer, Democratic Senators Urge AG Bondi to Appoint a Special Counsel to Investigate Trump Administration Signal Chat National Security Breach

    US Senate News:

    Source: United States Senator for Illinois Tammy Duckworth
    April 03, 2025
    The Senators wrote: “These shockingly reckless breaches of security protocols for safeguarding sensitive and classified information clearly warrant an investigation into whether any of the government officials involved violated federal laws”
    [WASHINGTON, D.C.] – Combat Veteran and U.S. Senator Tammy Duckworth (D-IL)—a member of the U.S. Senate Armed Services (SASC), Veterans’ Affairs (SVAC) and Foreign Relations (SFRC) Committees—joined U.S. Senate Democratic Whip Dick Durbin (D-IL), Ranking Member of the Senate Judiciary Committee, along with Senate Democratic Leader Chuck Schumer (D-NY) and 28 Senate Democrats in sending a letter to U.S. Attorney General (AG) Pam Bondi urging her to appoint a Special Counsel to thoroughly and impartially investigate whether any of the government officials involved in the Signal chat security breach violated federal criminal law. On March 24, The Atlantic’s editor in chief reported that President Trump’s National Security Advisor Michael Waltz had included him in a group text chain with several high-ranking national security officials where highly sensitive, classified or controlled information was shared and discussed over Signal—an unsecure commercial messaging app.
    “In addition to the reckless inclusion of a journalist in the chat, we are deeply concerned about this serious breach in the proper handling of such information and deliberations,” the Senators wrote. “Appointment of a Special Counsel is appropriate where the Department may have a conflict of interest or extraordinary circumstances are present, a criminal investigation is warranted and it is in the public interest to appoint an outside Special Counsel to investigate the matter. Such circumstances are clearly present here.”
    The Signal chat group started by Mr. Waltz included Vice President JD Vance, Secretary of Defense Pete Hegseth, Secretary of State Marco Rubio, Director of National Intelligence Tulsi Gabbard and Central Intelligence Agency Director John Ratcliffe, among at least 18 other high-ranking government officials. In addition to discussing the sensitive foreign policy implications of military strikes against Houthi targets in Yemen, these officials proceeded to discuss key operational information regarding the precise timing of the planned attacks, the types of military aircraft and munitions to be used and the targets and results of the strikes as they occurred. An unprecedented security breach of this magnitude involving top senior government officials presents the kind of extraordinary circumstances clearly contemplated by the Special Counsel regulations.
    “These officials conducted a highly sensitive discussion, including of clearly classified or controlled information, over the commercial messaging app Signal, including in some instances on personal devices and while traveling in foreign countries, rather than using the secure U.S. government channels and facilities that are designed and required for the sharing of such information. Despite subsequent claims to the contrary by you, President Trump and several of the officials involved, including in testimony before Congress, some of the information they shared and discussed over Signal would almost certainly be considered classified or, at a minimum, controlled, prior to and in the immediate aftermath of an impending strike,” the Senators wrote.
    In the letter, the Senators raised concerns if the Signal chat violated federal law. For example, gross negligence in handling national defense information may violate the Espionage Act. Importantly, other laws, including the Federal Records Act, require the preservation of certain government records. Destruction of government records or property may constitute a violation of various criminal statutes. Subsequent statements to Congress and testimony before the House and Senate Intelligence Committees by several of the officials involved raise additional concerns about potential violations of federal criminal laws that prohibit making false statements to Congress, committing perjury in testimony to Congress, inducing another person to commit perjury or conspiring to commit any of the foregoing actions.
    “During your confirmation hearing before the Senate Judiciary Committee, you assured the American people that everyone will be held to ‘an equal, fair system of justice’ if you were confirmed as Attorney General and that ‘no one is above the law.’ As the individuals most seriously implicated in this incident include senior officials at the highest levels, including several of your fellow cabinet members, appointment of a Special Counsel is necessary to ensure that the investigation and any ensuing prosecutions are fair, impartial, and independent and that no official, regardless of seniority or political affiliation, is above the law. The people of this country deserve the assurance that this matter will be taken seriously and addressed swiftly. To do so, we urge you to appoint a Special Counsel immediately,” the Senators concluded.
    Along with Duckworth, Durbin and Schumer, the letter was co-signed by U.S. Senators Richard Blumenthal (D-CT), Cory Booker (D-NJ), Adam Schiff (D-CA), Elizabeth Warren (D-MA), Tim Kaine (D-VA), Ben Ray Luján (D-NM), Peter Welch (D-VT), Jack Reed (D-RI), Sheldon Whitehouse (D-RI), Jeff Merkley (D-OR), Andy Kim (D-NJ), Jacky Rosen (D-NV), Chris Coons (D-DE), Mazie Hirono (D-HI), Tina Smith (D-MN), Lisa Blunt Rochester (D-DE), Raphael Warnock (D-GA), Chris Van Hollen (D-MD), Alex Padilla (D-CA), Tammy Baldwin (D-WI), John Fetterman (D-PA), Elissa Slotkin (D-MI), Patty Murray (D-WA), Kirsten Gillibrand (D-NY),  Ed Markey (D-MA), Amy Klobuchar (D-MN), Ruben Gallego (D-AZ) and Gary Peters (D-MI).
    Full text of the letter is available on Senator Duckworth’s website and below:
    March 31, 2025
    Dear Attorney General Bondi:
    On March 24, The Atlantic’s editor in chief reported that President Trump’s National Security Advisor Michael Waltz had included him in a group message chain with several high-ranking national security officials where highly sensitive, classified, or controlled information was shared and discussed over Signal—an unsecure commercial messaging app. In addition to the reckless inclusion of a journalist in the chat, we are deeply concerned about this serious breach in the proper handling of such information and deliberations. Given the extraordinary circumstances of this shocking incident and the significant public interests at stake, it is imperative that you immediately appoint a Special Counsel to thoroughly and impartially investigate whether any of the government officials involved violated federal criminal law. 
    Appointment of a Special Counsel is appropriate where the Department may have a conflict of interest or extraordinary circumstances are present, a criminal investigation is warranted, and it is in the public interest to appoint an outside Special Counsel to investigate the matter. Such circumstances are clearly present here.
    The Signal chat group started by Mr. Waltz included Vice President JD Vance, Secretary of Defense Pete Hegseth, Secretary of State Marco Rubio, Director of National Intelligence Tulsi Gabbard, and Central Intelligence Agency Director John Ratcliffe, among at least 18 other high-ranking government officials. In addition to discussing the sensitive foreign policy implications of military strikes against Houthi targets in Yemen, these officials proceeded to discuss key operational information regarding the precise timing of the planned attacks, the types of military aircraft and munitions to be used, and the targets and results of the strikes as they occurred. An unprecedented security breach of this magnitude involving top senior government officials presents the kind of extraordinary circumstances clearly contemplated by the Special Counsel regulations.
    These officials conducted a highly sensitive discussion, including of clearly classified or controlled information, over the commercial messaging app Signal, including in some instances on personal devices and while traveling in foreign countries, rather than using the secure U.S. government channels and facilities that are designed and required for the sharing of such information. Despite subsequent claims to the contrary by you, President Trump, and several of the officials involved, including in testimony before Congress, some of the information they shared and discussed over Signal would almost certainly be considered classified or, at a minimum, controlled, prior to and in the immediate aftermath of an impending strike.
    These shockingly reckless breaches of security protocols for safeguarding sensitive and classified information clearly warrant an investigation into whether any of the government officials involved violated federal laws pertaining to the proper safeguarding and preservation of such information. For example, gross negligence in handling national defense information may violate the Espionage Act. Importantly, other laws, including the Federal Records Act, require the preservation of certain government records. Signal allows users to schedule messages for deletion after certain time periods and Mr. Waltz appears to have set the chat messages to delete initially after one week and then later in the chat changed the setting to delete messages after four weeks. Destruction of government records or property may constitute a violation of various criminal statutes. Subsequent statements to Congress and testimony before the House and Senate Intelligence Committees by several of the officials involved raise additional concerns about potential violations of federal criminal laws that prohibit making false statements to Congress, committing perjury in testimony to Congress, inducing another person to commit perjury, or conspiring to commit any of the foregoing actions.
    Even prior to his first Administration, President Trump campaigned for the need to prosecute and “lock up” individuals who allegedly “bypass government security” or “sent and received classified information on an insecure server.” Further, as an avowedly loyal and zealous advocate for the President, you echoed these same sentiments prior to your confirmation. Given the extraordinary nature of this security breach by senior Trump Administration officials, the likelihood that these actions needlessly endangered American lives and our nation’s security, the importance of putting our nation’s security before partisan political interests, and the range of federal criminal laws that may have been violated, it is imperative that the Department of Justice conduct a thorough investigation to assess the extent of the damage and determine whether any criminal charges are warranted against any of the government officials involved.
    During your confirmation hearing before the Senate Judiciary Committee, you assured the American people that everyone will be held to “an equal, fair system of justice” if you were confirmed as Attorney General, and that “no one is above the law.” As the individuals most seriously implicated in this incident include senior officials at the highest levels, including several of your fellow cabinet members, appointment of a Special Counsel is necessary to ensure that the investigation and any ensuing prosecutions are fair, impartial, and independent and that no official, regardless of seniority or political affiliation, is above the law.
    The people of this country deserve the assurance that this matter will be taken seriously and addressed swiftly. To do so, we urge you to appoint a Special Counsel immediately.
    -30-

    MIL OSI USA News

  • MIL-OSI Security: National Sales Director for New York-Based Mobile Diagnostic Company Pleads Guilty to Kickback Scheme

    Source: Federal Bureau of Investigation FBI Crime News (b)

    BOSTON – A New York-based national sales director pleaded guilty today in federal court in Boston to conspiring to offer and pay kickbacks to doctors in exchange for ordering medically unnecessary brain scans.

    David Fuhrmann, 60, of Port Jefferson, N.Y. pleaded guilty to one count of conspiracy to violate the Anti-Kickback Statute. U.S. District Court Judge Nathaniel M. Gorton scheduled sentencing for July 10, 2025.

    From at least June 2013 through at least September 2020, Fuhrmann conspired with others, including two managers for a mobile medical diagnostics company that performed transcranial doppler (TCD) scans, to enter into kickback agreements with various doctors. Fuhrmann and his co-conspirators agreed to offer and pay doctors kickbacks based on the number of TCD ultrasounds the doctors ordered. Some doctors were paid in cash and others by check. Fuhrmann and his co-conspirators created rental and administrative service agreements. On paper, these agreements made it appear as if doctors were compensated for the TCD company’s use of space and administrative resources based on fair market value and not based on the volume or value of referrals. These agreements were shams that hid the true nature of the arrangement of paying per test.  

    According to the charging documents, the scheme resulted in fraudulent bills of approximately $70.6 million to Medicare.  

    The charge of conspiracy to violate the Anti-Kickback Statute provides for a sentence of up to five years in prison, three years of supervised release and a fine of up to $250,000. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

    United States Attorney Leah B. Foley; Roberto Coviello, Special Agent in Charge of the U.S. Department of Health and Human Services, Office of Inspector General; Jodi Cohen, Special Agent in Charge of the Federal Bureau of Investigation, Boston Division; Thomas Demeo, Acting Special Agent in Charge of the Internal Revenue Service’s Criminal Investigation Division, Boston Field Office; Kelly M.  Lawson, Acting Regional Director, U.S. Department of Labor, Employee Benefits Security Administration, Boston Regional Office; Ketty Larco-Ward, Inspector in Charge of the U.S. Postal Inspection Service, Boston Division; and Christopher Algieri, Special Agent in Charge of the U.S. Department of Veterans Affairs Office of Inspector General, Northeast Field Office. Assistant U.S. Attorneys Howard Locker and Mackenzie Queenin of the Health Care Fraud Unit are prosecuting the case.
     

    MIL Security OSI

  • MIL-OSI Security: Taunton Man Pleads Guilty to Drug Distribution, Access Device Fraud, and Aggravated Identity Theft Charges

    Source: Federal Bureau of Investigation FBI Crime News (b)

    Defendant used another person’s identity to rent apartments for drug trafficking

    BOSTON – A Taunton has pleaded guilty in federal court in Boston to participating in drug distribution and a drug conspiracy involving wholesale quantities of cocaine, fentanyl, fentanyl analogue and methamphetamine. He also pleaded guilty to using an unknowing individual’s identity and an unauthorized access device to fraudulently rent locations he used for the purposes of drug trafficking.  

    Terrence Pyrtle, a/k/a “Big T,” a/k/a “T,” a/k/a “big_t558,” 42, pleaded guilty to one count of conspiracy to distribute and possess with intent to distribute 500 grams and more of cocaine, 400 grams and more of fentanyl, 100 grams and more of fentanyl analogue and methamphetamine; one count of possession with intent to distribute 500 grams and more of cocaine, 400 grams and more of fentanyl, 100 grams and more of fentanyl analogue and methamphetamine; one count of possession with intent to distribute 400 grams and more of fentanyl and 100 grams and more of fentanyl analogue; one count of conspiracy to commit access device fraud and aggravated identity theft; one count of access device fraud; and one count of aggravated identity theft. U.S. District Court Judge Patti B. Saris scheduled sentencing for July 17, 2025. Pyrtle was charged in April 2023, along with co-conspirator Ashley Roostaie.

    Pyrtle and Roostaie utilized the personal identification information (including name, date of birth and Social Security number) of an unknowing individual to fraudulently enter into lease agreements for two apartments in Braintree and Somerville, which Pyrtle then used to participate in a drug conspiracy involving distribution quantities of cocaine, fentanyl, fentanyl analogue and methamphetamine. The drug conspiracy in which Pyrtle participated also extended to other locations across the state.

    Pyrtle and Roostaie also created an email account and obtained a counterfeit driver’s license using the individual’s identification information. Pyrtle and Roostaie also used the individual’s identification information to obtain a Green Dot debit card account, which they used to make payments associated with the apartments. By placing the apartment leases under another individual’s personal identification information, Roostaie and Pyrtle were able to conceal their connection to and use of the apartments which were used by Pyrtle in furtherance of his drug distribution and drug conspiracy.

