Category: Internet Communications Technology

  • MIL-OSI Security: Caledonia Man Pleads Guilty To Three Counts Of Sexually Exploiting A Minor

    Source: Office of United States Attorneys

              GRAND RAPIDS – Acting U.S. Attorney for the Western District of Michigan Andrew Birge today announced that Scott Michael Elam, 41, of Caledonia, pleaded guilty to three counts of sexual exploitation of a minor. Elam faces a mandatory minimum of 15 years in prison and a maximum of 90 years in prison. He is scheduled to be sentenced on May 29.

              Elam was arrested and indicted in November 2024 on seven counts of sexually exploiting four different minors. According to court documents, Elam recorded himself having sex with one of the minors on two different occasions and directed the other victims to take explicit photos and videos of themselves and then send them to him. He supplied alcohol, marijuana, vapes, and other contraband to the minors. Elam charged money for each and offered to reduce the price for minors who created and provided sexually explicit videos of themselves or had sex with him.

              “Today’s plea by Scott Elam highlights the FBI’s unwavering commitment to holding sexual predators accountable and safeguarding our most vulnerable citizens,” said Cheyvoryea Gibson, Special Agent in Charge of the FBI in Michigan. “Mr. Elam’s abhorrent criminal acts against minors are utterly indefensible, and such behavior is not acceptable. I am deeply grateful for the relentless dedication and tireless efforts of the men and women of the FBI in Michigan, including the West Michigan-based Child Exploitation Task Force (WEBCHEX), our partners at the Kent County Sheriff’s Office, and the U.S. Attorney’s Office for the successful prosecution in the Western District of Michigan. The FBI in Michigan remains committed to working alongside our law enforcement partners to investigate, disrupt, and bring to justice any individuals who prey on our children.”

              “The Kent County Sheriff’s Office is committed to pursuing justice for victims of child exploitation and ensuring that offenders are held accountable. This case highlights the critical importance of parents and guardians having open conversations with their children about the dangers of social media. Our dedicated staff and partnerships with federal agencies allow us to continue protecting our community from those who seek to harm children,” the department said in a statement.

              The Kent County Sheriff’s Office and FBI are investigating this case, and Assistant United States Attorney Olivia Ghiselli is prosecuting it.

              This case is part of Project Safe Childhood, a nationwide initiative designed to protect children from online exploitation and abuse. The U.S. Attorney’s Office, county prosecutor’s offices, the Internet Crimes Against Children task force (ICAC), federal, state, tribal, and local law enforcement are working closely together to locate, apprehend, and prosecute individuals who exploit children. The partners in Project Safe Childhood work to educate local communities about the dangers of online child exploitation, and to teach children how to protect themselves. For more information about Project Safe Childhood, visit www.projectsafechildhood.gov. Individuals with information or concerns about possible child exploitation should contact local law enforcement officials.

    # # #

    MIL Security OSI

  • MIL-OSI: WISeSat.Space Announces New 2025 Satellite Launches with Post-Quantum-Ready Technology

    Source: GlobeNewswire (MIL-OSI)

    WISeSat.Space Announces New 2025 Satellite Launches with Post-Quantum-Ready Technology

    Next launch will include SEALCOIN PoC to Enable Decentralized Satellite-IoT M2M Transactions Using Hedera DLT

    Geneva, Switzerland – February 6, 2025 – WISeKey International Holding (“WISeKey” or the “Company”) (NASDAQ: WKEY; SIX: WIHN), a leading global cybersecurity, AI, and IoT company, today announced that its subsidiary, WISeSat has released the satellite launches schedule for 2025, marking a major advancement in secure satellite-based IoT communications.

    The next confirmed launch is scheduled for June 2025 with SpaceX, deploying next-generation WISeSat satellites designed with post-quantum-ready security to protect against future cyber threats, followed by another one in October and a third one in December. This launch series serves as a proof of concept, integrating WISeKey’s trusted Root of Trust with SEALSQ’s cutting-edge Post-Quantum Chips, ensuring unmatched cybersecurity resilience in an evolving digital landscape. These satellites also incorporate incremental technology derived from the SEALSQ quantum roadmap, leveraging innovations from SEALSQ’s partner and startup investment program to enhance security, performance, and efficiency.

    The WISeSat constellation continues to expand, offering real-time, ultra-secure connectivity for IoT devices across industries worldwide. In response to the escalating cyber risks posed by quantum computing advancements, WISeSat reinforces WISeKey’s commitment to pioneering a resilient cybersecurity infrastructure.

    Carlos Moreira, Founder and CEO of WISeKey, emphasized the importance of this initiative noted, “These new launches represent a major step forward in securing IoT communications for the future. By integrating SEALSQ’s Post-Quantum Chips with WISeKey’s trusted Root of Trust, we are ensuring that WISeSat remains a leader in satellite cybersecurity. Our goal is to provide a quantum-resistant, globally connected IoT ecosystem that meets the security challenges of tomorrow.”

    As the satellite IoT communications division of WISeKey, WISeSat was established to meet the growing demand for secure, real-time IoT connectivity across critical industries, including logistics, agriculture, energy, and infrastructure management. WISeSat was established as part of WISeKey’s broader strategy to provide security in the era of quantum computing. Traditional IoT networks face increasing vulnerabilities, and WISeSat addresses these risks by delivering a global, satellite-based solution that combines secure connectivity with post-quantum cryptographic protection.

    Building on the success of its prior missions, WISeKey is preparing multiple WISeSat deployments throughout 2025, which will:

    • Expand the WISeSat satellite network to increase coverage, bandwidth, and redundancy.
    • Integrate AI-driven analytics for enhanced security monitoring and real-time data processing.
    • Develop hybrid terrestrial-satellite solutions to ensure seamless, ultra-secure IoT connectivity.

    WISeSat.Space AG is at the forefront of secure IoT connectivity and climate change monitoring, leveraging advanced satellite technology to deliver cost-effective, secure global communications. The WISeSat constellation supports key applications such as environmental monitoring, disaster management, and sustainable development. By integrating satellite-generated data with advanced climate models, WISeSat plays a crucial role in improving environmental intelligence and developing strategies to combat climate change.

    As the cyber and environmental landscapes continue to evolve, initiatives like WISeSat’s IoT satellite constellation will be critical in shaping a more resilient, secure, and sustainable future. With multiple launches planned for 2025, including the next confirmed mission with SpaceX in June, WISeKey remains at the forefront of securing the IoT ecosystem through space-based technology, leading the way toward a quantum-secure digital world.

    The June launch will include a PoC that will demonstrate SEALCOIN’s groundbreaking potential to facilitate decentralized space transactions in the growing Internet of Things (IoT) ecosystem. Leveraging the SEALCOIN platform, the PoC will enable satellite-initiated transactions to IoT devices without human intervention. The tokens, based on Hedera Decentralized Ledger Technology (DLT), ensure secure, transparent, and tamper-proof exchanges, driving the creation of a scalable Transactional IoT (t-IoT) infrastructure.

    In June, SEALSQ will launch a Proof of Concept (PoC) showcasing SEALCOIN’s transformative potential in decentralized space transactions within the expanding Internet of Things (IoT) ecosystem.

    • The PoC will enable satellite-initiated transactions with IoT devices without human intervention, establishing a seamless, autonomous data and value exchange mechanism.
    • SEALCOIN tokens, built on Hedera’s Decentralized Ledger Technology (DLT), ensure secure, transparent, and tamper-proof transactions.
    • This initiative will pave the way for a scalable Transactional IoT (t-IoT) infrastructure, enhancing efficiency and security in space-based IoT communications.

    This breakthrough aims to redefine machine-to-machine (M2M) transactions in sectors like smart cities, logistics, and remote sensing, opening new possibilities for secure, decentralized IoT applications beyond Earth.

    About WISeKey

    WISeKey International Holding Ltd (“WISeKey”, SIX: WIHN; Nasdaq: WKEY) is a global leader in cybersecurity, digital identity, and IoT solutions platform. It operates as a Swiss-based holding company through several operational subsidiaries, each dedicated to specific aspects of its technology portfolio. The subsidiaries include (i) SEALSQ Corp (Nasdaq: LAES), which focuses on semiconductors, PKI, and post-quantum technology products, (ii) WISeKey SA which specializes in RoT and PKI solutions for secure authentication and identification in IoT, Blockchain, and AI, (iii) WISeSat AG which focuses on space technology for secure satellite communication, specifically for IoT applications, (iv) WISe.ART Corp which focuses on trusted blockchain NFTs and operates the WISe.ART marketplace for secure NFT transactions, and (v) SEALCOIN AG which focuses on decentralized physical internet with DePIN technology and house the development of the SEALCOIN platform.

    Each subsidiary contributes to WISeKey’s mission of securing the internet while focusing on their respective areas of research and expertise. Their technologies seamlessly integrate into the comprehensive WISeKey platform. WISeKey secures digital identity ecosystems for individuals and objects using Blockchain, AI, and IoT technologies. With over 1.6 billion microchips deployed across various IoT sectors, WISeKey plays a vital role in securing the Internet of Everything. The company’s semiconductors generate valuable Big Data that, when analyzed with AI, enable predictive equipment failure prevention. Trusted by the OISTE/WISeKey cryptographic Root of Trust, WISeKey provides secure authentication and identification for IoT, Blockchain, and AI applications. The WISeKey Root of Trust ensures the integrity of online transactions between objects and people. For more information on WISeKey’s strategic direction and its subsidiary companies, please visit www.wisekey.com.

    Disclaimer
    This communication expressly or implicitly contains certain forward-looking statements concerning WISeKey International Holding Ltd and its business. Such statements involve certain known and unknown risks, uncertainties and other factors, which could cause the actual results, financial condition, performance or achievements of WISeKey International Holding Ltd to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. WISeKey International Holding Ltd is providing this communication as of this date and does not undertake to update any forward-looking statements contained herein as a result of new information, future events or otherwise.

    This press release does not constitute an offer to sell, or a solicitation of an offer to buy, any securities, and it does not constitute an offering prospectus within the meaning of the Swiss Financial Services Act (“FinSA”), the FinSa’s predecessor legislation or advertising within the meaning of the FinSA. Investors must rely on their own evaluation of WISeKey and its securities, including the merits and risks involved. Nothing contained herein is, or shall be relied on as, a promise or representation as to the future performance of WISeKey.

    Press and Investor Contacts

    WISeKey International Holding Ltd
    Company Contact: Carlos Moreira
    Chairman & CEO
    Tel: +41 22 594 3000
    info@wisekey.com 
    WISeKey Investor Relations (US) 
    The Equity Group Inc.
    Lena Cati
    Tel: +1 212 836-9611
    lcati@equityny.com

    The MIL Network

  • MIL-OSI: Internet Safety Labs Awarded $500K Grant to Advance Research into Privacy Risks and Dark Patterns in Kids’ Apps

    Source: GlobeNewswire (MIL-OSI)

    SAN DIEGO, Feb. 06, 2025 (GLOBE NEWSWIRE) — Internet Safety Labs, a non-profit organization dedicated to independent software product safety testing, has been awarded a $500,000 grant from the Internet Society Foundation to further its critical work in enhancing the safety and privacy of children’s data. This funding will support the organization’s latest initiative, “Measuring Safety Risks in Kids’ Apps Part III: Privacy and Dark Patterns.” This is the third grant received by Internet Safety Labs (ISL) from the Internet Society (ISOC) Foundation.

    The new report will focus on advancing research and developing auditing techniques to uncover and address:

    • “Dark” or “Deceptive” user interface (UI) patterns designed to manipulate children within apps, including patterns that foster addiction.
    • Observable app security risks that threaten the safety of kids’ digital experiences.
    • Privacy risks by enhancing the existing safety labels to include more details of what data is being collected and who it’s being shared with.

    “This grant represents ongoing and strong support for our work of holding the tech industry accountable through transparency,” said Lisa LeVasseur, executive director of Internet Safety Labs. “Surgeon General Murthy highlighted last year the need to better label the innate risks in social media apps. Funds from the ISOC Foundation will allow us to provide just such a label.”