    In February 2025, Roostaie pleaded guilty and is scheduled to be sentenced in May 2025.

    The charge of conspiracy to distribute and possess with intent to distribute 500 grams and more of cocaine, 400 grams and more of fentanyl, 100 grams and more of fentanyl analogue, and methamphetamine provides for a sentence of at least 10 years and up to life in prison, at least five years and up to a lifetime of supervised release and a fine of up to $10 million. The charges of possession with intent to distribute 500 grams and more of cocaine, 400 grams and more of fentanyl, 100 grams and more of fentanyl analogue, and methamphetamine each provide for a sentence of at least 10 years and up to life in prison, at least five years and up to a lifetime of supervised release and a fine of up to $10 million. The charge of conspiracy to commit access device fraud and aggravated identity theft provides for a sentence of up to five years in prison, up to three years of supervised release and a fine of up to $250,000. The charge of access device fraud provides for a sentence of up to 10 years in prison, up to three years of supervised release and a fine of up to $250,000. The charge of aggravated identity theft provides for a mandatory two-year prison term consecutive to any term of imprisonment received on a predicate, substantive count, up to a one-year term of supervised release and a fine of up to $250,000. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

    United States Attorney Leah B. Foley; Jodi Cohen, Special Agent in Charge of the Federal Bureau of Investigation, Boston Division; and Colonel Geoffrey D. Noble, Superintendent of the Massachusetts State Police made the announcement today. Valuable assistance was provided by the Boston, Brockton, East Bridgewater and Bridgewater Police Departments and Plymouth County, Suffolk County and Bristol County Sheriff’s Departments. Assistant U.S. Attorneys Kaitlin R. O’Donnell David and Cutshall of the Criminal Division are prosecuting the case.  

    This effort is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) operation. OCDETF identifies, disrupts and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.
     

    MIL Security OSI

  • MIL-OSI Security: Two Fiji Nationals Sentenced to Prison for Carrying Out Multimillion-Dollar Real Estate Short Sale Fraud

    Source: Federal Bureau of Investigation (FBI) State Crime News

    FRESNO, Calif. — Jyoteshna Karan, 52, and Praveen Singh, 45, both of Modesto, were sentenced for leading a multi-million dollar mortgage fraud scheme, Acting United States Attorney Michele Beckwith announced today.  Karan received three years and four months in prison, and Singh received two years.

    According to court records, from 2006 through 2015, Karan and Singh conspired to make straw purchases and short sales of approximately 15 homes from Modesto to Sacramento.  A straw purchase is where one person buys a home on behalf of another person to get around certain restrictions.  Straw purchases are generally illegal in the real estate industry because they compromise lenders’ risk management practices.  A short sale is where a homeowner sells their home for less than the amount they owe on their mortgage, with lender approval, to avoid foreclosure.  Short sales must generally be arm’s length transactions in the real estate industry because that helps protect buyers and sellers from undervaluation, overpayment, and bias.

    After Karan and Singh acquired the homes, they allowed them to go into foreclosure and arranged for short sales with the lenders.  They then quickly resold, or flipped, the homes to other people at market rates and therefore reaped significant profits.  In doing so, they caused the lenders to suffer over $3,000,000 in losses.

    Karan and Singh were experienced real estate professionals who used unwitting participants, fabricated documents, and shell companies to carry out their fraud.  For example, they used Singh’s mother as one of the straw purchasers, fabricated documents to make it appear as though the straw purchasers worked for their shell companies making six figure salaries, and fabricated documents to make it appear as though the transactions were arm’s length.  This was all done to convince the lenders to go through with the deals.

    This case is the product of an investigation by the FBI, FDIC OIG, and the Stanislaus County District Attorney’s Office.  Assistant United States Attorney Joseph Barton prosecuted the case.

    MIL Security OSI

  • MIL-OSI Security: Owner of E-Card Lending Charged with Operating a Ponzi Scheme

    Source: Office of United States Attorneys

    MIAMI – The owner and founder of E-Card Lending LLC or E-Card Merchant LLC (E-Card) was charged with running an investment Ponzi scheme disguised as a merchant cash advance (MCA) business.

    Pablo Silverio Rebollido, 47, of Miami, Fla., was charged by an information with wire fraud on March 26.

    According to the allegations in the information, E-Card was purportedly engaged in the business of providing MCAs, a type of short-term financing typically used by small and medium-sized businesses. E-Card allegedly loaned money at high interest rates to its clients in the form of lump-sum cash advances in exchange for a percentage of future E-Card’s credit card sales or daily bank deposits.

    Court documents state that from August 2019 to February 2024, Rebollido fraudulently solicited money from investors purportedly to fund E-Card’s MCAs in exchange for regular monthly investment returns from E-Card’s profits. It is alleged that in reality, E-Card had no clients and Rebollido fraudulently used the investment funds to pay off earlier investors and finance his extravagant lifestyle. It is alleged that over 70 investors invested in E-Card and the scheme resulted in more than $40 million dollars in losses.

    Rebollido’s initial appearance hearing is scheduled for April 11 at 2:00 p.m. in Miami. If convicted, Rebollido faces up to 20 years in prison.

    U.S. Attorney Hayden P. O’Byrne for the Southern District of Florida and Acting Special Agent in Charge Brett Skiles of the FBI, Miami Field Office made the announcement.

    FBI Miami is investigating the case. Assistant U.S. Attorneys Robert F. Moore and Jon Juenger are prosecuting the case. Assistant U.S. Attorney Nicole Grosnoff is handling asset forfeiture.

    The charges contained in an information are merely accusations. All defendants are presumed innocent until proven guilty beyond reasonable doubt in a court of law.

    The FBI’s Miami Division is seeking to identify potential victims of “E Card Merchant LLC” or “E Card Lending LLC.” The FBI believes E Card Merchant primarily targeted victims between the timeframe of January 2019 to January 2024.

    If you and/or your minor dependent(s) were victimized by E Card Merchant or have information relevant to this investigation, please complete the short form located on the FBI’s Seeking Victims webpage.

    If you know of someone else who has possibly been victimized by E Card Merchant, please encourage them to complete the form themselves.

    The FBI is legally mandated to identify victims of federal crimes it investigates. Victims may be eligible for certain services, restitution, and rights under federal and/or state law. Your responses are voluntary but may be useful in the federal investigation and to identify you as a potential victim. Based on the responses provided, you may be contacted by the FBI and asked to provide additional information. All identities of victims will be kept confidential.

    Related court documents and information may be found on the website of the District Court for the Southern District of Florida at www.flsd.uscourts.gov or at http://pacer.flsd.uscourts.gov, under case number 25-cr-20127.

    ###

    MIL Security OSI

  • MIL-OSI Security: San Francisco Resident Who Shot and Killed Victim in the Presidio Found Guilty of Voluntary Manslaughter

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    SAN FRANCISCO – A federal jury today found Leion Butler, aka Leniyah Butler, 21, of San Francisco, guilty of voluntary manslaughter.  The verdict followed a two-week jury trial before U.S. District Judge Susan Illston.

    The jury found that Butler, a sex worker, killed a man in the Crissy Field East Beach area of the Presidio of San Francisco on Nov. 12, 2023, after performing a sex act on the victim.  According to court documents and evidence presented at trial, Butler shot the victim once in the eye after he asked for a refund and asked Butler to get out of the car.  After killing him, Butler stole the victim’s vehicle, drove it to Hunters Point, and tried to wipe away the fingerprints and DNA.  Butler spent the rest of that morning scattering the physical evidence, including the murder weapon.  

    “We extend our sincere condolences to the victim’s family, whose son and brother was taken from them prematurely, and hope today’s verdict brings some measure of justice,” said Acting United States Attorney Patrick D. Robbins.  “We commend the swift actions of the FBI agents, who promptly and thoroughly investigated this case from the moment the victim’s body was found in the Presidio.”

    “This conviction demonstrates the FBI’s unwavering commitment to seeking justice for victims of violent crime,” said FBI Special Agent in Charge Sanjay Virmani. “Through tireless investigative work and collaboration with our law enforcement partners, we ensured that the defendant was held accountable for this senseless act. The FBI will continue to pursue those who commit violent offenses and threaten the safety of our communities.”

    The jury acquitted Butler of murder in the second degree.

    Butler, who is currently being held in custody, is scheduled to be sentenced on June 27, 2025.  The maximum statutory penalty for a violation of 18 U.S.C. § 1112 is 15 years and a fine of $250,000, plus restitution if appropriate.  Any sentence will be imposed by the court after consideration of the U.S. Sentencing Guidelines and the federal statute governing the imposition of a sentence, 18 U.S.C. § 3553.

    Assistant U.S. Attorneys Kelsey Davidson and George Hageman are prosecuting the case with the assistance of Helen Yee, Jessie Chelsea, Marina Ponomarchuk, and Janice Pagsanjan.  The prosecution is the result of a monthslong investigation by the FBI.
     

    MIL Security OSI

  • MIL-OSI: BitMart to Host Seine & Crypto Connect — An Unmissable Paris Blockchain Week Afterparty on April 8

    Source: GlobeNewswire (MIL-OSI)

    Mahe, Seychelles, April 03, 2025 (GLOBE NEWSWIRE) — As Paris Blockchain Week 2025 draws near, BitMart is excited to announce Seine & Crypto Connect, an exclusive afterparty hosted in collaboration with PaybisMetaEra, and other esteemed partners. The event will take place on April 8, 2025, from 7 PM to 11 PM CET at Les Jardins du Pont Neuf, a private waterfront venue along the iconic Seine River.

    Seine & Crypto Connect will bring together top leaders, investors, and innovators from the blockchain space for a night of strategic networking and high-level discussions. Co-hosted by Paybis, a leading cryptocurrency platform operating across the US, UK, and Europe; MetaEra, a pioneering Web3 news platform; and sponsored by Blockdaemon, the institutional gateway to Web3; and ZetaChain, a universal EVM-compatible Layer 1 bringing cross-chain interoperability to the blockchain ecosystem, this event will provide unparalleled opportunities for collaboration and innovation.

    What to Expect at Seine & Crypto Connect:

    • Exclusive Venue – Guests will enjoy a private riverside reception, offering an elegant atmosphere and stunning views of Paris.
    • Gourmet Experience – Attendees will indulge in premium wines, artisanal cheese, and expertly crafted hors d’oeuvres, creating a sophisticated setting for networking.
    • Engaging Entertainment – A live DJ and ambient lighting will add to the immersive atmosphere, providing a lively backdrop for the evening.
    • High-Impact Networking – Attendees will connect with industry leaders, investors, and innovators shaping the future of Web3, Crypto, and Blockchain technology.
    • Exclusive Seine Cruise – A limited opportunity to board a 20-minute scenic tour along the Seine River directly from the venue, offering a unique Parisian experience.

    This exclusive event serves as an opportunity to engage with some of the most influential players in the blockchain and digital assets space, fostering collaboration and sparking meaningful conversations in a relaxed yet vibrant atmosphere.

    To join the event, please RSVP here: https://lu.ma/a97zotmk

    Proudly Co-Hosted by:

    • Paybis – A leading cryptocurrency platform offering secure, compliant services across the US, UK, and Europe.
    • MetaEra – A Web3 news pioneer shaping the next wave of tech innovation.

    Sponsored by:

    • Blockdaemon – The institutional gateway to Web3, trusted by 400+ institutions and securing over $110B in digital assets.
    • ZetaChain – A universal EVM-compatible L1 bringing cross-chain interoperability to Solana, Bitcoin, and beyond. 

    Come for the innovation. Stay for the magic of Paris.

    About BitMart
    BitMart is the premier global digital asset trading platform. With millions of users worldwide and ranked among the top crypto exchanges on CoinGecko, it currently offers 1,700+ trading pairs with competitive trading fees. Constantly evolving and growing, BitMart is interested in crypto’s potential to drive innovation and promote financial inclusion. To learn more about BitMart, visit their Website, follow their X (Twitter), or join their Telegram for updates, news, and promotions. Download BitMart App to trade anytime, anywhere.

    Disclaimer: The information provided in this press release is not a solicitation for investment, nor is it intended as investment advice, financial advice, or trading advice. It is strongly recommended you practice due diligence, including consultation with a professional financial advisor, before investing in or trading cryptocurrency and securities.

    The MIL Network

  • MIL-OSI Security: South Dakota and Colorado Men Convicted of Conspiracy to Distribute Methamphetamine Across the State of South Dakota Including the Crow Creek Reservation

    Source: Office of United States Attorneys

    SIOUX FALLS – United States Attorney Alison J. Ramsdell announced that a jury has convicted Christopher Spider, a/k/a “House”, age 45 of South Dakota and Lance Brunsting, age 56, of Colorado, of Conspiracy to Distribute a Controlled Substance following a four-day jury trial in federal district court in Sioux Falls, South Dakota. The verdict was returned on March 27, 2025.

    The charges carry a mandatory minimum of 10 years and up to life in custody and/or a $10,000,000 fine, mandatory minimum of five years and up to life of supervised release, and a $100 special assessment to the Federal Crime Victims Fund.

    Christopher Spider was also convicted of Tampering with a Witness. That charge carries a maximum penalty of 20 years imprisonment and/or a $250,000 fine, a possibility of up to three years of supervised release, and a $100 special assessment to the Federal Crime Victims Fund.

    Spider and Brunsting were indicted by a federal grand jury in August 2023.

    Brunsting and Spider, along with numerous other individuals, conspired to distribute hundreds of pounds of methamphetamine throughout the state of South Dakota.

    Spider, a resident of Crow Creek, was responsible for distributing approximately 30 pounds of methamphetamine throughout the Crow Creek Indian Reservation during his involvement in the conspiracy. While under Indictment for the offense, Spider sent a letter to another witness attempting to intimidate the witness into changing her testimony at trial. The letter was reported to law enforcement and Spider was subsequently indicted for Witness Tampering.

    Brunsting, a resident of Denver, Colorado, was responsible for assisting in the weighing, packaging, and ultimate distribution of approximately 100 pounds of methamphetamine. Brunsting made a trip to South Dakota alongside another co-conspirator where he assisted in selling approximately 41 pounds of methamphetamine throughout the state of South Dakota and into Minnesota.

    “Christopher Spider and Lance Brunsting were involved in one of the largest methamphetamine conspiracies in South Dakota history,” said U.S. Attorney Alison J. Ramsdell. “Our office was able to successfully prosecute the large-scale drug conspiracy thanks to the exceptional collaborative and investigative efforts of our federal, state, local, and tribal law enforcement partners. Last week’s convictions represent a crucial step toward bringing these individuals to justice for the roles they played in bringing hundreds of pounds of illegal narcotics into our South Dakota communities.”

    The Drug Enforcement Administration provided the following statement: “The two individuals convicted last week are responsible for inflicting immeasurable harm on members of our South Dakota communities,” Drug Enforcement Administration Omaha Division Acting Special Agent in Charge Rafael Mattei said. “Their arrest and conviction should serve as a warning to drug traffickers that the combined efforts of state, local and federal law enforcement will bring those pushing these dangerous substances to justice.”

    This case was investigated by the Drug Enforcement Administration (including the Rocky Mountain Field Division, Omaha Field Division, Mexico City Country Office, Los Angeles Field Division, Special Operations Division), as well as South Dakota Division of Criminal Investigation, Sioux Falls Area Drug Task Force, FBI, South Dakota Highway Patrol, U.S. Postal Inspection Service, IRS Criminal Investigation team, El Paso Intelligence Center, and collaboration received from the U.S. Attorney’s Office for the District of Colorado, Bureau of Indian Affairs, U.S. Marshals Service, Minnehaha County Sheriff’s Office, Sioux Falls Police Department, Mitchell Police Department, Denver Police Department, Las Vegas Metro Police Department, Worthington Police Department, Brookings Police Department, Brookings Sherriff’s Department, Rock County Sheriff’s Office, Lake Superior Violent Offender Task Force, Central Minnesota Violent Offender Task Force,  Minnesota River Valley Drug Task Force, and the Colorado Department of Corrections. Assistant U.S. Attorney Paige Petersen prosecuted the case.

    A presentence investigation was ordered and a sentencing date has been set for June 16, 2025. The defendants were remanded to the custody of the U.S. Marshals Service. 

     

     

    MIL Security OSI

  • MIL-OSI Security: Milwaukee Man Sentenced to 11 Years in Federal Prison for Armed Carjackings

    Source: Office of United States Attorneys

    Richard G. Frohling, Acting United States Attorney for the Eastern District of announced today that James Poole (age 19) was sentenced to 11 years in federal prison for his role in armed carjackings in Milwaukee.

    According to court records, Poole participated in two armed carjackings in late January 2024.  In each of the carjackings, Poole brandished a firearm. On January 29, 2024, at approximately 7:45 pm, Poole committed a carjacking on the 2400 block of N. Farwell Avenue on the East Side of Milwaukee. The following day, at approximately 5:00 pm, Poole engaged in a carjacking in a parking lot in downtown Milwaukee, near 2nd Street and Plankinton Avenue. Shortly after the second carjacking, while driving the stolen vehicle, Poole led members of the Milwaukee Police Department on a high-speed chase through residential neighborhoods and reaching speeds of 90 mph. Poole ultimately crashed the stolen car into a tree near 82nd and Burleigh Streets, causing life-threatening injuries to all passengers inside the stolen vehicle. Following his term of imprisonment, Poole also will spend three years on supervised release.  He also was ordered to pay restitution.

    Poole’s co-defendant, Jabari Griffin (age 21), was sentenced on February 27, 2025, for his role in aiding and abetting Poole in the January 30, 2024, carjacking. Griffin was sentenced to 6 years in federal prison and three years of supervised release.      

    “Individuals who engage in violent crimes – like these armed carjackings – not only endanger the lives and well-being of their victims but also can shatter the confidence of all residents that our cities are safe places in which to live and work,” said Acting U.S. Attorney Frohling. “The U.S. Attorney’s Office remains committed to working with all of its federal, state, and local law enforcement partners to hold these individuals accountable for their actions and to pursue justice for all impacted victims.”

    “Armed carjackings and the dangerous actions of those who committed the offenses in this case endangered the public and impacted the victims of this crime. This sentencing reflects the severity of the crimes committed by James Poole,” said FBI Milwaukee Special Agent in Charge Michael Hensle. “The FBI remains steadfastly committed to working with our partners to investigate violent crime matters—to include armed carjackings—in our ongoing efforts to positively impact public safety within our community.”

    “The Milwaukee Police Department (MPD) is proud of the dedication and hard work of everyone involved in holding violent individuals accountable for their actions. Armed carjackings are violent acts that cause great harm to our community.  Those that bring harm to our community must be held accountable.” said Milwaukee Police Chief Jeffrey Norman. “MPD values our collaboration with the community, federal, state and local law enforcement partners to build a safer city for everyone to live, work and play.”   

    This matter was investigated by the FBI’s Milwaukee Area Violent Crimes Task Force, including the Milwaukee Police Department. It was prosecuted by Assistant United States Attorneys Abbey M. Marzick and Michael C. Schindhelm.

    # # #

    For Additional Information Contact:

    Public Information Officer

    Kenneth.Gales@usdoj.gov

    414-297-1700

     

    Follow us on Twitter

    MIL Security OSI

  • MIL-OSI Russia: Financial news: New basis for calculating the zero-coupon yield curve for government bonds comes into force on April 15, 2025

    Translartion. Region: Russians Fedetion –

    Source: Moscow Exchange – Moscow Exchange –

    From April 15, 2025, a new composition of the calculation base for the Zero-coupon yield curve of government bonds (federal loan bonds) will come into effect.

    The calculation basis for the zero-coupon yield curve of government bonds, effective from 15.04.2025

    No. Name State registration number
    1 OFZ 26234 SE26234RMFS3
    2 OFZ 26229 SU26229RMFS3
    3 OFZ 26219 CO26219RMFS4
    4 OFZ 26226 SU2226RMFS9
    5 OFZ 26207 SE26207RMFS9
    6 OFZ 26232 SE26232RMFS7
    7 OFZ 26212 CO26212RMFS9
    8 OFZ 26242 CO26242RMFSB
    9 OFZ 26228 SU2228RMFS5
    10 OFZ 26218 CO26218RMFSB
    11 OFZ 26241 CO26241RMFS8
    12 OFZ 26221 SU26221RMFS0
    13 OFZ 26244 CO26244RMFS2
    14 OFZ 26225 SU2225RMFS1
    15 OFZ 26233 SE26233RMFS5
    16 OFZ 26240 CO26240RMFS0
    17 OFZ 26243 CO26243RMFS4
    18 OFZ 26230 SE26230RMFS1
    19 OFZ 26238 SE26238RMFS4
    20 OFZ 26239 SE26239RMFS2
    21 OFZ 26247 CO26247RMFS5
    22 OFZ 26236 SE26236RMFS8
    23 OFZ 26237 SE26237RMFSB
    24 OFZ 26248 CO26248RMFS3
    25 OFZ 26235 SE26235RMFS0
    26 OFZ 26224 SU22224RMFS4
    27 OFZ 26246 CO26246RMFS7

    Detailed information on the zero-coupon yield curve for government bonds (federal loan bonds) is available on the exchange’s website HTTP: //moex.Kom/a3642

    Contact information for media 7 (495) 363-3232Pr@moex.kom

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    Please Note; This Information is Raw Content Directly from the Information Source. It is access to What the Source Is Stating and Does Not Reflect

    HTTPS: //VVV. MOEX.K.M.M.

    MIL OSI Russia News

  • MIL-OSI Security: Importer and Distributer of Wholesale Quantities of Fentanyl Pleads Guilty

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

               WASHINGTON – Ronnie Rogers, 69, of Washington D.C., pleaded guilty today in U.S. District Court to participating in a drug trafficking conspiracy that imported and redistributed wholesale quantities of fentanyl, heroin, cocaine, and crack cocaine in the District of Columbia.

              The plea agreement was announced by U.S. Attorney Edward R. Martin, Jr., Special Agent in Charge Ibrar A. Mian of the Drug Enforcement Administration (DEA) Washington Division, FBI Special Agent Sean Ryan of the Washington Field Office Criminal and Cyber Division, Special Agent in Charge Anthony Spotswood of the Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) Washington Field Division, and Chief Pamela Smith of the Metropolitan Police Department (MPD).

              Rogers pleaded guilty to a three-count Information charging him with conspiracy to distribute 400 grams or more of fentanyl, 100 grams or more of a fentanyl analogue, and 100 grams or more of heroin; conspiracy to distribute 500 grams or more of cocaine and cocaine base; and to possessing a firearm in furtherance of a drug trafficking offense.

    U.S. District Court Judge Trevor N. McFadden scheduled a sentencing hearing for July 21, 2025. Rogers is eligible for a mandatory minimum of 15 years in prison to a maximum of life.

              According to the plea agreement, between July 2021 and November 2023, Rogers coordinated with his co-conspirators to traffic fentanyl, heroin, cocaine, and cocaine base in the District of Columbia and elsewhere. This included over 12 kilograms of fentanyl (including carfentanil, which is 10,000 times more potent than morphine and 100 times more potent than fentanyl), over 1967 grams of fentanyl analog (p-Fluorofentanyl, which is also more lethal than fentanyl), over 236 grams of heroin, over 500 grams of cocaine, and less than 28 grams of cocaine base.

              On November 29, 2023, law enforcement executed search warrants at Rogers’ various residences.

              At his apartment on the 1200 block of Massachusetts Avenue, NW, law enforcement recovered an array of narcotics that included a large baggie containing 494.8 grams of mixture of heroin, fentanyl, and carfentanil; another baggie with 704.8 grams of carfentanil, an envelope containing 115.91 grams of fentanyl; another baggie containing 201 grams of fentanyl; and baggies containing 1,785 grams acetaminophen and 18 grams of fentanyl. In addition, officers recovered a Smith & Wesson SD-40 firearm, a Glock 43 pistol, a Rugar LCP pistol, $23,000 in cash, and an assortment of drug packaging materials and scales.

              At Roger’s residence on the 6500 block of Gateway Boulevard, in District Heights, Maryland, law enforcement recovered more narcotics and weapons including two baggies containing 151 grams of fentanyl; plastic bags containing 2.4 grams of xylazine and 1.8 grams of heroin; baggies containing bundles of smaller bags containing 7.7 grams of  fentanyl, heroin, xylazine, 1.4 grams of carfentanil, and 2.8 grams of acetaminophen, 20 small baggies containing 5.1 grams of fentanyl, heroin and xylazine; and bags containing 97.3 grams of heroin and fentanyl, 45.4 grams of cocaine base, and 14.2 grams of fentanyl with xylazine. Officers also recovered a Smith &Wesson .357 revolver, a Springfield XD 9mm firearm, a Canik TP9 pistol, assorted ammunition and magazines and $1,524 in cash.

              At another residence utilized by Rogers located on the 2100 block of Pineview Court, Waldorf, Maryland, law enforcement recovered a FedEx parcel containing 1,013 grams of fentanyl.

             This operation is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) investigation. OCDETF identifies, disrupts, and dismantles the highest-level drug traffickers, money launderers, gangs, and transnational criminal organizations that threaten the United States by using a prosecutor-led, intelligence-driven, multi-agency approach that leverages the strengths of federal, state, and local law enforcement agencies against criminal networks.

             This case is being investigated by the DEA Washington Division, the FBI Washington Field Office, the Alexandria Police Department, and the Metropolitan Police Department. Valuable assistance was provided by the U.S. Postal Inspection Service, Bureau of Alcohol, Tobacco, and Firearms Washington Field Division, U.S. Customs and Border Patrol, U.S. Bureau of Prisons, Montgomery County Police Department, Prince George’s County Police Interdiction Unit, Charles County Sheriff’s Office, Arlington County Police, Montgomery County Department of Police, Virginia State Police, Loudoun County Sherriff’s Office, the U.S. Attorney’s Office for the District of Maryland (Greenbelt), the U.S. Attorney’s Office for the Northern District of Texas, and the U.S. Attorney’s Office for the Middle District of Tennessee.

              The case is being prosecuted by Assistant U.S. Attorneys George Eliopoulos and Matthew Kinskey of the Violence Reduction and Trafficking Section.

    23cr394

    MIL Security OSI

  • MIL-OSI Security: Armed Felon Indicted Following Traffic Stop in Northwest D.C.

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

              WASHINGTON – Trevon Timothy Vines, 30, of Washington, D.C., has been indicted on a federal gun charge in the latest case to be federally adopted as part of the “Make D.C. Safe Again” initiative. 

              The indictment was announced by U.S. Attorney Edward R. Martin Jr., Sean T. Ryan, Special Agent in Charge of the FBI Washington Field Office Criminal and Cyber Division, Special Agent in Charge Anthony Spotswood of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), and Chief Pamela Smith of the Metropolitan Police Department (MPD).

              Vines was indicted on one count of Unlawful Possession of a Firearm and Ammunition by a Person Convicted of a Crime Punishable by Imprisonment for a Term Exceeding One Year. 

              According to court documents, on March 15, 2025, officers with the Metropolitan Police Department conducted a traffic stop in the vicinity of 1820 7th Street NW after observing a traffic infraction. It is alleged that during the course of the stop, officers observed several open containers of alcohol and requested that all occupants exit the vehicle.

              It is alleged that one of the occupants, defendant Vines, was seated in the front passenger seat and holding a cup consistent with the others observed. As officers attempted to place Vines in handcuffs, they felt what they immediately recognized to be a handgun on his person in a front left jacket pocket. Vines then began physically resisting, grabbing one officer’s vest and attempting to move him while repeatedly reaching for the weapon forcibly.

              Officers eventually recovered the firearm and discovered that it had been reported stolen from a gun dealer in White Plains, Maryland.

              An investigation revealed that Vines is a convicted felon with multiple prior convictions. At the time of the incident, Vines was prohibited from possessing a firearm or ammunition under federal and D.C. law. He did not have a license to carry or own a firearm in the District of Columbia.

              This case is being investigated by the FBI Washington Field Office, ATF Baltimore Field Office, and the Metropolitan Police Department. This case is being prosecuted by Assistant U.S. Attorney Emory V. Cole.