    Support from the ISOC Foundation has been instrumental in ISL’s previous accomplishments within the realm of K-12 edtech safety. This includes the 2023 launch of its App Microscope safety labels, a groundbreaking free resource designed to help people understand the potential risks of mobile apps used in schools, and the release of its “2022 K-12 Edtech Safety Benchmark – Part 1, 2, and 3.” The initial report made headlines for its findings that nearly all school apps (96%) share children’s personal information with third parties, 78% of the time with advertising or monetization entities.

    “We are proud to continue partnering with Internet Safety Labs to improve child safety and privacy online,” said Maiko Nakagaki, senior program officer at ISOC Foundation. “ISL’s efforts underscore our shared goal to ensure that the Internet is open, connected, secure and trustworthy for all.”

    Internet Safety Labs invites experts, business leaders and individuals interested in advancing standards for software product safety and ethical Internet practices to visit its website to learn more about how to work with ISL.

    About Internet Safety Labs
    Internet Safety Labs (ISL) is the world’s first independent product safety tester for digital technology. Through rigorous safety audits of websites and mobile apps, we identify and document invisible safety risks that impact millions of users. Our comprehensive open safety standards and automated testing infrastructure enable systematic evaluation of data privacy, harmful user interfaces, and policy transparency. As a 501(c)(3) nonprofit, we empower consumers with standardized safety labels while providing regulators and policymakers with evidence to drive meaningful industry change. We’re creating a more trustworthy digital world by establishing precedent for independent oversight and accountability. For more information, visit https://internetsafetylabs.org/.

    About The Internet Society Foundation:
    The Internet Society Foundation exists to support the positive difference the Internet can make to people everywhere. It promotes the development of the Internet as a global technical infrastructure, a resource to enrich people’s lives, and a force for good in society.

    PR Contact:
    Sherlyn Rijos-Altman
    Montner Tech PR
    srijos@montner.com

    The MIL Network

  • MIL-OSI: WTW debuts new Insurance Pricing and Underwriting Technology to accelerate speed to market in Guidewire PolicyCenter

    Source: GlobeNewswire (MIL-OSI)

    LONDON, Feb. 06, 2025 (GLOBE NEWSWIRE) — WTW (NASDAQ: WTW), a leading global advisory, broking, and solutions company, today announced the latest advancement in its Radar rating and analytics engine with the launch of its Rating, Pricing, and Underwriting acceleratori for Guidewire.

    Radar, WTW’s external rating engine, is an end-to-end solution designed specifically for the insurance sector. It provides cutting-edge analytics and decision-making guidance for pricing and underwriting, deployed to the market in real time. Radar’s new Guidewire accelerator will streamline the integration of Radar with PolicyCenter, Guidewire’s policy administration system, allowing carriers to realize the benefits of Radar more quickly. The accelerator uses a highly innovative approach that draws Guidewire product definitions directly into Radar’s pricing environment, massively expediting the integration process.

    Market and customer demand for more innovative insurance solutions has increased significantly in recent years. Pricing and underwriting teams have been stretched he need to provide new products in a competitive market while balancing regulatory requirements for rating accuracy, transparency, and fairness. Radar is a proven solution that delivers success for insurers and their customers in this challenging environment.

    Gio Smyth, Managing Director and Americas Regional Leader, Insurance Consulting and Technology, WTW, commented, “WTW’s integration between Guidewire PolicyCenter and our Radar technology platform will enhance the operational efficiency of our shared clients by reducing implementation time and cost, enabling them to maximize the benefits of Radar. The addition of game-changing speed and accuracy to the pricing process makes it possible to update market pricing in minutes rather than days, weeks, or months, affording insurers a particular competitive edge.”

    Will Murphy, Vice President, Global Technology Alliances, Guidewire, said: “With the launch of the Radar Accelerator from WTW, our shared customers can now quickly leverage a valuable rating solution that enables insurers to realize quicker and more accurate underwriting and pricing performance.”

    About Radar

    Smarter insights. Better results. Delivered faster.

    Radar is a complete, end-to-end analytics and model deployment solution. It was built specifically for insurers by insurance experts and continually enhanced through ongoing investment, development, and innovation.

    Radar delivers proprietary machine learning algorithms, real-time decision-making, regulatory reporting, speed, and ease of deployment.

    Radar is part of WTW’s Insurance Consulting and Technology business, which serves the insurance industry with a powerful combination of advisory services and leading-edge technology. Its mission is to innovate and transform insurance and deliver solutions that help clients better select, finance, and manage risk and capital.

    We work with clients of all sizes globally, including most of the world’s leading insurance groups. Over 1,000 client companies use our specialist insurance software on six continents. With over 1,700 colleagues in 35 markets, we continually strive to be a partner and employer of choice to the insurance industry.

    About Insurance Consulting and Technology (ICT)

    WTW’s Insurance Consulting and Technology (ICT) business has over 1,200 colleagues operating and capital, improve business performance, and create competitive advantage – by focusing on financial and regulatory reporting, enterprise risk and capital management, M&A and corporate restructuring, products, pricing, business management, and strategy.in 35 markets worldwide. ICT is a leading provider of advice, solutions, and software – primarily to the insurance industry. Its consulting services help clients manage risk

    About WTW

    At WTW (NASDAQ: WTW), we provide data-driven, insight-led solutions in the areas of people, risk, and capital. Leveraging the global view and local expertise of our colleagues serving 140 countries and markets, we help organizations sharpen their strategy, enhance organizational resilience, motivate their workforce, and maximize performance.

    Working shoulder to shoulder with our clients, we uncover opportunities for sustainable success and provide a perspective that moves you.

    Learn more at wtwco.com.

    Media Contact

    Douglas Menelly +1 516 445 5387 | douglas.menelly@wtwco.com

    _______________
    i https://marketplace.guidewire.com/s/product/radar-accelerator-for-rating-and-pricing-for-policycenter/01t3n00000SqGjIAAV?language=en_US

    The MIL Network

  • MIL-OSI USA: UConn Firsts: The First Online Classes

    Source: US State of Connecticut

    Although UConn had technically been online for several years – uconn.edu was registered all the way back in 1987 – September 1994 saw the beginning of what has become a daily part of the college experience for students in the 21st century: online classes. At the time, though, the idea of doing coursework on “the World Wide Web” was pretty bold – and not everyone was eager to take part. “I feel very strongly that courses in the humanities don’t belong on the Internet,” one first-year student said then. Misgivings aside, within a year of the first trial, the number of online classes had jumped from 3 to 55, although at the time, “online” was a relative term: the classes were all held in computer labs, since most students in those days didn’t have personal computers. Today, nearly every class includes online components, and plenty take place entirely in cyberspace, along with more than 50 degree and certificate programs offered online.

    MIL OSI USA News

  • MIL-OSI Asia-Pac: DEPARTMENT OF POSTS TAKES STEPS TO IMPROVE OPERATIONAL EFFICIENCY AND EXPAND SERVICE OFFERINGS

    Source: Government of India (2)

    Posted On: 06 FEB 2025 3:08PM by PIB Delhi

    The Department of Posts has taken numerous steps to improve operational efficiency, incorporate technology, and expand service offerings. Below are the details:

    1. Improved Parcel Services:
      • Nodal Delivery Centers: 233 Nodal Delivery Centers have been established for faster and more efficient parcel delivery, covering over 1600 PIN codes. These centers handle approximately 30% of daily parcel deliveries.
      • Parcel Hubs: A network of 190 Parcel Hubs (Level-1 and Level-2) has been set up to facilitate faster processing and secure handling of parcels.
      • Technology Integration: Advanced tracking systems have been implemented, including real-time delivery status, API integration, system-assisted sorting, and error management systems.
      • Parcel Packaging Policy: 1408 Parcel Packaging Units are operational across the country, providing high-quality packaging materials for secure parcel transit.
      • Smart Booking and Delivery Kiosks: 30 Smart Parcel Delivery Kiosks and 30 Self Booking Kiosks have been installed in various cities to enable flexible pickup and delivery options for customers.
    2. DakGharNiryatKendras (DNKs): In coordination with Central Board of Indirect Taxes and Customs (CBIC), 1013 DNKs have been established to facilitate e-commerce exports, offering services such as self-booking, label generation, and export documentation.
      • These DNKs provide valuable support to small exporters, including artisans and self-help groups from rural areas.
    3. Core Banking and Digital Services:
      • All Post Offices are integrated with a Core Banking Solution offering a variety of services including ATMs, Internet Banking, Mobile Banking, NEFT/RTGS, Electronic Clearing Services (ECS), and e-KYC for smooth digital transactions.
      • India Post Payments Bank offers digital payment services linked to Post Office Savings Accounts.
    4. Expanded Services by the Business Development Directorate:
      • Post Office Passport Seva Kendra (POPSK): Post Offices are now offering passport services to citizens across the country.
      • AadhaarEnrollment and UpdationCenters: To provide Aadhaar services even in remote areas.
      • Verification of Prime Minister Employment Generation Program (PMEGP) Units: Post Offices assist in the verification process for government subsidy schemes like PMEGP.
      • E-Post & E-Payment: These services provide electronic message transmission and bill payment collection, respectively, further enhancing the Post’s service offerings.
    5. Retail and Specialized Services:
      • Gangajal and Holy Prasadam: Post Offices are involved in the distribution of Gangajal and delivery of Prasadam, providing a unique religious service to customers.
      • Media Post and Direct Post: For business communication, Post Offices facilitate Media Post services (advertisements through postal mediums) and Direct Post for targeted advertising.
      • India Post Passenger Reservation System (IP-PRS): Identified Post Offices have been equipped to offer railway ticket reservations, thus expanding their utility to the public.

    This information was given by the Minister of State for Communications, Dr. Pemmasani Chandra Sekhar in a written reply to a question in Rajya Sabha today.

    *****

    Samrat/Dheeraj@:   pibcomm[at]gmail[dot]com

    (Release ID: 2100231) Visitor Counter : 69

    MIL OSI Asia Pacific News

  • MIL-OSI Economics: Steven Maijoor: Cyber resilience in an age of geopolitical tensions

    Source: Bank for International Settlements

    On December 12th 2023, Kyivstar, Ukraine’s largest telecom provider, suffered a cyberattack that disrupted services for millions of users. The attack, attributed to the Russian state-sponsored group Sandworm, was one of the biggest cyber incidents in Ukraine since the onset of the Russian invasion. The hackers had infiltrated Kyivstar’s infrastructure months earlier. They deployed malware that erased thousands of virtual servers and personal computers, crippling the company’s network for managing communication services.

    The attack had several immediate effects. First of all, approximately half of Kyivstar’s network was disabled, leaving millions without mobile and internet connection. But the damage wasn’t limited to the telecom sector. The attack also disrupted banking operations, payment processing, and online banking services. Some ATMs and point-of-sale terminals didn’t work. Financial transactions were in disarray across the country.

    Amazingly, the Ukrainians were quickly able to restore services. Over the past three years they have become quite proficient in dealing with large-scale disruption. Many critical processes in Ukraine are equipped with redundancy measures. Many people even have two sim cards in their phones. That enabled the other Ukrainian telecom providers to circumvent the outage. Services at Kyivstar were gradually reinstated, with almost full restoration achieved eight days after the attack.

    This episode raises some inconvenient questions. What if this would happen to us? What if a large scale Russian or Chinese cyberattack is launched on the telecoms sector of an EU member state? Would it be possible? How much damage could such an attack cause? Would it affect financial services? And would we be able to recover as quickly as the Ukrainians did?

    A few years ago, most people would have found these questions to be rather hypothetical, but today, unfortunately, they have become quite urgent. Geopolitical tensions have been rising for more than a decade, but over the past few years they have accelerated. Countries are re-arming, they are protecting their strategic economic infrastructures, they are imposing trade restrictions and sanctions on each other, and they are weaponising access to international financial infrastructures and services. Needless to say this is bad news for the world economy and the financial sector. But perhaps in no area is the geopolitical threat so real and acute as in the digital domain.