              This case is part of Make D.C. Safe Again, a public safety initiative led by U.S. Attorney Martin that is surging resources to reduce violent crime in the District of Columbia. This initiative was created to address gun violence in the District, prioritize federal firearms violations, pursue tougher penalties for offenders, and seek detention for federal firearms violators.

              An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

     

    ###

     

    MIL Security OSI

  • MIL-OSI: Centri Capital Conference Scheduled for April 2025 at Nasdaq in NYC

    Source: GlobeNewswire (MIL-OSI)

    NEW YORK, April 03, 2025 (GLOBE NEWSWIRE) — via InvestorWire — Centri Business Consulting, LLC, a highly respected accounting and advisory firm, is pleased to announce the Centri Capital Conference, an exclusive event designed for investment bankers, private equity investors, venture capitalists, and other capital markets participants. The event will take place on Tuesday, April 22, 2025, at Nasdaq in New York City.

    With an insights-packed agenda featuring in-depth company presentations from C-suite leaders, high-powered meetings, and a distinguished roster of industry experts, this exclusive event will bring together hundreds of attendees from across the investment community. Invited experts will share invaluable perspectives on leveraging technology-driven growth opportunities while navigating broader market volatility.

    This invite-only event will explore a diverse range of topics across the rapidly evolving global capital markets. The conference is especially well-timed following Federal Reserve Chairman Jerome Powell’s recent remarks on the “highly uncertain environment.” While the FOMC projects additional rate cuts in 2025, concerns about inflation, weakening consumer sentiment, geopolitical instability, increasing trade restrictions, and the rising likelihood of global conflicts continue to shape market conditions.

    Michael Aiello, CEO & Managing Partner of Centri, stated: “The Centri Capital Conference is instrumental in fostering collaborative relationships between seasoned capital market professionals searching for new opportunities and innovative companies seeking access to risk capital, market exposure, and long-term strategic partnerships. We’ve curated an incredible lineup of presenting companies and expert speakers who will provide valuable insights on the future of the capital markets. It is a must-attend event in the deal space.”

    The conference will feature a curated lineup of 50+ high-growth companies spanning healthcare, life sciences, disruptive technology, and other rapidly expanding sectors. Attendees will have access to one-on-one meetings, gaining unique market insights, exploring synergies, and discussing future business roadmaps.

    Christopher Mora, Chief Revenue Officer, Partner, and Capital Markets Practice Leader at Centri, added: “The Centri Capital Conference is designed to maximize business productivity by creating an environment primed for networking, knowledge-sharing, and building lasting connections to support long-term growth.”

    Attendees will also engage directly with renowned thought leaders and seasoned experts through a series of dynamic panel discussions:

    • IPO Market: Trends, Pathway to Success, and Lessons Learned featuring J.D. Moriarty, CEO, ICR & Jay Heller, Head of Capital Markets, Nasdaq
    • Blockchain and Cryptocurrency Dynamics: Shaping the Future of Capital Markets featuring Edward McGee, CFO, Grayscale Investments
    • Cutting Through the Hype: How Growth-Stage Investors & Company CEOs Can Leverage AI featuring Mike Ryan, CEO, Bulletpoint Network
    • Market Disruptors: Capital Strategies for Innovative Companies featuring Sean McGann, Managing Director, Cantor Fitzgerald
    • Investment Trends: Venture Capital and Private Credit featuring John Pennett, Partner in Charge of Technology and Life Sciences Practice, EisnerAmper
    • Global Dynamics: Navigating Economic and Regulatory Shifts featuring Derek Dostel, Partner, Davis Polk

    The event will conclude with an evening reception, providing attendees with a relaxed environment to connect with industry peers and fellow professionals.

    As a premier event in the financial landscape, the Centri Capital Conference offers unparalleled education, networking, and collaborative opportunities, making it a must-attend for investors and executives active in the capital markets.

    Companies and investors interested in presenting, attending, or sponsoring the Centri Capital Conference can register here.

    About Centri Business Consulting, LLC

    Centri Business Consulting provides the highest quality advisory consulting services by being reliable and responsive to its clients’ needs. The firm specializes in financial reporting, internal controls, technical accounting research, valuation, mergers & acquisitions, tax, CFO and HR advisory services for companies of various sizes and industries. From complex technical accounting transactions to monthly financial reporting, Centri’s professionals offer the specialized expertise, and multilayered skill sets necessary to ensure projects are completed timely and accurately.

    About IBN

    IBN consists of financial brands introduced to the investment public over the course of 18+ years. With IBN, we have amassed a collective audience of millions of social media followers. These distinctive investor brands aim to fulfill the unique needs of a growing base of client-partners. IBN will continue to expand our branded network of highly influential properties, leveraging the knowledge and energy of specialized teams of experts to serve our increasingly diversified list of clients.
    Through our Dynamic Brand Portfolio (DBP), IBN provides: (1) access to a network of wire solutions via InvestorWire to reach all target markets, industries and demographics in the most effective manner possible; (2) article and editorial syndication to 5,000+ news outlets; (3) Press Release Enhancement to ensure maximum impact; (4) full-scale distribution to a growing social media audience; (5) a full array of corporate communications solutions; and (6) total news coverage solutions.
    For more information, please visit https://www.InvestorBrandNetwork.com
    Please see full terms of use and disclaimers on the InvestorBrandNetwork website applicable to all content provided by IBN, wherever published or re-published: http://IBN.fm/Disclaimer

    About Centri Business Consulting, LLC

    Centri Business Consulting provides the highest quality advisory consulting services to its clients by being reliable and responsive to their needs. Centri provides companies with the expertise they need to meet their reporting demands. Centri specializes in financial reportinginternal controlstechnical accounting researchvaluationmergers & acquisitions, and taxCFO and HR advisory services for companies of various sizes and industries. From complex technical accounting transactions to monthly financial reporting, our professionals can offer any organization the specialized expertise and multilayered skillsets to ensure the project is completed timely and accurately.

    Corporate Communications

    IBN
    Austin, Texas
    www.InvestorBrandNetwork.com
    512.354.7000 Office
    Editor@InvestorBrandNetwork.com

    The MIL Network

  • MIL-OSI Security: CISA and Partners Issue Fast Flux Cybersecurity Advisory

    Source: US Department of Homeland Security

    WASHINGTON, DC – Today, the Cybersecurity and Infrastructure Security Agency (CISA) joined the National Security Agency (NSA) and other government and international partners to release a joint Cybersecurity Advisory (CSA) that warns organizations, internet service providers (ISPs), and cybersecurity service providers about fast flux enabled malicious activities that consistently evade detection. The CSA also provides recommended actions to defend against fast flux. 

    An ongoing threat, fast flux networks create resilient adversary infrastructure used to evade tracking and blocking. Such infrastructure can be used for cyberattacks such as phishing, command and control of botnets, and data exfiltration. This advisory provides several techniques that should be implemented for a multi-layered security approach including DNS and internet protocol (IP) blocking and sinkholing; enhanced monitoring and logging; phishing awareness and training for users; and reputational filtering. 

     ”Threat actors leveraging fast flux techniques remain a threat to government and critical infrastructure organizations. Fast flux makes individual computers in a botnet harder to find and block. A useful solution is to find and block the behavior of fast flux itself,” said CISA Deputy Executive Assistant Director for Cybersecurity Matt Hartman. “CISA is pleased to join with our government and international partners to provide this important guidance on mitigating and blocking malicious fast flux activity. We encourage organizations to implement the advisory recommendations to reduce risk and strengthen resilience.” 

    The authoring agencies encourage ISPs, cybersecurity service providers and Protective Domain Name System (PDNS) providers to help mitigate this threat by taking proactive steps to develop accurate and reliable fast flux detection analytics and block fast flux activities for their customers. 

    Additional co-sealers for this joint CSA are Federal Bureau of Investigation (FBI), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), Canadian Centre for Cyber Security (CCCS), and New Zealand National Cyber Security Centre (NCSC-NZ). 

     For more information about ongoing security threats, visit CISA Cybersecurity Alerts & Advisories

    ###

    About CISA 

    As the nation’s cyber defense agency and national coordinator for critical infrastructure security, the Cybersecurity and Infrastructure Security Agency leads the national effort to understand, manage, and reduce risk to the digital and physical infrastructure Americans rely on every hour of every day.

    Visit CISA.gov for more information and follow us onX, Facebook, LinkedIn, Instagram

    MIL Security OSI

  • MIL-OSI Economics: W&T Offshore to Participate in Water Tower Research Fireside Chat on April 7, 2025

    Source: W & T Offshore Inc

    Headline: W&T Offshore to Participate in Water Tower Research Fireside Chat on April 7, 2025

    HOUSTON, April 03, 2025 (GLOBE NEWSWIRE) — W&T Offshore, Inc. (NYSE: WTI) (“W&T” or the “Company”) today announced its participation in a fireside chat with Water Tower Research (“WTR”) on Monday, April 7, 2025 at 10:00 AM Central Time.

    As part of WTR’s ongoing Fireside Chat Series, Jeff Robertson, Managing Director at WTR, will lead an in-depth conversation with Tracy Krohn, W&T’s Chairman and Chief Executive Officer, to discuss W&T’s strategy for creating value in the Gulf of America. A variety of important topics will be covered including:

    • Characteristics of an attractive Gulf of America asset acquisition;
    • Adding value through exploitation and cost management;
    • The production outlook for 2025; and
    • Balance sheet management to support growth.

    Investors and other interested parties can access the event by registering in advance at:
    https://us06web.zoom.us/webinar/register/1817435160161/WN_P6vxkb-fRQyEOEOZ2ozZvA.

    The live discussion and a replay will also be available on W&T’s web site, www.wtoffshore.com, in the “Investors” section.

    About W&T Offshore

    W&T Offshore, Inc. is an independent oil and natural gas producer with operations offshore in the Gulf of America and has grown through acquisitions, exploration and development. As of December 31, 2024, the Company had working interests in 52 fields in federal and state waters (which include 45 fields in federal waters and seven in state waters). The Company has under lease approximately 646,200 gross acres (502,300 net acres) spanning across the outer continental shelf off the coasts of Louisiana, Texas, Mississippi and Alabama, with approximately 493,000 gross acres on the conventional shelf, approximately 147,700 gross acres in the deepwater and 5,500 gross acres in Alabama state waters. A majority of the Company’s daily production is derived from wells it operates. For more information on W&T, please visit the Company’s website at www.wtoffshore.com.

    CONTACTS:  
    Al Petrie
    Investor Relations Coordinator
    investorrelations@wtoffshore.com 
    713-297-8024

    Sameer Parasnis
    Executive VP and CFO
    sparasnis@wtoffshore.com
    713-513-8654

    Source: W&T Offshore, Inc.

    MIL OSI Economics

  • MIL-OSI Security: Fast Flux: A National Security Threat

    Source: US Department of Homeland Security

    Executive summary

    Many networks have a gap in their defenses for detecting and blocking a malicious technique known as “fast flux.” This technique poses a significant threat to national security, enabling malicious cyber actors to consistently evade detection. Malicious cyber actors, including cybercriminals and nation-state actors, use fast flux to obfuscate the locations of malicious servers by rapidly changing Domain Name System (DNS) records. Additionally, they can create resilient, highly available command and control (C2) infrastructure, concealing their subsequent malicious operations. This resilient and fast changing infrastructure makes tracking and blocking malicious activities that use fast flux more difficult. 

    The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), Canadian Centre for Cyber Security (CCCS), and New Zealand National Cyber Security Centre (NCSC-NZ) are releasing this joint cybersecurity advisory (CSA) to warn organizations, Internet service providers (ISPs), and cybersecurity service providers of the ongoing threat of fast flux enabled malicious activities as a defensive gap in many networks. This advisory is meant to encourage service providers, especially Protective DNS (PDNS) providers, to help mitigate this threat by taking proactive steps to develop accurate, reliable, and timely fast flux detection analytics and blocking capabilities for their customers. This CSA also provides guidance on detecting and mitigating elements of malicious fast flux by adopting a multi-layered approach that combines DNS analysis, network monitoring, and threat intelligence. 

    The authoring agencies recommend all stakeholders—government and providers—collaborate to develop and implement scalable solutions to close this ongoing gap in network defenses against malicious fast flux activity.

    Download the PDF version of this report: Fast Flux: A National Security Threat (841 KB).

    Technical details

    When malicious cyber actors compromise devices and networks, the malware they use needs to “call home” to send status updates and receive further instructions. To decrease the risk of detection by network defenders, malicious cyber actors use dynamic resolution techniques, such as fast flux, so their communications are less likely to be detected as malicious and blocked. 

    Fast flux refers to a domain-based technique that is characterized by rapidly changing the DNS records (e.g., IP addresses) associated with a single domain [T1568.001]. 

    Single and double flux

    Malicious cyber actors use two common variants of fast flux to perform operations:

    1. Single flux: A single domain name is linked to numerous IP addresses, which are frequently rotated in DNS responses. This setup ensures that if one IP address is blocked or taken down, the domain remains accessible through the other IP addresses. See Figure 1 as an example to illustrate this technique.

    Figure 1: Single flux technique.

    Note: This behavior can also be used for legitimate purposes for performance reasons in dynamic hosting environments, such as in content delivery networks and load balancers.

    2. Double flux: In addition to rapidly changing the IP addresses as in single flux, the DNS name servers responsible for resolving the domain also change frequently. This provides an additional layer of redundancy and anonymity for malicious domains. Double flux techniques have been observed using both Name Server (NS) and Canonical Name (CNAME) DNS records. See Figure 2 as an example to illustrate this technique.

    Figure 2: Double flux technique. 

    Both techniques leverage a large number of compromised hosts, usually as a botnet from across the Internet that acts as proxies or relay points, making it difficult for network defenders to identify the malicious traffic and block or perform legal enforcement takedowns of the malicious infrastructure. Numerous malicious cyber actors have been reported using the fast flux technique to hide C2 channels and remain operational. Examples include:

    • Bulletproof hosting (BPH) services offer Internet hosting that disregards or evades law enforcement requests and abuse notices. These providers host malicious content and activities while providing anonymity for malicious cyber actors. Some BPH companies also provide fast flux services, which help malicious cyber actors maintain connectivity and improve the reliability of their malicious infrastructure. [1]
    • Fast flux has been used in Hive and Nefilim ransomware attacks. [3], [4]
    • Gamaredon uses fast flux to limit the effectiveness of IP blocking. [5], [6], [7]

    The key advantages of fast flux networks for malicious cyber actors include:

    • Increased resilience. As a fast flux network rapidly rotates through botnet devices, it is difficult for law enforcement or abuse notifications to process the changes quickly and disrupt their services.
    • Render IP blocking ineffective. The rapid turnover of IP addresses renders IP blocking irrelevant since each IP address is no longer in use by the time it is blocked. This allows criminals to maintain resilient operations.
    • Anonymity. Investigators face challenges in tracing malicious content back to the source through fast flux networks. This is because malicious cyber actors’ C2 botnets are constantly changing the associated IP addresses throughout the investigation.

    Additional malicious uses

    Fast flux is not only used for maintaining C2 communications, it also can play a significant role in phishing campaigns to make social engineering websites harder to block or take down. Phishing is often the first step in a larger and more complex cyber compromise. Phishing is typically used to trick victims into revealing sensitive information (such as login passwords, credit card numbers, and personal data), but can also be used to distribute malware or exploit system vulnerabilities. Similarly, fast flux is used for maintaining high availability for cybercriminal forums and marketplaces, making them resilient against law enforcement takedown efforts. 

    Some BPH providers promote fast flux as a service differentiator that increases the effectiveness of their clients’ malicious activities. For example, one BPH provider posted on a dark web forum that it protects clients from being added to Spamhaus blocklists by easily enabling the fast flux capability through the service management panel (See Figure 3). A customer just needs to add a “dummy server interface,” which redirects incoming queries to the host server automatically. By doing so, only the dummy server interfaces are reported for abuse and added to the Spamhaus blocklist, while the servers of the BPH customers remain “clean” and unblocked. 

    Figure 3: Example dark web fast flux advertisement.

    The BPH provider further explained that numerous malicious activities beyond C2, including botnet managers, fake shops, credential stealers, viruses, spam mailers, and others, could use fast flux to avoid identification and blocking. 

    As another example, a BPH provider that offers fast flux as a service advertised that it automatically updates name servers to prevent the blocking of customer domains. Additionally, this provider further promoted its use of separate pools of IP addresses for each customer, offering globally dispersed domain registrations for increased reliability.

    Detection techniques

    The authoring agencies recommend that ISPs and cybersecurity service providers, especially PDNS providers, implement a multi-layered approach, in coordination with customers, using the following techniques to aid in detecting fast flux activity [CISA CPG 3.A]. However, quickly detecting malicious fast flux activity and differentiating it from legitimate activity remains an ongoing challenge to developing accurate, reliable, and timely fast flux detection analytics. 

    1. Leverage threat intelligence feeds and reputation services to identify known fast flux domains and associated IP addresses, such as in boundary firewalls, DNS resolvers, and/or SIEM solutions.

    2. Implement anomaly detection systems for DNS query logs to identify domains exhibiting high entropy or IP diversity in DNS responses and frequent IP address rotations. Fast flux domains will frequently cycle though tens or hundreds of IP addresses per day.

    3. Analyze the time-to-live (TTL) values in DNS records. Fast flux domains often have unusually low TTL values. A typical fast flux domain may change its IP address every 3 to 5 minutes.

    4. Review DNS resolution for inconsistent geolocation. Malicious domains associated with fast flux typically generate high volumes of traffic with inconsistent IP-geolocation information.

    5. Use flow data to identify large-scale communications with numerous different IP addresses over short periods.

    6. Develop fast flux detection algorithms to identify anomalous traffic patterns that deviate from usual network DNS behavior.

    7. Monitor for signs of phishing activities, such as suspicious emails, websites, or links, and correlate these with fast flux activity. Fast flux may be used to rapidly spread phishing campaigns and to keep phishing websites online despite blocking attempts.

    8. Implement customer transparency and share information about detected fast flux activity, ensuring to alert customers promptly after confirmed presence of malicious activity.

    Mitigations

    All organizations

    To defend against fast flux, government and critical infrastructure organizations should coordinate with their Internet service providers, cybersecurity service providers, and/or their Protective DNS services to implement the following mitigations utilizing accurate, reliable, and timely fast flux detection analytics. 

    Note: Some legitimate activity, such as common content delivery network (CDN) behaviors, may look like malicious fast flux activity. Protective DNS services, service providers, and network defenders should make reasonable efforts, such as allowlisting expected CDN services, to avoid blocking or impeding legitimate content.

    1. DNS and IP blocking and sinkholing of malicious fast flux domains and IP addresses

    • Block access to domains identified as using fast flux through non-routable DNS responses or firewall rules.
    • Consider sinkholing the malicious domains, redirecting traffic from those domains to a controlled server to capture and analyze the traffic, helping to identify compromised hosts within the network.
    • Block IP addresses known to be associated with malicious fast flux networks.

    2. Reputational filtering of fast flux enabled malicious activity

    • Block traffic to and from domains or IP addresses with poor reputations, especially ones identified as participating in malicious fast flux activity.

    3. Enhanced monitoring and logging

    • Increase logging and monitoring of DNS traffic and network communications to identify new or ongoing fast flux activities.
    • Implement automated alerting mechanisms to respond swiftly to detected fast flux patterns.
    • Refer to ASD’s ACSC joint publication, Best practices for event logging and threat detection, for further logging recommendations.

    4. Collaborative defense and information sharing

    • Share detected fast flux indicators (e.g., domains, IP addresses) with trusted partners and threat intelligence communities to enhance collective defense efforts. Examples of indicator sharing initiatives include CISA’s Automated Indicator Sharing or sector-based Information Sharing and Analysis Centers (ISACs) and ASD’s Cyber Threat Intelligence Sharing Platform (CTIS) in Australia.
    • Participate in public and private information-sharing programs to stay informed about emerging fast flux tactics, techniques, and procedures (TTPs). Regular collaboration is particularly important because most malicious activity by these domains occurs within just a few days of their initial use; therefore, early discovery and information sharing by the cybersecurity community is crucial to minimizing such malicious activity. [8]

    5. Phishing awareness and training

    • Implement employee awareness and training programs to help personnel identify and respond appropriately to phishing attempts.
    • Develop policies and procedures to manage and contain phishing incidents, particularly those facilitated by fast flux networks.
    • For more information on mitigating phishing, see joint Phishing Guidance: Stopping the Attack Cycle at Phase One.

    Network defenders

    The authoring agencies encourage organizations to use cybersecurity and PDNS services that detect and block fast flux. By leveraging providers that detect fast flux and implement capabilities for DNS and IP blocking, sinkholing, reputational filtering, enhanced monitoring, logging, and collaborative defense of malicious fast flux domains and IP addresses, organizations can mitigate many risks associated with fast flux and maintain a more secure environment. 

    However, some PDNS providers may not detect and block malicious fast flux activities. Organizations should not assume that their PDNS providers block malicious fast flux activity automatically and should contact their PDNS providers to validate coverage of this specific cyber threat. 

    For more information on PDNS services, see the 2021 joint cybersecurity information sheet from NSA and CISA about Selecting a Protective DNS Service. [9] In addition, NSA offers no-cost cybersecurity services to Defense Industrial Base (DIB) companies, including a PDNS service. For more information, see NSA’s DIB Cybersecurity Services and factsheet. CISA also offers a Protective DNS service for federal civilian executive branch (FCEB) agencies. See CISA’s Protective Domain Name System Resolver page and factsheet for more information. 

    Conclusion

    Fast flux represents a persistent threat to network security, leveraging rapidly changing infrastructure to obfuscate malicious activity. By implementing robust detection and mitigation strategies, organizations can significantly reduce their risk of compromise by fast flux-enabled threats. 

    The authoring agencies strongly recommend organizations engage their cybersecurity providers on developing a multi-layered approach to detect and mitigate malicious fast flux operations. Utilizing services that detect and block fast flux enabled malicious cyber activity can significantly bolster an organization’s cyber defenses. 

    Works cited

    [1] Intel471. Bulletproof Hosting: A Critical Cybercriminal Service. 2024. https://intel471.com/blog/bulletproof-hosting-a-critical-cybercriminal-service 

    [2] Australian Signals Directorate’s Australian Cyber Security Centre. “Bulletproof” hosting providers: Cracks in the armour of cybercriminal infrastructure. 2025. https://www.cyber.gov.au/about-us/view-all-content/publications/bulletproof-hosting-providers 

    [3] Logpoint. A Comprehensive guide to Detect Ransomware. 2023. https://www.logpoint.com/wp-content/uploads/2023/04/logpoint-a-comprehensive-guide-to-detect-ransomware.pdf

    [4] Trendmicro. Modern Ransomware’s Double Extortion Tactic’s and How to Protect Enterprises Against Them. 2021. https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/modern-ransomwares-double-extortion-tactics-and-how-to-protect-enterprises-against-them

    [5] Unit 42. Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine. 2022. https://unit42.paloaltonetworks.com/trident-ursa/

    [6] Recorded Future. BlueAlpha Abuses Cloudflare Tunneling Service for GammaDrop Staging Infrastructure. 2024. https://www.recordedfuture.com/research/bluealpha-abuses-cloudflare-tunneling-service 

    [7] Silent Push. ‘From Russia with a 71’: Uncovering Gamaredon’s fast flux infrastructure. New apex domains and ASN/IP diversity patterns discovered. 2023. https://www.silentpush.com/blog/from-russia-with-a-71/

    [8] DNS Filter. Security Categories You Should be Blocking (But Probably Aren’t). 2023. https://www.dnsfilter.com/blog/security-categories-you-should-be-blocking-but-probably-arent

    [9] National Security Agency. Selecting a Protective DNS Service. 2021. https://media.defense.gov/2025/Mar/24/2003675043/-1/-1/0/CSI-SELECTING-A-PROTECTIVE-DNS-SERVICE-V1.3.PDF

    Disclaimer of endorsement

    The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring cybersecurity agencies’ missions, including their responsibilities to identify and disseminate threats, and develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    National Security Agency (NSA):

    Cybersecurity and Infrastructure Security Agency (CISA):

    • All organizations should report incidents and anomalous activity to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center at report@cisa.gov, or by calling 1-844-Say-CISA (1-844-729-2472). When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.

    Federal Bureau of Investigation (FBI):

    • To report suspicious or criminal activity related to information found in this advisory, contact your local FBI field office or the FBI’s Internet Crime Complaint Center (IC3). When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.

    Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC):

    • For inquiries, visit ASD’s website at www.cyber.gov.au or call the Australian Cyber Security Hotline at 1300 CYBER1 (1300 292 371).

    Canadian Centre for Cyber Security (CCCS):

    New Zealand National Cyber Security Centre (NCSC-NZ):

    MIL Security OSI

  • MIL-OSI Europe: Press release – EP Trade Committee Chair on US tariffs: “Unjustified, illegal and disproportionate”

    Source: European Parliament

    Bernd LANGE (S&D, DE), Chairman of the European Parliament’s International Trade Committee, reacts to the 20% tariff announced by US President Donald Trump tonight.

    “While President Trump might call today ‘Liberation Day’, from an ordinary citizen’s point of view this is ‘Inflation Day’. These unjustified, illegal and disproportionate measures can only lead to further tariff escalation and a downward economic spiral for the US and the world as a whole. Because of this decision, US consumers will be forced to carry the heaviest burden in a trade war. These tariffs will only make processes and manufacturing more inefficient. They have prompted damaging uncertainty in the investment climate. Stock markets could hardly be clearer in their reactions.

    The EU will respond. We will do so through legal, legitimate, proportionate and decisive measures. As the EU we will consider which of the tools at our disposal are best suited for our response. We are not backing down. We will defend our sovereignty and we will not change legislation that we have shaped democratically and in the interest of EU citizens, even if this displeases some US billionaires. The countries that have been targeted by these measures must respond with a united front and send a clear message to the US to end this tariff madness.

    I do hope this administration is genuinely interested in engaging with the EU, but I am not confident. I hope that our arguments and the firmness of our response will provide sufficient incentives to bring the US to the negotiating table. The EU’s door will always remain open to finding a solution.”

    A press conference with Mr LANGE will take place tomorrow Thursday 3 April at 9.00. It can be followed by webstreaming and journalists wishing to participate actively and ask questions, can connect via Interactio using this link: https://ep.interactio.eu/s871-h7gf-91mi.

    MIL OSI Europe News

  • MIL-OSI USA: Rep. Ami Bera, House Intelligence Committee Democrats Demand Independent Intelligence Community Investigation into Signal Chat

    Source: United States House of Representatives – Representative Ami Bera (D-CA)

    Today, U.S. Representative Ami Bera (CA-06), Member of the House Permanent Select Committee on Intelligence, joined Ranking Member Jim Himes and all committee Democrats in a letter to Director of National Intelligence Tulsi Gabbard, calling for the Intelligence Community to conduct an independent investigation into the Signal group chat in which participants discussed detailed plans for an impending U.S. military attack on Houthi terrorists in Yemen. 

    The letter follows the Committee’s Worldwide Threats hearing, during which DNI Tulsi Gabbard and CIA Director John Ratcliffe answered questions about their participation in the chat. 

    “Since you and other intelligence community leaders testified about the group chat before the House Permanent Select Committee on Intelligence last Wednesday, there have been new developments,” the 11 Members wrote. “First, the bipartisan leaders of the Senate Armed Services Committee requested the Acting Inspector General of the Department of Defense conduct an inquiry into the facts and circumstances of the chat. Second, the Wall Street Journal, citing multiple U.S. officials, reported that a key American ally ‘provided sensitive intelligence from a human source in Yemen on a key Houthi military operative’ who was targeted in the U.S. military attack; that National Security Advisor Mike Waltz sent texts on the Signal chain following the attack—noting the U.S. had ‘positive ID’ that the building in which the operative was located had collapsed—that may have been linked to information from that source; and that the U.S. ally complained to the United States that Mr. Waltz’s texts had become public. The Wall Street Journal’s reporting, if accurate, is deeply concerning.”