    Apart from the Kyivstar case, there are many other examples to back this up. In late 2023, a Russian hacker breached Microsoft’s corporate network by exploiting a legacy account. As a result, the security and confidentiality of the email accounts of many organisations around the world were potentially compromised. Last year, the FBI discovered a dormant network of Chinese hackers in the United States that had compromised hundreds of routers and that was on standby to launch an attack if called on. And recently, Russian and Chinese vessels were suspected of damaging subsea data cables. Since state-sponsored cyberattacks are often very well concealed, we do not have reliable numbers on how often they occur. But anecdotal information from intelligence agencies, like the Dutch General Intelligence and Security Service, suggest their number is increasing.

    Traditionally, the financial sector has been an attractive target for cyber criminals with financial motives. But with the changing geopolitical climate, nation-state cyberattacks have become a very real possibility. Their main aim is to cause disruption and to steal sensitive information. Nation-state actors possess more resources, sophistication, and endurance than other hackers. And many sectors of the economy have become more vulnerable to large-scale disruption due to increased complexity and digitalisation. This is certainly true of financial services, with their long outsourcing chains and interconnectedness. And many financial firms depend on the same third-party service providers, so if one of these suppliers is attacked, large chunks of the financial sector may experience the knock-on effects. As we showed in our latest Financial Stability overview, a quarter of all reported global cyberattacks can potentially affect the financial sector through a vital process run by a third party on which the financial system depends.

    So, to answer the questions I posed at the start: yes, I think a major state-sponsored cyberattack on the financial sector or one of its supporting sectors could happen. And frankly, I hope we would be able to recover as quickly as the Ukrainians did.

    That is not because financial institutions haven’t prepared. Many financial institutions have taken big steps in recent years to boost their cyber resilience. I think it is fair to say the financial industry is one of the better digitally defended sectors in the economy. As it should be. But given the size and urgency of the threat, we need to do even more to keep financial services safe. This is why cyber resilience will absolutely be a key focus area in our supervision of the financial industry in the coming years. This goes both for De Nederlandsche Bank, and for the European Central Bank.

    Our aim is to make financial services safer against cyber threats. Not only by increasing the resilience of the financial sector itself, but also by stepping up the robustness of the entire chain of ICT service providers. DORA, the European Digital Operational Resilience Act, that came into effect at the beginning of this year, gives us additional tools to accomplish this aim.

    To start with, under DORA, threat-led penetration tests are mandatory for the largest financial institutions in Europe. In the Netherlands we have been conducting these kinds of tests voluntarily for over eight years with good results, and we are very pleased that it is now becoming the norm at the European level.

    But DORA also imposes stricter requirements for managing cyber risks in outsourcing chains. For example, financial firms face stricter rules for conducting due diligence on potential ICT providers. As a result, Fintechs may also experience more stringent due diligence from financial sector customers. And very importantly, under DORA, European supervisors can conduct inspections of critical third-party ICT service providers in tandem with national supervisory authorities. We expect bigtechs like Google and Microsoft to be placed under EU-wide supervision. And, just as with the banks, we are going to test their readiness to detect and withstand cyberattacks.

    Despite all efforts, there is no such thing as perfect cyber security. It is therefore vital that financial institutions take measures to recover quickly after cyber incidents. This is crucial to ensure that services can continue and people don’t lose trust in financial firms or the financial sector as a whole.

    The results of the ECB’s 2024 cyber stress test show that there is room for improvement on the recovery front. So it’s a very good thing that DORA also imposes new requirements on institutions’ continuity plans and backup policies. They need to develop a culture where cyber incidents are quickly detected and reported, they need to have their playbooks in place and they need to have clearly defined management roles and responsibilities. These are key ingredients for an effective response after a cyberattack.

    An important principle of our supervision has always been that financial institutions are responsible for putting their own house in order. And that is also the case with cybersecurity. But if we only focus on individual institutions, we miss something. As I mentioned, on a digital level the financial sector is so interconnected, and connected to other vital sectors of the economy as well, that some degree of overall coordination and cooperation is necessary to arrive at an optimal level of resilience. Notably, recent assessments, derived from nationwide contingency exercises in the Netherlands, reveal various weaknesses. These weaknesses relate to the exchange of information between critical infrastructure providers, the distribution of roles and responsibilities, and the mobilisation of scarce cyber security knowledge and expertise in the event of major cyber incidents.

    So the message here is: we need to work together. Governments should take the lead to improve cross-sectoral cooperation and coordination. They must continue to conduct large-scale cyber-drills and practice activating crisis plans. The insights gained should be used to enhance resilience.

    But there is also a role for financial supervisors like DNB. Under the new legislation, we do not only need to check whether financial firms are compliant, but we also have an obligation ourselves to look over the fence and cooperate closely with other sectors. DNB is putting this into practice by working with vital sectors that are most critical to the financial sector, such as energy and telecommunications. Within our mandate, we support these sectors with information, cooperation and ethical hacking experience.

    To sum up, the threat of major disruptions to our financial system from nation-state cyberattacks has become more urgent. Financial firms, and the entire outsourcing chain on which they depend, therefore need to do whatever they can to further boost their cyber resilience. Both in terms of detection and recovery. Cyber resilience is a top priority for European financial supervisors and there are new European laws in place. And we are going to use these laws to make sure that financial institutions under our supervision are as secure and well defended as possible. Enhancing resilience also means we need to work together. Governments, financial firms, supervisors, telecom, energy and other vital players in the outsourcing chain. Because in cyberspace, we are all linked together. And after all, a chain is only as strong as its weakest link.

    Thank you.

    MIL OSI Economics

  • MIL-OSI Canada: Vicky Eatrides to the Public Interest Advocacy Centre

    Source: Government of Canada News (2)

    That is why we are taking action to empower Canadians when it comes to Internet and cellphone services. Because ensuring that Canadians have the ability to make informed choices goes a long way to helping ensure a healthy, vibrant and competitive communications system.

    MIL OSI Canada News

  • MIL-OSI: Baltic Horizon Fund publishes interest rate applicable to the bonds for the next interest period

    Source: GlobeNewswire (MIL-OSI)

    Baltic Horizon Fund publishes interest rate applicable to the fund’s 5-year bonds (ISIN: EE3300003235) for the next 3-months interest period which starts on 10 February 2025. The annual interest rate applicable to the bonds for the interest period as referred above is 8% + 2.529% (EURIBOR 3-months) totaling 10.529% per annum.

    For additional information, please contact:

    Tarmo Karotam
    Baltic Horizon Fund manager
    E-mail tarmo.karotam@nh-cap.com
    www.baltichorizon.com

    The Fund is a registered contractual public closed-end real estate fund that is managed by Alternative Investment Fund Manager license holder Northern Horizon Capital AS. 

    Distribution: GlobeNewswire, Nasdaq Tallinn, Nasdaq Stockholm, www.baltichorizon.com

    To receive Nasdaq announcements and news from Baltic Horizon Fund about its projects, plans and more, register on www.baltichorizon.com. You can also follow Baltic Horizon Fund on www.baltichorizon.com and on LinkedIn, FacebookX and YouTube.

    The MIL Network

  • MIL-OSI: OP Financial Group’s Financial Statements Bulletin 1 January–31 December 2024: Excellent business performance continued – full-year operating profit EUR 2,486 million

    Source: GlobeNewswire (MIL-OSI)

    OP Financial Group
    Financial Statements Bulletin
    Stock Exchange Release 6 February 2025 9.00 am EET

    Financial Statements Bulletin 1 January–31 December 2024: Excellent business performance continued – full-year operating profit EUR 2,486 million 

    • Operating profit increased by 21% to EUR 2,486 million (2,050).

    • Income from customer business, or net interest income, insurance service result and net commissions and fees, increased to EUR 3,805 million (3,605). Net interest income grew by 5% to EUR 2,796 million (2,654). Insurance service result increased by 136% to EUR 192 million (81) and net commissions and fees decreased by 6% to EUR 818 million (870).

    • Impairment loss on receivables was EUR 96 million (269), or 0.09% (0.26) of the loan and guarantee portfolio.

    • Investment income increased by 20% to EUR 465 million (389).

    • Total expenses grew by 3% to EUR 2,262 million (2,201). The cost/income ratio improved to 47% (49).

    • The loan portfolio was at the previous year’s level at EUR 98.9 billion (98.9), while deposits grew by 4% year on year to EUR 77.7 billion (74.5).

    • The CET1 ratio was 21.5% (19.2), which exceeds the minimum regulatory requirement by 8.1 percentage points. The changes in the EU Capital Requirements Regulation (CRR3), which took effect on 1 January 2025, are expected to cause a slight reduction in the capital adequacy of OP Financial Group.

    • Retail Banking segment’s operating profit rose by 4% to EUR 1,275 million (1,223). Net interest income grew by 3% to EUR 2,112 million (2,041). Impairment loss on receivables decreased by EUR 78 million to EUR 95 million (173). Net commissions and fees decreased by 10% to EUR 619 million (686). The cost/income ratio was 51% (49). The loan portfolio decreased by 0.3% year on year, to EUR 70.7 billion (70.9). Deposits increased by 3% to EUR 62.9 billion (61.2).

    Corporate Banking segment’s operating profit grew by 40% to EUR 572 million (408). Net interest income grew by 11% to EUR 657 million (591). Impairment loss on receivables decreased by EUR 96 million to EUR 0 million (96). Net commissions and fees increased by 4% to EUR 199 million (192). The cost/income ratio improved to 38% (41). In the year to December, the loan portfolio grew by 1% to EUR 28.3 billion (28.1). Deposits increased by 12% to EUR 15.4 billion (13.8).

    Insurance segment’s operating profit grew by 39% to EUR 578 million (414). The insurance service result increased by EUR 110 million to EUR 192 million (81). Investment income increased by 10% to EUR 382 million (347). The combined ratio reported by non-life insurance improved to 92.3% (93.8).

    Group Functions operating profit was EUR 19 million (-26). Net interest income increased by EUR 15 million to EUR 16 million (1).

    • OP Financial Group increased the OP bonuses to be earned by owner-customers for 2024 by 40% compared to the normal level of 2022. Additionally, owner-customers got daily banking services without monthly charges in 2024. Together, these benefits were estimated to add up to more than EUR 404 million in value for owner-customers in 2024. The benefits will be in force until the end of 2025.

    Outlook: OP Financial Group’s operating profit for 2025 is expected to be at a good level but lower than that for 2023 and 2024. For more detailed information on the outlook, see “Outlook”.

    OP Financial Group’s key indicators

    € million Q1–4/2024 Q1–4/2023 Change, %
    Operating profit, € million         2,486         2,050         21.3
    Retail Banking         1,275         1,223         4.3
    Corporate Banking         572         408         40.4
    Insurance         578         414         39.4
    Group Functions         19         -26
    New OP bonuses accrued to owner-customers, € million         -314         -275         14.1
    Total income**         4,844         4,520         7.2
    Total expenses         -2,262         -2,201         2.8
    Cost/income ratio, %**         46.7         48.7 -2.0*
    Return on equity (ROE), %         11.6         10.6 0.9*
    Return on equity, excluding OP bonuses, %         13.0         12.0 1.0*
    Return on assets (ROA), %         1.24         0.98 0.26*
    Return on assets, excluding OP bonuses, %         1.39         1.11 0.28*
      31 Dec 2024 31 Dec 2023 Change, %
    CET1 ratio, %*         21.5         19.2 2.3*
    Loan portfolio, € billion         98.9         98.9         0.0
    Deposits, € billion         77.7         74.5         4.3
    Ratio of non-performing exposures to exposures, %         2.64         2.94 -0.30*
    Ratio of impairment loss on receivables to loan and guarantee portfolio, %         0.09         0.26 -0.17*
    Owner-customers (1,000) 2,115 2,094         1.0

    Comparatives for the income statement items are based on the corresponding figures in 2023. Unless otherwise specified, figures from 31 December 2023 are used as comparatives for balance-sheet and other cross-sectional items.
    * Change in ratio, percentage point(s).
    ** OP bonuses to owner-customers, which were previously shown on a separate line in the income statement, have been divided under the following items based on their accrual: interest income, interest expenses, and commission income from mutual funds. The line ‘OP bonuses to owner-customers’ is no longer shown in the income statement. Comparative information has been adjusted accordingly. For more detailed information on the change, see Note 1 to the Half-year Financial Report 1 January–30 June 2024, Accounting policies and changes in accounting policies and presentation.