    The Members continued: “These developments underscore the need for the intelligence community, under your leadership, to conduct a parallel inquiry into the chat, to complement the congressionally-requested inquiry by the DOD IG and the inquiry that is—according to your testimony—apparently being conducted by the National Security Council.”

    The full list of signers includes Representatives Ami Bera (CA-06), Jim Himes (CT-04), André Carson (IN-07), Joaquin Castro (TX-20), Raja Krishnamoorthi (IL-08), Jason Crow (CO-06), Stacey Plaskett (VI-AL), Josh Gottheimer (NJ-05), Jimmy Gomez (CA-34), Chrissy Houlahan (PA-06) and Mike Quigley (IL-05).The full text of the letter is available here.

     

    MIL OSI USA News

  • MIL-OSI: Guinean Artist Elie Kamano to Release New Single Exploring Africa’s Colonial Past

    Source: GlobeNewswire (MIL-OSI)

    JOHANNESBURG, SOUTH AFRICA, April 03, 2025 (GLOBE NEWSWIRE) — CAJ News Africa will host the official presentation of Guinean musician Elie Kamano’s new single “Africa without Africans” on April 5, 2025, at the Johannesburg Arts Centre, the agency announced today.

    The English-language track will be distributed on major global streaming platforms including Spotify, Apple Music, and Audiomack, targeting both African and international audiences. According to industry analysts, the release aligns with growing market interest in content addressing historical narratives from an African perspective.

    The single explores the economic and social impacts of colonialism on the continent while highlighting the resilience of African communities. The track features a fusion of traditional Guinean rhythms with contemporary production techniques, establishing a commercial appeal while maintaining cultural authenticity.

    “This song examines our shared history while looking toward economic justice and development,” Kamano said in a statement. “I wanted to create art that not only entertains but stimulates meaningful discussion about Africa’s place in the global economic system.”

    The release coincides with the African Union’s 2025 theme, “Justice for Africans and People of African Descent Through Reparations,” which has generated significant policy discussions across the continent.

    Kamano, whose previous releases have accumulated over 12 million streams globally, drew inspiration for the single from historical documentation in The New York Times regarding the 1944 Thiaroye massacre in Senegal, where West African soldiers were killed by colonial troops after World War II.

    “Thiaroye can become the foundation of a pan-African consciousness, uniting all African countries that lost citizens in this tragedy,” said Mamadou Diop, Senegalese historian and Director of African Studies at Columbia University, regarding the historical events that influenced the composition.

    On March 21, 2025, pan-African representatives and civil society organizations convened in Dakar to examine potential frameworks for addressing historical economic imbalances. The summit produced a detailed report outlining specific economic metrics and proposed accountability mechanisms.

    CAJ News Africa’s decision to host the single’s presentation reflects the media company’s strategic expansion into cultural content with historical and economic significance, according to industry observers. The agency has recently increased investment in multimedia platforms by 35% compared to fiscal year 2024.

    “We’re facilitating conversations that connect cultural expression with economic discourse,” said Savious Kwinika, Director of Research at CAJ Africa. “This presentation allows us to highlight how creative industries can contextualize complex historical narratives within contemporary market frameworks.”

    Financial analysts note that the global market for content exploring historical African narratives has grown 28% annually since 2023, with particularly strong performance in streaming and digital distribution channels.

    The presentation will include a panel discussion featuring economists and cultural analysts examining how artistic expression intersects with ongoing policy dialogues regarding economic development and international relations. The track will be available for purchase and streaming on all major platforms at 00:01 GMT on April 5, 2025.

    About CAJ News Africa

    CAJ News Africa is a leading pan-African media agency providing business, technology, and cultural news across the continent. Established in 2008, the agency operates bureaus in 18 African countries and maintains strategic partnerships with global media organizations.

    Contact Information

    CAJ News Africa

    Savious Kwinika, Director of Research, CAJ Africa

    E-mail: news@cajnewsafrica.com

    Website: https://www.cajnewsafrica.com

    The MIL Network

  • MIL-OSI USA: Congressman Krishnamoorthi Slams Trump Administration Officials For Endangering U.S. Security And Service Members By Mishandling Classified Information in Interview with Chris Hayes

    Source: United States House of Representatives – Congressman Raja Krishnamoorthi (8th District of Illinois)

    WASHINGTON – During an interview tonight on MSNBC’s All In with Chris Hayes, Congressman Raja Krishnamoorthi (D-IL), a senior member of the House Intelligence Committee, sharply criticized the Trump Administration’s exposure of highly sensitive, imminent military plans through senior officials carelessly including a journalist on a group chat in violation of security standards for such discussions. Congressman Krishnamoorthi was the first Member of Congress to call for the investigation when the news broke on Tuesday, when Atlantic Editor in Chief Jeffrey Goldberg published an article revealing he had been mistakenly added to the Signal chat on which Secretary of Defense Hegseth disclosed secret war plans.

    The interview comes ahead of tomorrow’s 2025 Annual Worldwide Threats Assessment hearing, during which the Director of National Intelligence, CIA Director, and other top American intelligence officials are set to testify before the House Intelligence Committee.

    Calling the use of unsecured messaging platforms for sensitive national security discussions “dangerous” and “unconscionable,” Congressman Krishnamoorthi warned that the failure of the officials to take responsibility “means that this is going to happen,” in the absence of forceful oversight.

    “The spinning and the refusal to acknowledge gross negligence here means this could happen again — at senior levels or by younger personnel who take cues from their superiors,” he said. “This endangers America because our adversaries will get a hold of this information, and our sons and daughters in uniform will be at risk.”

    Congressman Krishnamoorthi also drew parallels between the mishandling of national secrets and the casual treatment of Americans’ personal data by Elon Musk, DOGE, and others in the Trump Administration. “It’s part of a pattern — of kind of careless treatment of people’s information and the nation’s information, and its secrets. And it’s going to come back to bite us.”

    Footage of the full interview is available here.

    MIL OSI USA News

  • MIL-Evening Report: Stoush breaks out between NZ Human Rights Commissioner and Jewish leader at Parliament

    By Anneke Smith, RNZ News political reporter

    A stoush between the Chief Human Rights Commissioner and a Jewish community leader has flared up following a showdown at Parliament.

    Appearing before a parliamentary select committee today, Dr Stephen Rainbow was asked about his recent apology for incorrect comments he made about Muslims earlier this year.

    “If my language has been injudicious . . .  then I have apologised for that,” he told MPs.

    “I’ve apologised publicly. I’ve apologised privately. I’ve met with FIANZ [The Federation of Islamic Associations of New Zealand] to hear their concerns and to apologise to them, both in person and publicly, and I hold to that apology.”

    The apology relates to a meeting he had with Jewish community leader Philippa Yasbek, from the anti-Zionist Jewish groups Alternative Jewish Voices and Dayenu, in February.

    Yasbek said Rainbow claimed during the meeting that the Security Intelligence Services (SIS) threat assessment found Muslims posed a greater threat to the Jewish community in New Zealand than white supremacists.

    In fact, the report states “white identity-motivated violent extremism [W-IMVE] remains the dominant identity-motivated violent extremism ideology in New Zealand”.

    Rainbow changed his position
    Rainbow told the committee he had since changed his position after receiving new information.

    He said was disappointed he had “allowed [his] words to create a perception there was a prejudice there” and he would do everything in his power to repair his relationship with the Muslim community.

    “Please be assured that I take this as a learning, and I will be far more measured with my comments in future.”

    But Rainbow disputed another of Yasbek’s assertions that he had also raised the supposed antisemitism of Afghan refugees in West Auckland.

    “It’s going to be really unhelpful if I get into a he-said-she-said, but I did not say the comments that were attributed to me about that. I do not believe that,” Rainbow said.

    “I emphatically deny that I said that.”

    ‘It definitely stuck in my mind’ – Jewish community leader
    Yasbek, who called for Rainbow’s resignation yesterday, was watching the select committee hearing from the back of the room.

    Speaking to reporters afterwards, Yasbek said she was certain Rainbow had made the comments about Afghan refugees.

    “It was particularly memorable because it was so specific and he said that he was concerned about the risk of anti-semitism in the community of Afghan refugees in West Auckland.

    “It’s very specific. It’s not a sort of detail that one is likely to make up, and it definitely stuck in my mind.”

    Yasbek said the race relations commissioner and two Human Rights Commission staff members were also in the room and should be interviewed to corroborate what happened.

    “There were multiple witnesses. I am concerned that he has impugned my integrity in that way which is why there should be an independent investigation of this matter.”

    Alternative Jewish Voices’ Philippa Yasbek . . . “there should be an independent investigation of this matter.” Image: RNZ

    Raised reported comments
    Speaking to RNZ later, FIANZ chairman Abdur Razzaq said he raised the commissioner’s reported comments about Afghan refugees when he met with Rainbow several weeks ago.

    “I raised it at the meeting with him and he did not correct me. At my meeting there were other members of the Human Rights Commission. He did not say he didn’t [say that].”

    Razzaq said it was up to the justice minister as to whether or not Rainbow was fit for the role.

    “When you hear statements like this, like ‘greatest threat’, he has forgotten it was precisely this kind of Islamophobic sentiment which gave rise to the terrorist of March 15, rise to the right-wing extremist terrorists to take action and they justify it with these kinds of statements.”

    “[The commissioner] calls himself an academic, a student of history. Where is his lessons learned on this aspect? To pick a Muslim community by name… he has to really genuinely look at himself as to what he is doing and what he is saying.”

    Minister backs Rainbow: ‘Doing his best’
    Speaking at Parliament following the hearing, Justice Minister Paul Goldsmith said he backed Rainbow and believed the commissioner would learn from the experience.

    “The new commissioner is doing his best. By his own admission he didn’t express himself well. He has apologised and he will be learning from that experience, and it is my expectation that he will be very careful in the way that he communicates in the future.”

    Goldsmith said he stood by his appointment of Rainbow, despite the independent panel tasked with leading the process taking a different view.

    “There’s a range of opinions on that. The advice that I had originally from the group was a real focus on legal skills, and I thought actually equally important was the ability to communicate ideas effectively.”

    Speaking in Christchurch on Thursday afternoon, Prime Minister Christopher Luxon said Rainbow had got it “totally wrong” and it was appropriate he had apologised.

    “He completely and quite wrongfully mischaracterised a New Zealand SIS report talking about threats to the Jewish community and he was wrong about that.

    “He has subsequently apologised about that but equally Minister Goldsmith has or is talking to him about those comments as well.”

    ‘Not elabiorating further’
    RNZ approached the Human Rights Commission on Thursday afternoon for a response to Yasbek doubling down on her recollection Rainbow had talked about the supposed antisemitism of Afghan refugees in West Auckland.

    “The Chief Commissioner will not be elaborating further about what was said in the meeting,” a spokesperson said.

    “He’s happy to discuss the matter privately with the people involved,” a spokesperson said.

    “Dr Rainbow acknowledges that what was said caused harm and offence and what matters most is the impact on communities. That is why he has apologised unreservedly and stands by his apology.”

    This article is republished under a community partnership agreement with RNZ.

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI USA: Hagerty Announces Staff Changes, Promotions, Trump Admin Appointments

    US Senate News:

    Source: United States Senator for Tennessee Bill Hagerty

    WASHINGTON—United States Senator Bill Hagerty (R-TN) today announced 22 additions and changes to his staff over the last year, as well as 14 of his staff appointed to serve in the Trump Administration. 

    “I’m pleased to welcome several additions to my staff and announce well-deserved promotions for others,” said Senator Hagerty. “I’m confident that my exceptional team will soar to even greater heights with new expertise and experience. At the same time, I’m deeply proud of my close advisors and alumni who have been appointed to serve in the Trump Administration. I look forward to all we will accomplish in the coming years together.”

    Lucas Da Pieve is now serving as Legislative Director. Da Pieve has served as the Deputy Legislative Director and Projects Manager, handling all budgetary and appropriations matters for Senator Hagerty, since 2021. Previously, he was the Director of Digital Response in the Office of Presidential Correspondence during the first Trump Administration and as Deputy Legislative Director and Projects Manager for Senator Lamar Alexander (R-TN). He is a graduate of the University of Tennessee, Knoxville. Da Pieve is originally from Buenos Aires, Argentina, and his family has lived in Blount County since 2008.

    Nate Kinard will serve as General Counsel to Senator Hagerty, and advise the Senator regarding judicial nominations, constitutional matters, and artificial intelligence. Previously, Kinard was a shareholder at Chambliss, Bahner & Stophel, specializing in business litigation and appeals. Kinard received his law degree summa cum laude from William & Mary Law School. A native of Chattanooga, Kinard majored in Political Science and Piano Performance at Vanderbilt University.

    Sloan McDonagh is now serving as Policy Advisor and Senior Counsel in Senator Hagerty’s Washington, DC office. McDonagh previously served as Senior Counsel to the House Committee on Oversight and Government Reform. He is a graduate of Hillsdale College and Emory University School of Law.  

    Christy Charbonnet is now serving as Scheduler for Senator Hagerty’s Washington, DC office. She holds a bachelor’s degree from the College of Charleston in Systems Engineering and has been with the Senator since the fall of 2023.

    Emma Morris will serve as Deputy Director of Operations and Scheduling for Hagerty. Morris previously served as the Senator’s Deputy Scheduler. She graduated from Auburn University with a B.A. in Political Science. She is originally from Chattanooga, Tennessee. 

    John DiGravio is now serving as Legislative Assistant to Senator Hagerty, advising him on the Banking Committee portfolio. He previously served as Legislative Aide to the Senator and as an aide to the Senate Banking Committee. DiGravio holds a B.A. from Williams College and was raised in Austin, Texas.

    Luke Harris has been named Legislative Assistant to Hagerty assisting in the Agriculture, Energy, and Transportation portfolio. Harris is a graduate of Middle Tennessee State University where he received both his bachelor’s and master’s degrees.

    JT Isaacs has been named Legislative Assistant to manage all general budget and appropriations matters for Hagerty. He also manages the Healthcare, Education, Labor, Pensions, and Veterans’ Affairs portfolio. He previously served as Legislative Aide for Hagerty. Isaacs received a Bachelor of Science in Economics degree from the University of Kentucky.

    Matthew Venoit will serve as Policy Advisor to Senator Hagerty. Prior to the Senate, Venoit worked at Goldman Sachs in both New York and Hong Kong. He holds a B.S. from Penn State University and graduate degrees from KU Leuven and Georgetown University.

    Jillian Cantrell is now serving as Legislative Aide to Hagerty assisting in the Healthcare, Education, Labor, Pensions, and Veterans’ Affairs portfolio. Cantrell previously served as Legislative Correspondent and Staff Assistant. She is a graduate of Washington and Lee University, where she received Bachelor of Arts degrees in both Biology and Politics. She is a native of Chattanooga, Tennessee.

    Cole Bornefeld is now serving as a Legislative Aide to Hagerty, assisting in the Judiciary, Homeland Security, and Rules portfolio. Bornefeld previously served as a Legislative Correspondent in Hagerty’s Office. He graduated from Western Kentucky University with a bachelor’s degree in political science and public relations. He is a native of Hendersonville, Tennessee.

    Melissa Stooksbury has been serving as Deputy State Director since February 2024 based in the Nashville, Tennessee office. Prior to this role, she served in the office of Congressman Tom Cole, most recently as Communications Director. Stooksbury was born and raised in Knoxville, Tennessee and graduated from the University of Tennessee, Knoxville with a bachelor’s degree in Political Science.

    Ethan Finley now serves as a Legislative Correspondent to Senator Hagerty within the Banking Committee Portfolio. Finley previously worked as a field organizer for Tim Sheehy’s 2024 Senate Campaign. Before that, he worked as an Investment Banking Analyst at Evercore. Finley also has experience as an analyst in private equity and wealth management. He graduated from Columbia University with a bachelor’s degree in Financial Economics.

    Zach Brooks currently serves as the Southeast Tennessee Field Representative for Senator Hagerty, a role he has held since April 2024. Before his tenure with Senator Hagerty’s office, Brooks was the Investor Development Director at the Cleveland/Bradley County Chamber of Commerce, focusing on membership growth and community engagement. Born and raised in Cleveland, Tennessee, Brooks graduated from Cleveland High School in 2010. He pursued higher education at Lee University, earning a bachelor’s degree in 2014 and a Master of Business Administration in 2019.

    Gabby Gardner serves as the Nashville Field Representative for Senator Hagerty, where she works closely with community leaders, elected officials, and industry stakeholders across Middle Tennessee. Prior to this role, she served as a Clerk in the Tennessee House of Representatives. Gardner is a proud graduate of the University of Tennessee, Knoxville, where she earned a bachelor’s degree in Political Science.

    Ford Hawkins is now serving as the Jackson, Tennessee Field Representative. He previously served with the Young Republicans before joining Olin/Winchester Ammunition, where he worked as a ballistician before joining Hagerty’s office. Hawkins is a West Tennessee native, and he attended the University of Mississippi, holding a bachelor’s degree in History.

    Jonathan White is now serving as the West Tennessee Field Representative. After graduating high school, White served four years active in the U.S. Navy before graduating with his bachelor’s degree in political science from the University of Mississippi. He has also worked for the American Legion and interned for the Northern District of Mississippi U.S. Attorney’s Office.


    Jake Netterville
    is now serving as Personal Aide to Senator Hagerty in the Washington, DC office. Netterville recently graduated with a bachelor’s degree in accounting from Louisiana State University and is a native of Baton Rouge, Louisiana. Prior to joining Senator Hagerty’s office, Netterville worked as a federal analyst at The Picard Group. 

    Cecilia Ann Hutton is now serving as a Staff Assistant in Senator Hagerty’s Washington, DC office. She recently graduated from the University of Tennessee, Knoxville with a bachelor’s degree in Political Science and History.

    Steven Behringer is now serving as a DoD fellow for Senator Hagerty. Behringer is an active-duty Marine who is fluent in both Mandarin and Korean, and has extensive experience evaluating military and cyber threats in the INDOPACOM region. He is a native of Baltimore, Maryland.

    Blake McMahon is now serving as a National Security Fellow for Senator Hagerty. McMahon has held a variety of Executive Branch roles related to aerospace, defense, and intelligence issues. He received a PhD from the University of California, San Diego and a bachelor’s degree from Oklahoma State.

    James Santos is serving as a National Security Fellow. Santos comes from the Office of Director of National Intelligence, where he worked on a range of national security issues, covering policy development and program management matters. He graduated from Michigan State University, and holds a Master’s degree in Accounting. He was born in Manila, Philippines and hails from Grand Rapids, Michigan.  

    Serving in the Trump Administration

    Adam Telle is nominated to lead the U.S. Army Corps of Engineers as Assistant Secretary of the Army for Civil Works. Telle has served as Hagerty’s Chief of Staff over the last four years and will continue to serve Hagerty while his nomination is pending before the Senate. Telle served during the first Trump Administration as the White House’s Senate lead in its Office of Legislative Affairs.  Prior to that role, Telle served as the top staff member on the Senate Appropriations Committee’s Subcommittee on Homeland Security and as the top policy advisor to the late Senator Thad Cochran. Telle holds degrees in computer science and journalism from Mississippi State University.

    Luke Pettit is nominated to be Assistant Secretary of the Treasury for Financial Institutions. Pettit has served as Senator Hagerty’s Senior Policy Advisor and will continue to serve Hagerty while his nomination is pending before the Senate. Previously, he worked at the Senate Banking Committee, Bridgewater Associates, and the Federal Reserve. Luke holds a B.A from the University of Pennsylvania, and graduate degrees from the London School of Economics and Johns Hopkins University.

    Daniel Zimmerman has been nominated to be Assistant Secretary of Defense for International Security Affairs. Zimmerman currently serves in a Congressional Executive Fellowship in the office of Senator Hagerty and will continue to serve Hagerty while his nomination is pending before the Senate. He previously has held many roles in the agency realm, and holds both a bachelor’s degree from Asbury University and a master’s degree from the University of Kentucky.

    Julia Hahn is serving as the Assistant Secretary of the Treasury Department for the Office of Public Affairs. Hahn joins the Department after serving as Deputy Chief of Staff for Communications for Senator Hagerty. Prior to the Senate, Hahn served in the first Trump White House over all four years, most recently as Deputy Assistant to the President and Deputy White House Communications Director. Before that, she served as Special Assistant to the President and Director of Rapid Response and Surrogate Operations. Hahn has also worked in media as the Executive Producer of The Laura Ingraham Show and a reporter at Breitbart News. She also worked on Capitol Hill as Press Secretary to former Congressman Dave Brat. Hahn graduated from the University of Chicago with a BA in Philosophy.

    Clark Milner is serving as Special Assistant to the President and Senior Advisor for Policy, focusing primarily on domestic policy. Milner formerly served as Deputy Chief of Staff for Policy and Chief Counsel to Senator Bill Hagerty. Milner previously served as Deputy Counsel to Governor Bill Lee.

    Natalie McIntyre currently serves a Special Assistant to the President for the Office of Legislative Affairs where she handles the Healthcare, Education, Labor, Banking, and Agriculture portfolio. Previously, she was Senator Hagerty’s Legislative Director overseeing the legislative team and managing the Health, Education, Labor, Pension, and Veterans portfolio. Prior to her role in Hagerty’s office, she was part of the legislative office at OMB where she managed the Senate offices. She also served as a Senior Policy Advisor and White House liaison at ONDCP.

    Nels Nordquist
    is serving as Deputy Assistant to the President for International Economic Policy and DD of NEC.Nordquist was Senior Fellow for Economic Policy in the office of Senator Hagerty. From October 2022 through January 2025, he served as Staff Director for the National Security, Illicit Finance, and International Financial Institutions Subcommittee of the House Financial Services Committee. From 2018-2021, Nordquist worked in the National Security Council and National Economic Council, first as Director for Trade & Investment and later as Special Assistant to the President and Senior Director for International Economic Policy. Nordquist graduated from Stanford and earned an MBA from the University of Virginia.

    Joel Rayburn is the Trump Administration’s nominee to be Assistant Secretary of State for Near Eastern Affairs. He is a historian, former diplomat, and retired military officer who previously served as special advisor for Middle East affairs in the office of Senator Hagerty. Rayburn is currently a senior fellow at the Hudson Institute. In the first Trump Administration, he served as a senior director on the National Security Council staff and, from July 2018 to January 2021, as the U.S. special envoy for Syria. Before joining the State Department, Rayburn served 26 years as a US Army officer and co-authored the Army’s official history of the Iraq War. He holds an MA in history from Texas A&M University and an MS in strategic studies from the National War College.

    Kevin Kim is the State Department’s China Coordinator and the Deputy Assistant Secretary for China, Japan, Korea, Mongolia, and Taiwan. Prior to the State Department, Kim worked as a national security fellow for Senator Hagerty. Kim was also the Senior Advisor to the Special Presidential Envoy for Arms Control Marshall Billingslea as part of the U.S. delegation to the 2020 U.S.-Russia arms control negotiations.  From 2018 to 2020, he served as the Chief of Staff to the Special Representative for North Korea and the Deputy Secretary of state Stephen Biegun and participated in various rounds of U.S.-DPRK nuclear negotiations. Kim received a BA from the Johns Hopkins University, MA from the Johns Hopkins University School of Advanced International Studies, and is currently pursuing a Doctorate in International Relations from the Johns Hopkins University School of Advanced International Studies.

    Walton Stivender Mears has taken on a new role as scheduler for Housing and Urban Development Secretary Scott Turner. Mears joined HUD last month after serving as Director of Scheduling for Senator Hagerty. She previously handled scheduling and assisted the chief of staff for Sen. Roger Marshall (R-KS) and as a Staff Assistant for Senator Richard Shelby (R-AL). Mears is an Auburn University graduate from Birmingham, Alabama.

    J. Cal Mitchell is serving as the Special Assistant at the U.S. Department of Treasury. He joins the Treasury Department after serving as Personal Aide to Senator Hagerty. Mitchell is a native of Atlanta, Georgia and is a graduate of Hampden-Sydney College.

    Nick Checker, a national security fellow for Senator Hagerty in 2023, currently serves as Deputy Executive Secretary on the National Security Council. In that role, Checker provides senior-level review of NSC products for substance, policy relevance, and appropriateness for the President and senior White House officials. Checker has spent the last decade at the Central Intelligence Agency (CIA) as a military analyst covering conflicts in the greater Middle East. Most recently, Checker worked in CIA’s office of Congressional Affairs, where he supported the confirmation process for Director John Ratcliffe. He holds a bachelor’s degree in history and political science from the University of Wisconsin and a master’s degree in Security Studies from Georgetown University.

    Nicholas Elliot is the Acting Director of the Office of Legislative and Intergovernmental Affairs at the Commodity Futures Trading Commission. Elliot serves as the chief advisor to the CFTC Chairman on matters before the U.S. Congress and as the Commission’s official liaison with Congressional members, federal agencies, and the Administration. Previously, Elliot spent nearly four years working for Senator Hagerty on the Senator’s financial services and banking portfolio, where he advanced the Senator’s work on the Committee on Banking, Housing, and Urban Affairs. Elliot is a graduate of Georgetown University’s McDonough School of Business where he received a BS in Business Administration with a major in Finance and a minor in Mandarin.

    Taylor Asher serves as Chief Policy Advisor of the SEC’s Crypto Task Force and is a Senior Policy Advisor to SEC Acting Chairman Mark Uyeda. From April 2023 to January 2025, Asher served as Policy Advisor and Confidential Assistant to Commissioner Uyeda. Prior to his time at the SEC, Asher was Personal Aide to Senator Hagerty. His tenure in public service began with Congresswoman Julia Letlow’s Office, where he served as Staff Assistant and Intern Manager. Asher is currently pursuing a Master of Economics at George Mason University. He holds a Master of Finance with an Energy Specialization as well as a Bachelor of Science in Management from Tulane University. He is originally from Nashville, Tennessee.

    MIL OSI USA News

  • MIL-OSI USA: Grassley Pushes SafeSport to Take Action to Address Major Failings

    US Senate News:

    Source: United States Senator for Iowa Chuck Grassley

    WASHINGTON – Senate Judiciary Committee Chairman Chuck Grassley (R-Iowa) is following up on his oversight of the U.S. Center for SafeSport’s vetting and hiring practices. The organization previously hired an investigator, Jason Krasley, who was later charged with theft, harassment and sex crimes. 

    “Congress established SafeSport to protect young athletes from abuse and act as a good steward of taxpayer dollars. The arrest of a former investigator and my subsequent oversight has called into question the quality of SafeSport’s hiring process, the Board’s ability to supervise SafeSport officers and directors, and SafeSport’s management of funds,” Grassley said. “American athletes and taxpayers deserve better.”  

    In letters to SafeSport’s CEO, Ju’Riese Colón, and Board of Directors, Grassley notes: 

    • SafeSport was aware of a previous internal investigation into Krasley prior to hiring him and kept him on payroll for two months after learning of the criminal allegations against him. 
    • SafeSport intentionally withheld pertinent evidence from law enforcement. 
      • Florida court found SafeSport “perpetrated a fraud” against a Florida State Court and “filtered” and withheld evidence from law enforcement regarding a sexual abuse claim. 
    • SafeSport potentially mismanaged taxpayer funding. 
      • SafeSport in 2023 spent $2.4 million on legal contractors, including over $1.2 million on a single Denver-based tort law firm. It’s unclear what type of work these firms handled on behalf of SafeSport. 
      • SafeSport in 2023 spent $390,000 on travel, paid 11 executives between $111,000 and $350,000 each, and spent nearly $408,000 on the CEO’s salary – $100,000 more than the highest end of average nonprofit CEO salaries. 

    Read Grassley’s letter to the SafeSport CEO HERE and his letter to the SafeSport Board of Directors HERE. 

    Background:

    Grassley’s bipartisan legislation established SafeSport in 2017 to investigate cases of athlete sex abuse and harassment in Olympic governing bodies. 