    Comments by the President and Group Chief Executive Officer:

    Uncertainty overshadowed the business environment – Finland’s economy began to recover as the year ended

    In 2024, the exceptionally tense geopolitical situation of previous years continued to predominate in Finland’s neighbouring regions. Russia’s war of aggression against Ukraine approached its third year and the Middle East conflict spilled over into new areas. A tectonic shift is underway in international politics and the global economy, creating uncertainty in the economy and our broader business environment.

    Although the world economy grew by 3% last year, Europe’s grew by just over 1%. Finland’s economy contracted for the second year running. However, the economy began to recover gradually as the year ended and OP Financial Group expects Finland’s GDP to grow by a couple of per cent in 2025.

    Construction and the related sectors were particularly affected by the sluggish economy. Risks in the real estate sector remained high and the number of bankruptcies increased substantially on the previous year.

    Inflation in Finland fell markedly, from 3.6% to 0.7%, on the year before. On the other hand, unemployment rose, reaching 8.9% in December. Market interest rates fell almost continuously from early 2024 and the Euribor rates were clearly lower by the year’s end.

    Despite the pickup in late 2024, home sale volumes and demand for home loans fell considerably year on year. Home prices continued their downward trend.

    The fall in market rates boosted the stock markets, raising share prices on several stock exchanges. However, Nasdaq Helsinki’s stock indices ended 2024 in slightly negative territory for the year as a whole.

    OP Financial Group had an excellent year – strong earnings enable outstanding benefits for owner-customers

    OP Financial Group performed extremely well and operating profit increased by 21% year on year, to EUR 2,486 million in 2024.

    Our excellent earnings will enable us to continue providing our over 2.1 million owner-customers with considerable benefits in 2025. As in 2024, our owner-customers will get daily banking services without monthly charges and accrue 40% extra OP bonuses compared to the normal level of 2022. This is how we will help to ease the strain on households in these economically challenging times. The total value of higher benefits on OP bonuses and daily services will be around EUR 400 million in 2025, which is a significant overall financial benefit.

    Being customer-owned, OP Financial Group will continue to share its financial success through a range of financial and other benefits for its owner-customers.

    Income from OP Financial Group’s customer business grew to a record level of more than EUR 3.8 billion. The improvement in the insurance service result was particularly strong, being 136% higher than a year earlier. Growth in net interest income slowed to 5% and net commissions and fees decreased by 6% year on year, chiefly due to the benefit (provided for owner-customers) of zero monthly charges for daily banking services. Income from investment activities grew considerably from 2023’s level and OP Financial Group’s total income reached over EUR 4.8 billion – 7% higher than a year earlier.

    OP Financial Group’s costs grew by 3% year on year, due to rising personnel costs and higher investments in ICT development. Compared to the previous year, its cost/income ratio improved by two percentage points to 47%, an excellent level even in international terms.

    All three business segments performed extremely well

    All three business segments performed extremely well. The Retail Banking segment’s operating profit rose by 4% year on year, to EUR 1,275 million. Insurance recorded an operating profit of EUR 578 million, growing by 39% compared to a year ago. Corporate Banking’s operating profit was EUR 572 million, up by 40% over the previous year.

    Strong capital adequacy and excellent liquidity provide security and stability in an uncertain business environment

    OP Financial Group’s CET1 ratio improved again, to 21.5%, exceeding the minimum regulatory requirement by 8.1 percentage points. OP Financial Group is one of the most financially solid large banks in Europe. Excellent profitability, strong capital adequacy and liquidity are critical factors for banks and insurance companies, building trust among customers, partners and other stakeholders. In OP Financial Group, these factors are at an excellent level, providing the Group with an even stronger basis than before for meeting future challenges.

    Deposits grew substantially and the loan portfolio stopped shrinking – customers’ loan repayment capacity remained good

    OP Financial Group’s deposit portfolio grew by more than 4% from 2023. Household, corporate and institutional deposits were on an upward trend at the end of the year. OP Financial Group’s market share of deposits rose to over 40%.

    By late 2024, OP Financial Group’s loan portfolio had reached the same level as at the end of 2023. After a long decline, the loan portfolio began to grow again in the early autumn. OP Financial Group maintained its strong market position in the home loan and corporate loan markets. Our market share of home loans was 39%. For corporate loans, we had a market share of 38%.

    OP Financial Group’s home loan customers made home loan repayments punctually and meticulously in 2024. The situation was eased by the fall in market rates. The number of loan modification applications was lower than in recent years. The number of corporate loans under special monitoring declined in comparison to last year. Non-performing exposures decreased from 2.9% to 2.6%. Impairment loss on receivables decreased markedly year on year.

    Wealth management continued to grow rapidly throughout the year

    We aim to coach our customers in making better financial choices. Wealth management is one of our growth focus areas – we intend to make a clear growth leap in this business in the coming years.

    The number of OP Financial Group unitholders rose to over 1.4 million. Moreover, the number of new systematic investment agreements increased by a third. Mutual fund investors were particularly attracted by international and sustainability-themed investment opportunities. Sustainability is a priority for younger investors in particular. At EUR 111 billion in value at the year’s end, customers’ investment assets managed by OP Financial Group grew by 8%.

    OP-mobile was used more than 700 million times – use of artificial intelligence is growing fast

    OP Financial Group’s use of digital services grew substantially again. Personal and corporate customers increasingly use digital channels for banking and insurance. Last year, customers logged in to OP-mobile around 708 million times – an average of 59 million times per month. OP-mobile already has more than 1.7 million active users.

    We moved, with increasing speed, into using artificial intelligence to ease our customers’ daily lives and help our employees in their work.

    In June, we launched OP Aina, a personal assistant on OP-mobile. OP Aina helps our customers with a range of banking and insurance matters on a 24/7 basis. It is the first financial service in Finland to use artificial intelligence and alerts. Our customers have eagerly adopted the service, which already had around 6.25 million service interactions by the end of 2024. We use it to provide customers with even more personalised and readily available services than before.

    Cybersecurity and well-functioning digital services are at the core of our operations

    OP Financial Group’s digital services functioned extremely well all year, despite the rapidly growing number of denial of service attacks.

    We continued our significant investments in cybersecurity to ensure that our customers’ money and data remain secure under all circumstances. Our customers were subjected to a high number of phishing and scam attempts throughout the year, and we have taken active measures to protect them even more effectively from such threats.

    OP Financial Group fulfils its corporate responsibilities as one of Finland’s largest corporate taxpayers

    OP Financial Group is of major direct and indirect importance to Finland’s economic development. In accordance with our mission, we aim to create sustainable prosperity, security and wellbeing for our owner-customers and operating region.

    Being one of Finland’s largest payers of corporate tax, we contributed almost EUR 400 million for 2023 – over 5% of all corporate tax paid in the period.

    We want to point the way towards futures filled with hope for people living in Finland. The success of Finland and all those who live here is our number one priority now and in the future.

    In good shape going into 2025

    OP Financial Group is in great shape to support its customers as the Finnish economy slowly recovers. We provide competitive banking and insurance services for a range of needs.

    My warm thanks to all our customers for the trust you have shown in OP Financial Group in 2024. We want to continue being worthy of your trust in the year that has just begun. I would also like to thank our employees and governing bodies for the excellent work they did last year.

    Timo Ritakallio
    President and Group CEO

    January–December

    OP Financial Group’s operating profit was EUR 2,486 million (2,050), up by 21.3% or EUR 436 million year on year. Income from customer business (net interest income, net commissions and fees and the insurance service result) increased by a total of 5.6% to EUR 3,805 million (3,605). The cost/income ratio improved to 46.7% (48.7). New OP bonuses accrued to owner-customers, which are included in earnings, increased by 14.0% to EUR 307 million.

    Net interest income grew by 5.3% to EUR 2,796 million. Net interest income reported by the Retail Banking segment increased by 3.5% to EUR 2,112 million and that by the Corporate Banking segment increased by 11.3% to EUR 657 million. OP Financial Group’s loan portfolio was at the previous year’s level at EUR 98.9 billion, while deposits grew by 4.3% year on year, to EUR 77.7 billion. Household deposits increased by 2.8% year on year, to EUR 47.8 billion. New loans drawn down by customers during the reporting period totalled EUR 22.2 billion (22.0).

    Impairment loss on loans and receivables, which reduces earnings, totalled EUR 96 million (269). A year ago, expected credit losses concerning the real estate and construction sector increased the impairment loss on receivables. Final credit losses totalled EUR 200 million (77). In 2024, OP Financial Group enhanced the recognition process for final credit losses. After a loan has been transferred for legal collection, the loan principal is written down to the value of collateral. During the fourth quarter, a total of EUR 125 million of such credit losses were recognised. Correspondingly, stage 3 expected credit losses reversed totalled EUR 93 million. At the end of the reporting period, loss allowance was EUR 824 million (929), of which management overlay accounted for EUR 77 million (109). Non-performing exposures accounted for 2.6% (2.9) of total exposures. Impairment loss on loans and receivables accounted for 0.1% (0.3) of the loan and guarantee portfolio.

    Net commissions and fees decreased by 6.0% to EUR 818 million. Owner-customers have received daily banking services without monthly charges since October 2023. This contributed to the decrease in payment transfer net commissions and fees. Net commissions and fees for payment transfer services decreased by EUR 56 million to

    EUR 291 million, and those for residential brokerage by EUR 6 million to EUR 63 million.

    Insurance service result increased by EUR 110 million to EUR 192 million. Insurance service result includes EUR 529 million (485) in operating expenses. Non-life insurance net insurance revenue, including the reinsurer’s share, grew by 6.1% to EUR 1,760 million. Net claims incurred after the reinsurer’s share grew by 4.4% to EUR 1,116 million. The combined ratio reported by non-life insurance improved to 92.3% (93.8).

    Investment income (net investment income, net insurance finance expenses and income from financial assets held for trading) increased by a total of 19.5% to EUR 465 million. Investment income grew as a result of the increase in the value of equity investments in particular. Net investment income together with net finance income describe investment profitability in the insurance business. The combined return on investments at fair value of OP Financial Group’s insurance companies was 7.6% (3.4).

    Net income from financial assets recognised at fair value through profit or loss, or notes and bonds, shares and derivatives, totalled EUR 1,975 million (1,706). Net income from investment contract liabilities totalled EUR 851 million (642). Net insurance finance expenses totalled EUR 727 million (722).

    In banking, net income from financial assets held for trading decreased by 19.1% to EUR 44 million due to the decrease in interest income from notes and bonds.

    Other operating income increased to EUR 44 million (40).

    Total expenses grew by 2.3% to EUR 2,262 million. Personnel costs rose by 12.1% to EUR 1,081 million. The increase was affected by headcount growth and pay increases. OP Financial Group’s personnel increased by approximately 1,000 year on year. The number of employees increased in areas such as sales, customer service, service development, risk management and compliance. Depreciation/amortisation and impairment loss on PPE and intangible assets decreased by 35.5% to EUR 146 million.

    A year ago, impairment loss recognised mainly for information systems and property in own use totalled EUR 60 million. Other operating expenses increased by 2.4% to EUR 1,036 million. ICT costs totalled EUR 514 million (460). Development costs were EUR 349 million (294) and capitalised development expenditure EUR 58 million (62). Charges of financial authorities fell by EUR 61 million to EUR 16 million. The EU’s Single Resolution Board (SRB) did not collect stability contributions from banks for 2024. In 2023, OP Financial Group paid a total of EUR 62 million in stability contributions.