    Grassley was the first in history to convene a congressional hearing on athlete protections as Chairman of the Senate Judiciary Committee in 2017. He also spearheaded oversight of the U.S. Olympic Committee, the FBI’s failed response to the Larry Nassar abuse scandal and the failures of SafeSport and USA Gymnastics to effectively safeguard athletes.

    -30-

    MIL OSI USA News

  • MIL-OSI USA: Bacon and Cuellar Introduce Bipartisan Law Enforcement Officers Safety Reform Act (LEOSA)

    Source: United States House of Representatives – Congressman Don Bacon (2nd District of Nebraska)

    Bacon and Cuellar Introduce Bipartisan Law Enforcement Officers Safety Reform Act (LEOSA) 

    Offers Real Solutions to Terrorism and Mass Shootings

    Washington – Recently, Reps. Don Bacon (R-NE-02) and Henry Cuellar (D-TX-28) introduced H.R.2243, The Law Enforcement Officers Safety Reform Act (LEOSA). The bipartisan LEOSA Reform Act will improve public safety by allowing qualified law enforcement officers who have committed themselves to our communities the opportunity to continue doing so by extending their concealed carry privileges. The legislation removes existing prohibitions and will allow trained professionals to respond quickly to emergencies, should they happen to be in public places such as shopping malls, school zones, mass transit, etc. During the 118th Congress, the LEOSA Reform Act was passed by the House of Representatives in a 221-185 vote. 

    “The bipartisan LEOSA Reform Act offers real solutions to address threats such as terrorism and mass shootings by ensuring that our retired and off-duty law enforcement officers can exercise their right to concealed carry – no matter where they live or visit,” said Rep. Bacon. “These measured changes will make existing law stronger and more workable for those who seek its benefits while maintaining the rigorous standards that currently apply. I want to thank Rep. Henry Cuellar for his support of this important legislation.”

    “Many of our retired law enforcement officers are ready to continue serving our community but are unable to due to current law,” said Rep. Cuellar“This bipartisan legislation will fix the issues that our nation’s off-duty officers and retired cops face while concealed carrying. I remain steadfast in my support for the men and woman who put their lives on the line every day to protect our homes, neighborhoods, businesses and communities.”

    Locally, the sheriffs of the three counties for Nebraska’s 2nd Congressional District and other law enforcement agencies support the legislation: Douglas County Sheriff Aaron Hanson, Sarpy County Sheriff Greg London, Saunders County Sheriff Chris Lichtenberg, Omaha Police Association President Patrick Dempsey, and Nebraska State FOP President Anthony Connor.

    The bill also was endorsed by the Fraternal Order of Police (FOP), the Federal Law Enforcement Officers Association (FLEOA), The Air Marshal Association, the FBI Agents Association (FBIAA), International Union of Police Associations, Major Cities Chiefs Association, National Association of Police Organizations (NAPO), Association of State Criminal Investigative Agencies, Major County Sheriffs of America, National Narcotics Officers’ Associations’ Coalition, Society of Former Special Agents of the FBI, and Sergeants Benevolent Association NYPD.

    ###

    MIL OSI USA News

  • MIL-OSI Security: Palmer man sentenced for operating an unregistered aircraft without a license

    Source: Office of United States Attorneys

    ANCHORAGE, Alaska – A Palmer man was sentenced today to three years’ probation and is required to pay a $10,000 fine for operating an aircraft without a license and operating an unregistered aircraft.

    According to court documents and evidence presented at trial, for roughly 30 years, William Marsan, 57, held an Airman Certificate as an Airline Transport Pilot issued by the Federal Aviation Administration (FAA). He operated an aviation business out of Palmer, Alaska, transporting services, goods and people across Alaska on his Piper Cherokee aircraft.

    In June 2023, the FAA received a report that Marsan, as the pilot in command of the Piper Cherokee aircraft, failed to radio his intention to take off from Warren “Bud” Woods Palmer Municipal Airport and operated the aircraft against the flow of landing traffic, resulting in a near mid-air collision with another aircraft attempting to land.

    Law enforcement investigated the June 2023 incident and discovered that Marsan was operating an aircraft without a valid license or valid registration. The investigation revealed that in June 2022, Marsan sent a letter to the FAA revoking the registration of his aircraft. Investigators also discovered that Marsan allowed his medical certificate to lapse in 2020 and 2021, which was required to keep his pilot’s license.

    When FAA inspectors contacted him in July 2023 as part of the investigation, Marsan refused to provide his airman certificate, aircraft registration and airworthiness certificates, all of which are requirements through the FAA, and claimed he was not required to have any of those documents. As a result of the investigation, the FAA issued an Emergency Order of Revocation of Marsan’s pilot’s license in January 2024, which required the immediate surrender of his pilot’s license or the filing of an appeal of the decision within 10 days. Marsan failed to file an appeal or surrender his license but continued to fly his aircraft until his initial arrest in July 2024.

    Marsan was released pending trial. He failed to appear for multiple court hearings prior to his trial and he was rearrested in September 2024. On Dec. 4, 2024, Marsan was convicted of one count of operating an aircraft without a license and one count of operating an unregistered aircraft.

    “Alaska’s aviation industry is a vital part of our infrastructure, safely connecting people and goods across the state. Mr. Marsan’s actions—operating an unregistered aircraft without a license and nearly causing a mid-air collision—put lives at risk,” said U.S. Attorney Michael J. Heyman for the District of Alaska. “To prevent further violations and protect communities, Mr. Marsan will serve a significant term of probation under the relevant statutes and pay a fine for the money he made at the risk of others.”

    “Marsan’s flagrant disregard for aviation regulations put countless lives at risk and undermined the integrity of Alaska’s airspace,” said Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office. “Such reckless, criminal behavior will not be tolerated by the FBI and aviation authorities.”

    The FBI Anchorage Field Office and FAA, Alaska Region investigated the case.

    Assistant U.S. Attorneys Tom Bradley and Mac Caille Petursson prosecuted the case.

    ###

    MIL Security OSI

  • MIL-OSI: $TOCKHOLDER ALERT: The M&A Class Action Firm Urges Shareholders of FNA, BECN, QTRX, PLYA to Take Action

    Source: GlobeNewswire (MIL-OSI)

    NEW YORK, April 02, 2025 (GLOBE NEWSWIRE) — Monteverde & Associates PC (the “M&A Class Action Firm”), has recovered millions of dollars for shareholders and is recognized as a Top 50 Firm in the 2024 ISS Securities Class Action Services Report. We are headquartered at the Empire State Building in New York City and are investigating:

    • Paragon 28, Inc. (NYSE: FNA), relating to the proposed merger with Zimmer Biomet Holdings, Inc. Under the terms of the agreement, Zimmer Biomet will acquire all outstanding shares of Paragon 28 common stock for $13.00 per share. Paragon 28 shareholders will also receive a non-tradeable contingent value right entitling holders to receive up to $1.00 per share in cash if certain revenue milestones are achieved.

    ACT NOW. The Shareholder Vote is scheduled for April 16, 2025.

    Click here for more https://monteverdelaw.com/case/paragon-28-inc-fna/. It is free and there is no cost or obligation to you.

    • Beacon Roofing Supply, Inc. (NASDAQ: BECN), relating to the proposed merger with QXO, Inc. Under the terms of the agreement, Beacon shareholders will receive $124.35 per share in cash.

    ACT NOW. The Tender Offer expires on April 14, 2025.

    Click here for more https://monteverdelaw.com/case/beacon-roofing-supply-inc-becn/. It is free and there is no cost or obligation to you.

    • Quanterix Corporation (NASDAQ: QTRX), relating to the proposed merger with Akoya Biosciences. Under the terms of the agreement, Akoya shareholders will receive 0.318 shares of Quanterix common stock for each share of Akoya common stock owned. Quanterix shareholders will own approximately 70% of the combined company.

    Click here for more https://monteverdelaw.com/case/quanterix-corporation-qtrx/. It is free and there is no cost or obligation to you.

    • Playa Hotels & Resorts N.V. (NASDAQ: PLYA), relating to the proposed merger with Hyatt Hotels Corporation. Under the terms of the agreement, Hyatt will acquire all outstanding shares of Playa for $13.50 per share in cash.

    ACT NOW. The Tender Offer expires on April 25, 2025.

    Click here for more https://monteverdelaw.com/case/playa-hotels-resorts-n-v-plya/ It is free and there is no cost or obligation to you.

    NOT ALL LAW FIRMS ARE THE SAME. Before you hire a law firm, you should talk to a lawyer and ask:

    1. Do you file class actions and go to Court?
    2. When was the last time you recovered money for shareholders?
    3. What cases did you recover money in and how much?

    About Monteverde & Associates PC

    Our firm litigates and has recovered money for shareholders…and we do it from our offices in the Empire State Building. We are a national class action securities firm with a successful track record in trial and appellate courts, including the U.S. Supreme Court. 

    No company, director or officer is above the law. If you own common stock in any of the above listed companies and have concerns or wish to obtain additional information free of charge, please visit our website or contact Juan Monteverde, Esq. either via e-mail at jmonteverde@monteverdelaw.com or by telephone at (212) 971-1341.

    Contact:
    Juan Monteverde, Esq.
    MONTEVERDE & ASSOCIATES PC
    The Empire State Building
    350 Fifth Ave. Suite 4740
    New York, NY 10118
    United States of America
    jmonteverde@monteverdelaw.com
    Tel: (212) 971-1341

    Attorney Advertising. (C) 2025 Monteverde & Associates PC. The law firm responsible for this advertisement is Monteverde & Associates PC (www.monteverdelaw.com).  Prior results do not guarantee a similar outcome with respect to any future matter.

    The MIL Network

  • MIL-OSI USA: Rep. McCollum: Each Member of Trump Administration National Security Team Must be Accountable for Breaking the Law & Trust of the American People

    Source: United States House of Representatives – Congresswoman Betty McCollum (DFL-Minn)

    WASHINGTON, D.C. — Congresswoman Betty McCollum (D, MN-04), Ranking Member of the House Appropriations Subcommittee on Defense, released the following statement on Friday:

    “Each of the 18 senior Trump administration national security officials on the ‘Signal Houthi PC’ group chat—including the Vice President, Secretary of Defense, Secretary of State, Treasury Secretary, CIA Director, Director of National Intelligence, National Security Advisor, and White House Chief of Staff—must be held accountable. Each of them failed in their sworn responsibility to ensure that a classified discussion take place on a secure channel. Each of them failed to intervene when this information was freely shared on an open commercial messaging app. Each of their actions fundamentally compromised an impending U.S. military operation and put the lives of American servicemembers at great risk.

    “President Trump’s national security team clearly broke laws designed to protect the American people, including mishandling classified information and failing to preserve federal government records in accordance with the Presidential Records Act. The Trump Administration has broken the trust of the American people, especially the dedicated women and men of the Intelligence Community and those who serve in the military who were put in harm’s way.

    “Several of these officials served in the military, including Vice President Vance, Secretary Hegseth, Director Gabbard, and Mr. Waltz. If any of them had released classified information while wearing the uniform, accountability would have been swift and severe. Yet as members of the Trump Administration, they’ve faced no accountability whatsoever.

    “In the United States of America, it is unacceptable to have one set of a laws for political appointees of President Trump and another set of laws for everyone else. Congress must immediately issue subpoenas, hold hearings, and fully investigate this reckless and illegal conduct that put American lives at risk.”

    ###

    MIL OSI USA News

  • MIL-OSI Security: Operation Not Forgotten Will Surge 60 FBI Personnel to 10 FBI Field Offices to Support Investigations of Indian Country Violent Crimes

    Source: Office of United States Attorneys

    WASHINGTON – The Justice Department today announced that it will surge FBI assets across the country to address unresolved violent crimes in Indian Country, including crimes relating to missing and murdered indigenous persons.

    FBI will send 60 personnel, rotating in 90-day temporary duty assignments over a six-month period. This operation is the longest and most intense national deployment of FBI resources to address Indian Country crime to date. FBI personnel will support field offices in Albuquerque; Denver; Detroit; Jackson, Miss.; Minneapolis; Oklahoma City; Phoenix; Portland, Oreg.; Seattle; and Salt Lake City. The FBI will work in partnership with the Bureau of Indian Affairs and Tribal law enforcement agencies across jurisdictions.

    FBI personnel will be assisted by the Bureau of Indian Affairs Missing and Murdered Unit, and they will use the latest forensic evidence processing tools to solve cases and hold perpetrators accountable. U.S. Attorney’s Offices will aggressively prosecute case referrals.

    “Crime rates in American Indian and Alaska Native communities are unacceptably high. By surging FBI resources and collaborating closely with US Attorneys and Tribal law enforcement to prosecute cases, the Department of Justice will help deliver the accountability

    that these communities deserve,” said Attorney General Pam Bondi.

    “The FBI will manhunt violent criminals on all lands – and Operation Not Forgotten ensures a surge in resources to locate violent offenders on tribal lands and find those who have gone missing,” said FBI Director Kash Patel.

    Acting U.S. Attorney for the Western District of Washington Teal Luthy Miller added that “investigating and prosecuting crimes in Indian Country in collaboration with our tribal partners is critical to our shared mission of addressing public safety in our communities. We welcome the opportunity for continued collaboration as we seek justice on behalf of victims of violent crime.”

    Indian Country faces persistent levels of crime and victimization. At the beginning of Fiscal Year 2025, FBI’s Indian Country program had approximately 4,300 open investigations, including over 900 death investigations, 1,000 child abuse investigations, and more than 500 domestic violence and adult sexual abuse investigations.

    Operation Not Forgotten renews efforts begun during President Trump’s first term under E.O. 13898, Establishing the Task Force on Missing and Murdered American Indians and Alaska Natives. This is the third deployment under Operation Not Forgotten, which has provided investigative support to over 500 cases in the past two years. Combined, these operations resulted in the recovery of 10 child victims, 52 arrests, and 25 indictments or judicial complaints.

    Operation Not Forgotten also expands upon the resources deployed in recent years to address cases of missing and murdered indigenous people. The effort will be supported by the Department’s MMIP Regional Outreach Program, which places attorneys and coordinators in

    U.S. Attorneys’ Offices across the United States to help prevent and respond to cases of missing or murdered indigenous people.

    MIL Security OSI