    At EUR 307 million (269), OP bonuses for owner-customers are included in earnings and are divided under the following items based on their accrual: EUR 160 million (150) under interest income, EUR 82 million (67) under interest expenses, EUR 48 million (38) under commission income from mutual funds, and EUR 17 million (15) under the insurance service result.

    Income tax amounted to EUR 499 million (408). OP Financial Group paid EUR 397 million in corporate tax for 2023. The effective tax rate for the reporting period was 20.1% (19.9). Comprehensive income after tax totalled EUR 2,067 million (1,719).

    OP Financial Group’s equity amounted to EUR 18.1 billion (16.3). Equity included EUR 3.3 billion (3.3) in Profit Shares, terminated Profit Shares accounting for EUR 0.4 billion (0.4).

    OP Financial Group’s funding position and liquidity are strong. The Group’s LCR was 193% (199), and its NSFR was 129% (130).

    Outlook

    Finland’s economy contracted in 2024. However, the economy began to recover as the year progressed and preliminary figures suggest that GDP grew in the second half compared to the same period in 2023. Slower inflation and lower interest rates provide a basis for the recovery to continue. Risks associated with the economic outlook are still higher than usual. The escalation of geopolitical crises or a rise in trade barriers may affect capital markets and the economic environment.

    OP Financial Group’s operating profit for 2025 is expected to be at a good level but lower than that for 2023 and 2024.

    The most significant uncertainties affecting OP Financial Group’s earnings performance are associated with developments in the business environment, changes in the interest rate and investment environment and developments in impairment loss on receivables. All forward-looking statements in this Financial Statements Bulletin expressing the management’s expectations, beliefs, estimates, forecasts, projections and assumptions are based on the current view on developments in the economy, and actual results may differ materially from those expressed in the forward-looking statements.

    Press conference

    OP Financial Group’s financial performance will be presented to the media by President and Group Chief Executive Officer Timo Ritakallio in a press conference on 6 February 2025 at 11am at Gebhardinaukio 1, Vallila, Helsinki.

    Media enquiries: OP Corporate Communications, tel. +358 10 252 8719, viestinta@op.fi

    OP Corporate Bank plc and OP Mortgage Bank will publish their own financial statements bulletins.

    Time of publication of 2024 reports:

    Report by the Board of Directors (incl. Sustainability Report) and Financial Statements 2024 Week 11
    OP Financial Group’s Corporate Governance Statement 2024 Week 11
    OP Financial Group’s Annual Report 2024 Week 11
    OP Amalgamation Pillar 3 Disclosures 2024 Week 11
    OP Financial Group’s Remuneration Report for Governing Bodies 2024 Week 11
    Remuneration Policy for Governing Bodies at OP Financial Group Week 11

    Schedule for Interim Reports and Half-year Financial Report in 2025:

    Interim Report 1 January–31 March 2025 7 May 2025
    Half-year Financial Report 1 January–30 June 2025 30 July 2025
    Interim Report 1 January–30 September 2025 28 October 2025
    OP Amalgamation Pillar 3 Disclosures 31 March 2025 Week 19
    OP Amalgamation Pillar 3 Disclosures 30 June 2025 Week 33
    OP Amalgamation Pillar 3 Disclosures 30 September 2025 Week 45

    Helsinki, 6 February 2025

    OP Cooperative
    Board of Directors

    For additional information, please contact:

    Timo Ritakallio, President and Group CEO, tel. +358 10 252 4500
    Mikko Timonen, Chief Financial Officer, tel. +358 10 252 1325
    Piia Kumpulainen, Chief Communications Officer, tel. +358 10 252 7317

    www.op.fi 

    DISTRIBUTION 
    Nasdaq Helsinki Oy 
    Euronext Dublin (Irish Stock Exchange) 
    LSE London Stock Exchange 
    Major media
    op.fi  

    OP Financial Group is Finland’s largest financial services group, with more than two million owner-customers and over 14,000 employees. We provide a comprehensive range of banking and insurance services for personal and corporate customers. OP Financial Group consists of OP cooperative banks, its central cooperative OP Cooperative, and the latter’s subsidiaries and affiliates. Our mission is to promote the sustainable prosperity, security and wellbeing of our owner-customers and operating region. Together with our owner-customers, we have been building Finnish society and a sustainable future for 120 years now. www.op.fi

    The MIL Network

  • MIL-OSI Australia: (WIP) New industry standards for online safety: what service providers need to know

    Source: Allens Insights

    Deadline to carry out risk assessments is fast approaching 8 min read

    Certain online service providers must complete a risk assessment and implement required compliance measures by 21 June 2025. This relates to the following types of material:

    • child sexual exploitation
    • pro-terrorism
    • extreme crime and violence (Class 1A material)
    • crime and violence
    • drug-related material (Class 1B material).

    This is required by two industry standards referred to as the Phase 1 Standards:

    • Online Safety (Relevant Electronic Services)—Class 1A and Class 1B Material) Industry Standard 2024 (the RES Standard); and
    • Online Safety (Designated Internet Services—Class 1A and Class 1B Material) Industry Standard 2024 (the DIS Standard).

    In this Insight, we cover who needs to carry out a risk assessment and the obligations that two new industry standards impose.

    Key takeaways

    How did we get here?

    The Act provides for industry bodies to develop new codes to regulate Class 1 and Class 2 materials. The industry bodies (including the Communications Alliance, Australian Mobile Telecommunications Association, Digital Industry Group, and Interactive Games and Entertainment Association) adopted a two-phase approach to develop these codes.

    During phase 1, industry bodies drafted eight codes to regulate Class 1A and Class 1B material. Six of these industry codes were registered in 2023, and they apply to the following sections of the online industry: social media services, app distribution services, hosting services, internet carriage services, equipment providers and search engine services. The other two codes were not registered because the Commissioner was not satisfied that they provided appropriate community safeguards. As a result, the Commissioner developed and registered the RES Standard and DIS Standard.

    Development of the phase 2 industry codes have been underway since July 2024, with public consultation concluding on 22 November 2024. These codes are intended to deal with class 1C and class 2 materials, which includes online pornography and other high-impact material.

    Phase 1 Standards

    The Phase 1 Standards apply to two sections of the online industry—providers of RESs and DISs

    RES DIS

    A service that enables end-users in Australia to communicate with other end-users by:

    • email
    • instant messaging
    • SMS
    • MMS
    • chat services

    as well as:

    • services that enable end-users to play online games with each other; and
    • online dating services.

    Note: A service that meets the definition of a RES will be required to comply with the RES Standard, regardless of whether it also meets the definition of another industry section.5

    A service that:

    • allows end-users in Australia to access material using internet carriage services; or
    • delivers material to persons who have the appropriate equipment for receiving that material via an internet carriage service.

    Note: This is a very broad category that includes many apps and websites, as well as file and photo storage services, and some services that deploy or distribute generative artificial intelligence models.6 A DIS is expressly not:

    • a social media service;
    • a RES;
    • an on-demand program service; or
    • other specified and exempt services.7

    A service that meets the definition of a DIS will be required to comply with the DIS Standard, unless the service’s predominant purpose is more closely aligned with another industry code or industry standard.8

    The RES Standard and DIS Standard classifies certain service providers as ‘pre-assessed’ or ‘defined’ categories. A service provider that falls within either the pre-assessed or defined categories is not required to conduct its own risk assessment. Instead, it is deemed to either fall within a particular risk tier, or it has a unique risk profile such that no specific risk tier is attributed to it.

    Service providers that are not captured in the table below must conduct their own risk assessment or default to assigning the service a Tier 1 risk profile.9

    RES Standard DIS Standard

    Pre-assessed category:

    • Communication relevant electronic service
    • Gaming service with communication functionality
    • Dating service

    Pre-assessed category:

    • High impact DIS
    • Classified DIS
    • General purpose DIS
    • Enterprise DIS

    Defined category:

    • Telephony RES
    • Enterprise RES
    • Gaming service with limited communication functionality

    Defined category:

    • End-user managed hosting service
    • High impact generative AI DIS
    • Model distribution platform

    The risk assessment must be undertaken by a person with the relevant skills, experience and expertise to carry it out.10  

    The Phase 1 Standards require certain matters to be taken into account, so far as they are relevant to the service, to determine the overall risk tier for it.11 These are summarised below. Depending on the nature of a service and the context it operates in, service providers are likely to have additional risk factors to consider beyond the ones below.

    Applicability to RES or DIS Matters to be taken into account for risk assessment
    Both RES and DIS
    • Predominant purpose of the service
    • Functionality of the service12
    • Extent to which material posted on, generated by or distributed using the service will be available to end-users of the service in Australia
    • Terms of use for the service
    • Terms of arrangements under which the provider acquires content to be made available on the service
    • Ages of end-users and likely end-users of the service
    • Outcomes of the forward-looking analysis conducted under section 8(4) of the RES Standard and DIS Standard
    • Safety by design guidance and tools published or made available by a government agency or a foreign or international body
    • Risk to the online safety of end-users in Australia in relation to material generated by artificial intelligence.
    DIS only
    • Manner in which material is created or contributed to in connection with the service
    • Whether the service includes chat, messaging or other communications functionality
    • Risk that any generative AI features of the service will be used to generate high-impact materials
    • Design features and controls deployed to mitigate the risks related to material generated by AI and high-impact materials generated by generative AI features of the service

    Obligations that flow from risk assessment

    The Phase 1 Standards impose a range of obligations depending on the service provider’s risk tier arising from the risk assessment (ie Tier 1, Tier 2 or Tier 3), or the type of service it is pre-assessed or defined to be if it has a unique risk profile (eg Telephony RES, High impact generative AI DIS or dating service).

    A high-level summary of the obligations that may be applicable to certain RESs and DISs include:

    • Implement, enforce and publish relevant terms of use.
    • Ensure that there are systems in place to address circumstances where there is a breach of terms in respect of class 1A and class 1B material, including processes to report such material to an enforcement authority if it represents a serious and immediate threat to a person in Australia.
    • Implement a system for disrupting access and distribution of class 1A materials through the RES or DIS.
    • Implement a system to detect and remove class 1A materials that is accessible through the RES or DIS.
    • Implement reporting arrangements to ensure compliance with the Phase 1 Standards.
    • Ensure that features and settings that would minimise the risk of class 1A or class 1B material are incorporated before material changes are made to the service.
    • Ensure end-users can effectively control associated communication functions.
    • Implement policies, procedures and mechanisms to report or make complaints, and to respond to complaints.
    • Notify the Commissioner of proposed changes to the features and functions of the service, unless the change will not significantly increase the relevant risk.
    • Cooperate with and report to the Commissioner as required.

    What’s next?

    The Commissioner has stated that no enforcement action will be taken in the first six months of the Phase 1 Standards coming into effect, apart from in exceptional circumstances—eg in response to serious or deliberate non-compliance. The initial focus will be on working with industry bodies and service providers to raise awareness of their obligations under the Phase 1 Standards.13

    The Commissioner has a range of enforcement options under the Act to address non-compliance with the Phase 1 Standards. These include:

    • a formal warning
    • an enforceable undertaking
    • an injunction
    • an infringement notice
    • civil penalty proceedings or a court order requiring a service provider to cease its service.

    Notably, failure to comply with the Phase 1 Standards may, currently, result in a penalty of up to $49.5 million.14 Service providers should promptly take proactive measures to ensure they are complying with their obligations under the Phase 1 Standards (including conducting a risk assessment if necessary) to avoid enforcement action by the Commissioner, which may commence from 22 June 2025.

    Service providers should also be aware that new regulation of the access and exposure to class 1C and class 2 material is forthcoming. The Commissioner will undertake an assessment of whether the draft phase 2 industry codes meet the statutory requirements when they are submitted for registration, which must be no later than 28 February 2025.

    Review of Online Safety Act

    On 4 February 2025, the Government tabled the statutory review of the Online Safety Act (the Report). This independent review was initially delivered to the Government in October 2024 and makes 67 recommendations aimed at strengthening Australia’s online safety framework.

    Key recommendations in the Report include:

    • Legislating a statutory digital duty of care that is intended to place the onus on digital platforms to prevent online harms.
    • Raising the civil penalties for breaches of the Act (ie the maximum penalty to be increased to the greater of 5% of global annual turnover or $50 million).
    • Empowering the Commissioner with stronger investigative, information-gathering and enforcement powers, such as the power to require certain providers of online service to undertake compliance audits at their own expense.
    • Requiring providers of services with the greatest reach or risk to provide an annual transparency report and publish a summarised version on its website.

    There is currently no proposed legislation (or timetable for legislation) to implement the recommendations, but the Government has said it will continue to carefully consider all recommendations put forward in the Report and respond in due course. With the federal election looming, the Government’s (and Opposition’s) response to online safety reform is a key area to watch.

    MIL OSI News

  • MIL-OSI Security: Guam Man Sentenced to 10 Years in Federal Prison for Enticement of a Minor

    Source: Office of United States Attorneys

    Hagatña, Guam – SHAWN N. ANDERSON, United States Attorney for the Districts of Guam and the Northern Mariana Islands, announced that defendant Ricky Junior O. Quichocho, age 37, from Dededo, Guam, was sentenced by the U.S. District Court of Guam on February 4, 2025 to 10 years imprisonment for Attempted Enticement of a Minor, in violation of 18 U.S.C. § 2422(b).  The Court also ordered five years of supervised release following imprisonment and a mandatory $100.00 special assessment fee.  Quichocho was ordered to register with the Sex Offender Registry anywhere he resides, is employed, or is in school.

    In May of 2024, Air Force Office of Special Investigation and Homeland Security Investigations conducted a joint undercover operation to identify and target individuals who were seeking to contact and engage in sexual activity with minor children. Agents created multiple personas on several social networking applications and posted in online forums.

    On May 7, 2024, Ricky Junior O. Quichocho, a civilian employee of a military contractor, initiated contact with the undercover persona. Even though the undercover persona said she was 13 years old, Quichocho continued communication and stated he was interested in “sexual fun.” Throughout the month, Quichocho continued text messages of a sexual nature, indicating various sex acts he wanted to do with the undercover persona. On June 10, 2024, after an agreement to meet with the minor at the Anderson Air Force Base Visitor Control Center parking lot, Quichocho instead was met by Air Force Office of Special Investigations Special Agents. In a subsequent interview, Quichocho admitted to his conduct. A forensic analysis of Quichocho’s cellphone confirmed text messages and photographs sent to the undercover persona.

    “Interagency partnerships are the key to fighting child exploitation,” stated United States Attorney Anderson.  “This case is another reminder of the dangers faced by children during online activity.  We will continue to target offenders who prey on this vulnerable segment of our communities. I applaud HSI and AFOSI in bringing Quichocho to justice.”

    “HSI utilizes partnerships with agencies including AFOSI to protect our communities from child predators.  By working together, HSI ensures resources are utilized most effectively to seek out and apprehend those who intend to harm our most vulnerable community members,” said Special Agent in Charge Lucy Cabral-DeArmas.

    “AFOSI will continue to work alongside our law enforcement partners to root out criminal behavior that threatens the mission, equipment and people of the Department of the Air Force,” said Special Agent Eric Beebe, Commander of AFOSI Detachment 602. “We are dedicated to protecting our Airmen, their families, and the broader Guam community, as Operation Island Fever showcased.”

    The case was investigated by Homeland Security Investigations and Air Force Office of Special Investigations Detachment 602.

    Assistant United States Attorney Devarup Rastogi prosecuted the case in the District of Guam.

    This was a Project Safe Childhood (PSC) case, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice.  Led by U.S. Attorneys’ Offices and CEOS, PSC marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about PSC, please visit Justice.gov/PSC.

    MIL Security OSI

  • MIL-OSI: Nokia to modernize Vietnam Air Traffic Management Corporation’s communication network for improved safety

    Source: GlobeNewswire (MIL-OSI)

    Press Release

    Nokia to modernize Vietnam Air Traffic Management Corporation’s communication network for improved safety

    • Vietnam’s Air Traffic Management Corporation (VATM) will use Nokia’s multi-service network solution to upgrade its legacy network systems to enhance the performance and flexibility of its air traffic network.
    • Nokia’s trusted mission-critical Internet Protocol Multi-Protocol Label Switching (IP/MPLS) networking solution will make air traffic management more robust, and Vietnam’s airways safer.
    • Nokia Quantum-Safe Network (QSN)-ready network will provide unparalleled security and reliability to VATM.

    6 February 2025
    Hanoi, Vietnam – Nokia today announced that Vietnam Air Traffic Management Corporation (VATM) will use Nokia’s networking solution to replace the legacy Synchronous Digital Hierarchy (SDH) transport system with IP/MPLS technology to improve security and reliability in the South region of Vietnam. The new advanced transport network will support new-age applications required for operating highly reliable services to serve rapidly growing air traffic in Vietnam.

    The initiative will provide an advanced transmission system to Ho Chi Minh City’s Air Traffic Control Center (ATCC), which will deliver mission critical applications to enhance Air Traffic Control (ATC). The newly upgraded transport network, compliant with the International Civil Aviation Organization’s standard will be operational in the second quarter of 2025.

    Nokia’s solution will provide VATM with advanced network capabilities such as advanced analytics, simplifying operations and improving network performance. The IP/MPLS network also offers increased flexibility and programmability, supporting critical applications that enhance overall air traffic management efficiency and safety. The network will equip VATM with robust security features and the ability to evolve to defend against quantum threats.

    Ho Sy Tung, Deputy General Director at VATM, said: “Air traffic networks need to be exceptionally secure and reliable at all times to ensure the highest standards of safety are met. Nokia comes with extensive experience in air navigation with 20 air traffic control networks deployed worldwide. We are impressed by the quality and performance of Nokia’s IP/MPLS networking solution and are looking forward to the successful completion of this crucial initiative in the coming year.”

    Nguyen Van Nam, General Director at ANSV – Advanced Network System Vietnam, said: “ANSV is proud to be selected as prime contractor for tender package CP-17. Together with other critical systems, we will provide a new Nokia IP/MPLS network replacing the existing SDH networks for air navigation systems.”

    Jonathan Goh, Head of Enterprise Business, Network Infrastructure, Southeast Asia North at Nokia, said: “Our mission-critical network solutions are trusted worldwide, delivering exceptional performance and reliability. With embedded QSN capabilities, Nokia’s IP/MPLS technology will enhance the safety and operational efficiency of Vietnam’s air traffic network. We are honored that VATM has chosen Nokia for this pivotal network transformation, paving the way for safer, more advanced and reliable air traffic management across Vietnam.”

    Resources and additional information
    Product page: 7705 Service Aggregation Router
    Product page: 7750 Service Router
    Product page: 7250 Interconnect Routers
    Product page: Network Services Platform
    Product page: Converged IP/MPLS for Aviation

    About Nokia
    At Nokia, we create technology that helps the world act together. 

    As a B2B technology innovation leader, we are pioneering networks that sense, think and act by leveraging our work across mobile, fixed and cloud networks. In addition, we create value with intellectual property and long-term research, led by the award-winning Nokia Bell Labs.  

    With truly open architectures that seamlessly integrate into any ecosystem, our high-performance networks create new opportunities for monetization and scale. Service providers, enterprises and partners worldwide trust Nokia to deliver secure, reliable and sustainable networks today – and work with us to create the digital services and applications of the future.

    Media inquiries
    Nokia Communications, Southeast Asia North
    Email: takayuki.omino@nokia.com

    Nokia Press Office
    Email: Press.Services@nokia.com

    Follow us on social media
    LinkedIn X Instagram Facebook YouTube

    The MIL Network

  • MIL-OSI Security: Texas man arrested for possessing child pornography while working as school bus driver in Fairbanks

    Source: Office of United States Attorneys

    The FBI is seeking additional information.

    FAIRBANKS, Alaska – A Texas man was arrested early this week on criminal charges related to his alleged possession of child pornography while temporarily working in Fairbanks.

    According to court documents, in December 2024, the Fairbanks Police Department (FPD) received information that a USB drive found in the business center of a Fairbanks hotel allegedly contained child sexual abuse materials (CSAM).

    FPD provided the USB drive to the FBI Anchorage Field Office to process for forensic review. On Jan. 30, 2025, federal agents successfully imaged and extracted the USB drive and found information linking it to Scott O’Toole, 60, of Joshua, Texas. Agents also found images on the drive allegedly depicting child sexual abuse. Within 24 hours of the FBI’s review of the USB drive, law enforcement identified and located O’Toole in Texas, and arrested him shortly thereafter.

    Court documents further allege that federal agents learned O’Toole was on Temporary Duty Assignment (TDY) to Fairbanks as a school bus driver between November and December 2024, and that he stayed at the hotel where the USB drive was found. Shortly after the USB drive was discovered, O’Toole returned to Texas.

    O’Toole is currently charged with one count of possession of child pornography in the District of Alaska. If convicted, O’Toole faces up to 20 years in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    First Assistant U.S. Attorney Kate Vogel of the District of Alaska and Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office made the announcement.

    The FBI Anchorage Field Office is investigating the case, with assistance from FPD and the Texas State Troopers. If anyone has information concerning O’Toole’s alleged actions in Alaska, please contact the FBI Anchorage Field Office at (907) 276-4441 or anonymously at tips.fbi.gov.

    Assistant U.S. Attorney Adam Alexander is prosecuting the case. The United States Attorney’s Office for the District of Alaska thanks their colleagues in the Eastern District of Texas for their coordination on this case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by U.S. Attorneys’ Offices, Project Safe Childhood combines federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    A criminal complaint is merely an allegation, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    ###

    MIL Security OSI

  • MIL-OSI Security: Distributor of Child Sexual Abuse Material Sentenced to 20 Years in Prison

    Source: Office of United States Attorneys

    MIAMI – A West Palm Beach federal judge has sentenced 38-year-old Texas man James William Latta to 20 years in prison followed by 25 years supervised release for advertising and distributing child sexual abuse material (CSAM) through social media. 

    During the summer of 2024, Latta used a social networking application to communicate with a person he believed was the mother of an eight-year-old child. Latta sent sexually explicit videos of himself during the exchanges and asked about sex between the mother and child. Latta also created and operated chat rooms on the social networking application through which he distributed CSAM. In one chatroom – with dozens of members – Latta distributed CSAM more than 200 times over two months, posting a hyperlink to a website with more than 3,000 images and videos of CSAM. Latta was identified and arrested in Texas. After his arrest, he was transferred to the Southern District of Florida, where he pled guilty.

    In addition to imposing prison and supervised release terms, District Judge Donald M. Middlebrooks ordered Latta to register as a sex offender. A hearing will be scheduled to determine the amount of restitution Latta must pay his victims. 

    U.S. Attorney Hayden O’Byrne for the Southern District of Florida and Acting Special Agent in Charge Jose R. Figueroa of HSI Miami made the announcement.

    HSI West Palm Beach investigated the case. Assistant U.S. Attorney Gregory Schiller is prosecuting it. 

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse, launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov or https://www.justice.gov/usao-sdfl/project-safe-childhood.

    Anyone with information regarding child sexual exploitation and abuse is encouraged to call (877) 4-HSI-TIP [(877) 447-4847].

    Related court documents and information may be found on the website of the District Court for the Southern District of Florida at www.flsd.uscourts.gov or at http://pacer.flsd.uscourts.gov under case number 24-cr-80115.

    ###

    MIL Security OSI

  • MIL-OSI Security: Air Force Member Sentenced to 96 Months for Possession of Child Pornography

    Source: Office of United States Attorneys

    United States Attorney Susan T. Lehr announced that Kyle J. Logan, age 25, of Safety Harbor, Florida was sentenced on January 30, 2025, in federal court in Omaha, Nebraska for possession of child pornography. United States District Judge Brian C. Buescher sentenced Logan to 96 months’ imprisonment. There is no parole in the federal system. After his release from prison, Logan will be placed on a 5-year term of supervised release. Logan was also ordered to pay special assessments of $5,000.00 under each of the Justice for Victims of Trafficking Act (JVTA) and the Amy, Vicky, and Andy Child Pornography Victim Assistance Act (AVAA).

    This investigation began in April 2023, when a minor victim living in West Virginia, contacted her local police to report she met an Air Force member, Logan, while playing Call of Duty online. The minor reported she had been in a relationship with Logan, which started after meeting him on the gaming platform and communicating with him on Discord. The minor reported being twelve years old at the time she began speaking to Logan. During the communication with Logan, their conversations turned sexual, and the minor disclosed Logan requested she send sexually explicit pictures of herself to Logan, which she did. 

    The United States Air Force Office of Special Investigations (AFOSI) opened an investigation into Logan who was stationed at Offutt Air Force Base, Nebraska, and ultimately interviewed Logan about his conduct with the minor. Logan admitted to knowing the minor was fifteen years old and requesting and receiving sexually explicit photos of the minor. AFOSI obtained search warrants for Logan’s Discord account and electronic devices. The searches revealed Logan possessed videos and images of the minor who initially reported Logan, as well as images and videos of a second victim. Ultimately, Logan was held accountable for possessing a total of 14 videos and 119 images of child pornography.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by United States Attorney’s Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    This case was investigated by the Air Force Office of Special Investigations. 

    MIL Security OSI

  • MIL-OSI: FormFactor, Inc. Reports 2024 Fourth Quarter Results

    Source: GlobeNewswire (MIL-OSI)

    FY24 revenue of $764 million, up 15.2% from $663 million in FY23, driven by growth in HBM revenue;
    Announces acquisition of minority interest in FICT Limited, a key supplier of industry-leading, high-performance advanced probe card components

    LIVERMORE, Calif., Feb. 05, 2025 (GLOBE NEWSWIRE) — FormFactor, Inc. (Nasdaq: FORM) today announced its financial results for the fourth quarter of fiscal 2024 ended December 28, 2024. Quarterly revenues were $189.5 million, a decrease of 8.9% compared to $207.9 million in the third quarter of fiscal 2024, and an increase of 12.7% from $168.2 million in the fourth quarter of fiscal 2023. For fiscal 2024, FormFactor recorded revenues of $764 million, up 15.2% from $663 million in fiscal 2023.

    • High Bandwidth Memory grew fourfold in fiscal 2024 compared to the prior year, driven by adoption of Generative AI, overcoming persistent lackluster demand in important high-unit-volume markets like PCs and mobile handsets.
    • DRAM probe-card revenue during the fourth quarter set third consecutive quarterly record.
    • Continued focus on expanding and diversifying FormFactor’s market position in enabling advanced packaging, through new customer qualifications in client PCs and server applications and new high-performance-compute applications.
    • FICT acquisition with MBK Partners solidifies FormFactor’s access to FICT’s technologies and products, which are an important component of advanced probe cards.

    “As expected, FormFactor reported sequentially lower fourth-quarter revenue, gross margin, and non-GAAP earnings per share, driven by the forecasted reduction in Foundry & Logic probe-card revenue,” said Mike Slessor, CEO of FormFactor, Inc. “This was partially offset by growth in DRAM probe-card revenue, with HBM increasing to approximately half of DRAM revenue.”

    FormFactor also announced today that together with MBK Partners (“MBKP”), the largest private equity firm in North Asia, it is acquiring FICT Limited (“FICT”) from Advantage Partners Inc. FICT, headquartered in Nagano, Japan, has been providing the semiconductor test and high-performance computing industries with complex multi-layer organic substrates, printed circuit boards, and related leading-edge technologies and services since its inception as a Fujitsu business unit in 1967. This acquisition is designed to strengthen and grow FICT’s business, and the FormFactor+MBKP consortium is committed to advancing FICT’s mission to serve its entire customer base.

    With this transaction, FormFactor invests approximately US$60M into the consortium. FormFactor will hold a minority, non-controlling stake of 20% and will be granted a seat on the company’s board of directors. All required regulatory and third-party approvals and conditions have been satisfied and the transaction is expected to close within the current quarter. The transaction is not expected to have a material impact on FormFactor’s results of operations.

    “The semiconductor industry’s rapidly accelerating adoption of advanced packaging requires increased investment and stronger collaboration across the test and assembly supply chain,” said Mike Slessor, FormFactor’s CEO. “FormFactor’s investment in FICT builds on our long-term collaboration with them as a supplier of the industry-leading, high-performance components we use in our advanced probe cards, and provides a platform for accelerated development of tomorrow’s test and packaging consumables.”

    “We’ve built a partnership with MBKP, North Asia’s leading private equity firm, with a shared vision to enhance FICT’s long-term value by fully serving all of FICT’s existing and potential customers,” Slessor concluded.

    Fourth Quarter and Fiscal 2024 Highlights

    On a GAAP basis, net income for the fourth quarter of fiscal 2024 was $9.7 million, or $0.12 per fully-diluted share, compared to net income for the third quarter of fiscal 2024 of $18.7 million, or $0.24 per fully-diluted share, and net income for the fourth quarter of fiscal 2023 of $75.8 million, or $0.97 per fully-diluted share. Net income for fiscal 2024 was $69.6 million, or $0.89 per fully-diluted share, compared to net income for fiscal 2023 of $82.4 million, or $1.05, per fully-diluted share. Gross margin for the fourth quarter of 2024 was 38.8%, compared with 40.7% in the third quarter of 2024, and 40.4% in the fourth quarter of 2023. Gross margin for fiscal 2024 was 40.3%, compared to 39.0% for fiscal 2023. The GAAP financial results for the fourth quarter of 2023 and fiscal 2023 include a $73.0 million gain from the sale of FRT that has been excluded from FormFactor’s fourth quarter and fiscal 2023 non-GAAP results. The GAAP financial results for fiscal 2024 include a $20.3 million gain from the sale of our China operations that has been excluded from FormFactor’s fiscal 2024 non-GAAP results.

    On a non-GAAP basis, net income for the fourth quarter of fiscal 2024 was $21.3 million, or $0.27 per fully-diluted share, compared to net income for the third quarter of fiscal 2024 of $27.2 million, or $0.35 per fully-diluted share, and net income for the fourth quarter of fiscal 2023 of $15.7 million, or $0.20 per fully-diluted share. Non-GAAP net income for fiscal 2024 was $90.2 million, or $1.15 per fully-diluted share, compared to net income of $56.8 million, or $0.73 per fully-diluted share for fiscal 2023. On a non-GAAP basis, gross margin for the fourth quarter of 2024 was 40.2%, compared with 42.2% in the third quarter of 2024, and 42.1% in the fourth quarter of 2023. Non-GAAP gross margin for fiscal 2024 was 41.7%, compared to 40.7% for fiscal 2023.

    A reconciliation of GAAP to non-GAAP measures is provided in the schedules included below.

    GAAP net cash provided by operating activities for the fourth quarter of fiscal 2024 was $35.9 million, compared to $26.7 million for the third quarter of fiscal 2024, and $9.3 million for the fourth quarter of fiscal 2023. Free cash flow for the fourth quarter of fiscal 2024 was $28.8 million, compared to free cash flow for the third quarter of fiscal 2024 of $20.0 million, and free cash flow for the fourth quarter of 2023 of negative $0.3 million. GAAP net cash provided by operating activities for fiscal 2024 was $117.5 million, compared to $64.6 million for fiscal 2023. Free cash flow for fiscal 2024 and fiscal 2023 was $82.8 million and $11.4 million, respectively. A reconciliation of net cash provided by operating activities to non-GAAP free cash flow is provided in the schedules included below.

    Outlook

    Dr. Slessor added, “We continue to see slow demand in important high-unit-volume markets, like client PCs and mobile handsets, through the first quarter, with anticipated sequential reductions in demand for both non-HBM DRAM probe cards and Systems. That notwithstanding, as we move through 2025, we expect an overall increase in demand for FormFactor’s products.”

    For the first quarter ending March 29, 2025, FormFactor is providing the following outlook*:

        GAAP   Reconciling Items**   Non-GAAP
    Revenue   $170 million +/- $5 million     $170 million +/- $5 million
    Gross Margin   36.5% +/- 1.5%   $3 million   38% +/- 1.5%
    Net income per diluted share   $0.07 +/- $0.04   $0.12   $0.19 +/- $0.04

    *This outlook assumes consistent foreign currency rates.
    **Reconciling items are stock-based compensation, amortization of intangible assets and fixed asset fair value adjustments due to acquisitions, and restructuring charges, net of applicable income tax impacts.

    We posted our revenue breakdown by geographic region, by market segment and with customers with greater than 10% of total revenue on the Investor Relations section of our website at www.formfactor.com. We will conduct a conference call at 1:25 p.m. PT, or 4:25 p.m. ET, today.

    The public is invited to listen to a live webcast of FormFactor’s conference call on the Investor Relations section of our website at www.formfactor.com. A telephone replay of the conference call will be available approximately two hours after the conclusion of the call. The replay will be available on the Investor Relations section of our website, www.formfactor.com.

    Use of Non-GAAP Financial Information:

    To supplement our condensed consolidated financial results prepared under generally accepted accounting principles, or GAAP, we disclose certain non-GAAP measures of non-GAAP net income, non-GAAP net income per basic and diluted share, non-GAAP gross profit, non-GAAP gross margin, non-GAAP operating expenses, non-GAAP operating income and free cash flow, that are adjusted from the nearest GAAP financial measure to exclude certain costs, expenses, gains and losses. Reconciliations of the adjustments to GAAP results for the three and twelve months ended months ended December 28, 2024, and for outlook provided before, as well as for the comparable periods of fiscal 2023, are provided below, and on the Investor Relations section of our website at www.formfactor.com. Information regarding the ways in which management uses non-GAAP financial information to evaluate its business, management’s reasons for using this non-GAAP financial information, and limitations associated with the use of non-GAAP financial information, is included under “About our Non-GAAP Financial Measures” following the tables below.

    About FormFactor:

    FormFactor, Inc. (NASDAQ: FORM), is a leading provider of essential test and measurement technologies along the full semiconductor product life cycle – from characterization, modeling, reliability, and design de-bug, to qualification and production test. Semiconductor companies rely upon FormFactor’s products and services to accelerate profitability by optimizing device performance and advancing yield knowledge. The Company serves customers through its network of facilities in Asia, Europe, and North America. For more information, visit the Company’s website at www.formfactor.com.

    Forward-looking Statements:

    This press release contains forward-looking statements within the meaning of the “safe harbor” provisions of the federal securities laws, including with respect to the Company’s future financial and operating results, and the Company’s plans, strategies and objectives for future operations. These statements are based on management’s current expectations and beliefs as of the date of this release, and are subject to a number of risks and uncertainties, many of which are beyond the Company’s control, that could cause actual results to differ materially from those described in the forward-looking statements. These forward-looking statements include, but are not limited to, statements regarding future financial and operating results, including under the heading “Outlook” above, customer demand, conditions in the semiconductor industry, the timing of completion of the FICT acquisition, the expected benefit thereof and other statements regarding the Company’s business. Forward-looking statements may contain words such as “may,” “might,” “will,” “expect,” “plan,” “anticipate,” “forecast,” and “continue,” the negative or plural of these words and similar expressions, and include the assumptions that underlie such statements. The following factors, among others, could cause actual results to differ materially from those described in the forward-looking statements: changes in demand for the Company’s products; customer-specific demand; market opportunity; anticipated industry trends; delays in the consummation of the FICT acquisition; the potential impact on the business of FormFactor and FICT due to uncertainties in connection with the acquisition; the retention of employees of FICT following acquisition; the ability of FormFactor to achieve expected benefits from the FICT acquisition; the availability, benefits, and speed of customer acceptance or implementation of new products and technologies; manufacturing, processing, and design capacity, goals, expansion, volumes, and progress; difficulties or delays in research and development; industry seasonality; risks to the Company’s realization of benefits from acquisitions, investments in capacity and investments in new electronic data systems and information technology; reliance on customers or third parties (including suppliers); changes in macro-economic environments; events affecting global and regional economic and market conditions and stability such as military conflicts, political volatility, infectious diseases and pandemics, and similar factors, operating separately or in combination; and other factors, including those set forth in the Company’s most current annual report on Form 10-K, quarterly reports on Form 10-Q and other filings by the Company with the U.S. Securities and Exchange Commission. In addition, there are varying barriers to international trade, including restrictive trade and export regulations such as the US-China restrictions, dynamic tariffs, trade disputes between the U.S. and other countries, and national security developments or tensions, that may substantially restrict or condition our sales to or in certain countries, increase the cost of doing business internationally, and disrupt our supply chain. No assurances can be given that any of the events anticipated by the forward-looking statements within this press release will transpire or occur, or if any of them do so, what impact they will have on the results of operations or financial condition of the Company. Unless required by law, the Company is under no obligation (and expressly disclaims any such obligation) to update or revise its forward-looking statements whether as a result of new information, future events, or otherwise.

     
    FORMFACTOR, INC. 
    CONDENSED CONSOLIDATED STATEMENTS OF INCOME
    (In thousands, except per share amounts)
    (Unaudited)
     
      Three Months Ended   Twelve Months Ended
      December 28,
    2024
      September 28,
    2024
      December 30,
    2023
      December 28,
    2024
      December 30,
    2023
    Revenues $ 189,483     $ 207,917     $ 168,163     $ 763,599     $ 663,102  
    Cost of revenues   115,903       123,212       100,229       455,676       404,522  
    Gross profit   73,580       84,705       67,934       307,923       258,580  
    Operating expenses:                  
    Research and development   30,504       31,243       28,166       121,938       115,765  
    Selling, general and administrative   35,226       35,607       31,451       141,786       133,012  
    Total operating expenses   65,730       66,850       59,617       263,724       248,777  
    Gain on sale of business               72,953       20,581       72,953  
    Operating income   7,850       17,855       81,270       64,780       82,756  
    Interest income, net   3,472       3,650       2,376       13,693       6,796  
    Other income (expense), net   617       (558 )     (1,546 )     939       (285 )
    Income before income taxes   11,939       20,947       82,100       79,412       89,267  
    Provision for income taxes   2,234       2,211       6,254       9,798       6,880  
    Net income $ 9,705     $ 18,736     $ 75,846     $ 69,614     $ 82,387  
    Net income per share:                  
    Basic $ 0.13     $ 0.24     $ 0.98     $ 0.90     $ 1.06  
    Diluted $ 0.12     $ 0.24     $ 0.97     $ 0.89     $ 1.05  
    Weighted-average number of shares used in per share calculations:                
    Basic   77,267       77,406       77,684       77,340       77,370  
    Diluted   77,982       78,439       78,410       78,437       78,159  
     
    FORMFACTOR, INC. 
    NON-GAAP FINANCIAL MEASURE RECONCILIATIONS
    (In thousands, except per share amounts)
    (Unaudited)
     
      Three Months Ended   Twelve Months Ended
      December 28,
    2024
      September 28,
    2024
      December 30,
    2023
      December 28,
    2024
      December 30,
    2023
    GAAP Gross Profit $ 73,580     $ 84,705     $ 67,934     $ 307,923     $ 258,580  
    Adjustments:                  
    Amortization of intangibles, inventory and fixed asset fair value adjustments due to acquisitions   555       530       756       2,216       4,336  
    Stock-based compensation   1,944       1,934       2,053       7,738       6,854  
    Restructuring charges   32       524             639       357  
    Non-GAAP Gross Profit $ 76,111     $ 87,693     $ 70,743     $ 318,516     $ 270,127  
                       
    GAAP Gross Margin   38.8 %     40.7 %     40.4 %     40.3 %     39.0 %
    Adjustments:                  
    Amortization of intangibles, inventory and fixed asset fair value adjustments due to acquisitions   0.4 %     0.3 %     0.5 %     0.3 %     0.6 %
    Stock-based compensation   1.0 %     0.9 %     1.2 %     1.0 %     1.0 %
    Restructuring charges   %     0.3 %     %     0.1 %     0.1 %
    Non-GAAP Gross Margin   40.2 %     42.2 %     42.1 %     41.7 %     40.7 %
                       
    GAAP operating expenses $ 65,730     $ 66,850     $ 59,617     $ 263,724     $ 248,777  
    Adjustments:                  
    Amortization of intangibles and other   (191 )     (191 )     (518 )     (764 )     (4,081 )
    Stock-based compensation   (8,269 )     (7,002 )     (7,230 )     (32,025 )     (31,762 )
    Restructuring charges   (371 )     (298 )           (767 )     (1,183 )
    Costs related to sale and acquisition of businesses   (1,689 )     (13 )     (268 )     (2,391 )     (2,407 )
    Non-GAAP operating expenses $ 55,210     $ 59,346     $ 51,601     $ 227,777     $ 209,344  
                       
    GAAP operating income $ 7,850     $ 17,855     $ 81,270     $ 64,780     $ 82,756  
    Adjustments:                  
    Amortization of intangibles, inventory and fixed asset fair value adjustments due to acquisitions, and other   746       721       1,274       2,980       8,417  
    Stock-based compensation   10,213       8,936       9,283       39,763       38,616  
    Restructuring charges   403       822             1,406       1,540  
    Gain on sale of business, net of cost related to sale and acquisition of businesses   1,689       13       (72,685 )     (18,190 )     (70,546 )
    Non-GAAP operating income $ 20,901     $ 28,347     $ 19,142     $ 90,739     $ 60,783  
     
    FORMFACTOR, INC. 
    NON-GAAP FINANCIAL MEASURE RECONCILIATIONS
    (In thousands, except per share amounts)
    (Unaudited)
     
      Three Months Ended   Twelve Months Ended
      December 28,
    2024
      September 28,
    2024
      December 30,
    2023
      December 28,
    2024
      December 30,
    2023
    GAAP net income $ 9,705     $ 18,736     $ 75,846     $ 69,614     $ 82,387  
    Adjustments:                  
    Amortization of intangibles, inventory and fixed asset fair value adjustments due to acquisitions, and other   746       721       1,274       2,980       8,417  
    Stock-based compensation   10,213       8,936       9,283       39,763       38,616  
    Restructuring charges   415       822             1,418       1,540  
    Gain on sale of business, net of cost related to sale and acquisition of businesses   1,689       13       (72,685 )     (18,190 )     (70,546 )
    Income tax effect of non-GAAP adjustments   (1,445 )     (2,002 )     2,026       (5,368 )     (3,624 )
    Non-GAAP net income $ 21,323     $ 27,226     $ 15,744     $ 90,217     $ 56,790  
                       
    GAAP net income per share:                  
    Basic $ 0.13     $ 0.24     $ 0.98     $ 0.90     $ 1.06  
    Diluted $ 0.12     $ 0.24     $ 0.97     $ 0.89     $ 1.05  
                       
    Non-GAAP net income per share:                  
    Basic $ 0.28     $ 0.35     $ 0.20     $ 1.17     $ 0.73  
    Diluted $ 0.27     $ 0.35     $ 0.20     $ 1.15     $ 0.73  
     
    FORMFACTOR, INC. 
    CONDENSED CONSOLIDATED STATEMENTS OF CASH FLOWS
    (In thousands)
    (Unaudited)
     
      Twelve Months Ended
      December 28,
    2024
      December 30,
    2023
    Cash flows from operating activities:      
    Net income $ 69,614     $ 82,387  
    Selected adjustments to reconcile net income to net cash provided by operating activities:      
    Depreciation   30,321       30,603  
    Amortization   2,582       6,850  
    Stock-based compensation expense   39,763       38,616  
    Provision for excess and obsolete inventories   12,342       15,003  
    Gain on sale of business   (20,581 )     (72,953 )
    Non-cash restructuring charges   428        
    Other activity impacting operating cash flows   (16,507 )     (35,904 )
    Net cash provided by operating activities   117,534       64,602  
    Cash flows from investing activities:      
    Acquisition of property, plant and equipment   (38,436 )     (56,027 )
    Proceeds from sale of business   21,585       101,785  
    Purchases of marketable securities, net   (15,129 )     (16,709 )
    Purchase of promissory note receivable   (1,500 )      
    Net cash provided by (used in) investing activities   (33,480 )     29,049  
    Cash flows from financing activities:      
    Purchase of common stock through stock repurchase program   (53,302 )     (19,801 )
    Proceeds from issuances of common stock   9,748       8,822  
    Principal repayments on term loans   (1,075 )     (1,045 )
    Tax withholdings related to net share settlements of equity awards   (19,983 )     (10,687 )
    Net cash used in financing activities   (64,612 )     (22,711 )
    Effect of exchange rate changes on cash, cash equivalents and restricted cash   (3,509 )     (2,649 )
    Net increase in cash, cash equivalents and restricted cash   15,933       68,291  
    Cash, cash equivalents and restricted cash, beginning of period   181,273       112,982  
    Cash, cash equivalents and restricted cash, end of period $ 197,206     $ 181,273  
     
    FORMFACTOR, INC. 
    RECONCILIATION OF CASH PROVIDED BY OPERATING ACTIVITIES TO NON-GAAP FREE CASH FLOW
    (In thousands)
    (Unaudited)
     
      Three Months Ended   Twelve Months Ended
      December 28,
    2024
      September 28,
    2024
      December 30,
    2023
      December 28,
    2024
      December 30,
    2023
    Net cash provided by operating activities $ 35,913     $ 26,731     $ 9,250     $ 117,534     $ 64,602  
    Adjustments:                  
    Sale of business and acquisition related payments in working capital   506       2,134       268       3,317       2,407  
    Cash paid for interest   93       97       105       391       422  
    Capital expenditures   (7,663 )     (8,939 )     (9,933 )     (38,436 )     (56,027 )
    Free cash flow $ 28,849     $ 20,023     $ (310 )   $ 82,806     $ 11,404  

     

     
    FORMFACTOR, INC.
    CONDENSED CONSOLIDATED BALANCE SHEETS
    (In thousands)
    (Unaudited)
     
        December 28,
    2024
      September 28,
    2024
      December 30,
    2023
    ASSETS            
    Current assets:            
    Cash and cash equivalents   $ 190,728     $ 184,506     $ 177,812  
    Marketable securities     169,295       169,961       150,507  
    Accounts receivable, net of allowance for credit losses     104,294       116,866       102,957  
    Inventories, net     101,676       105,374       111,685  
    Restricted cash     3,746       3,773       1,152  
    Prepaid expenses and other current assets     35,389       34,302       29,667  
    Total current assets     605,128       614,782       573,780  
    Restricted cash     2,732       2,210       2,309  
    Operating lease, right-of-use-assets     22,579       25,034       30,519  
    Property, plant and equipment, net of accumulated depreciation     210,230       204,108       204,399  
    Goodwill     199,171       200,137       201,090  
    Intangibles, net     10,355       11,017       12,938  
    Deferred tax assets     92,012       92,826       78,964  
    Other assets     4,008       3,669       2,795  
    Total assets   $ 1,146,215     $ 1,153,783     $ 1,106,794  
                 
    LIABILITIES AND STOCKHOLDERS’ EQUITY            
    Current liabilities:            
    Accounts payable   $ 62,287     $ 52,086     $ 63,857  
    Accrued liabilities     43,742       46,508       41,037  
    Current portion of term loan, net of unamortized issuance costs     1,106       1,098       1,075  
    Deferred revenue     15,847       20,972       16,704  
    Operating lease liabilities     8,363       8,512       8,422  
    Total current liabilities     131,345       129,176       131,095  
    Term loan, less current portion, net of unamortized issuance costs     12,208       12,488       13,314  
    Long-term operating lease liabilities     17,550       19,731       25,334  
    Deferred grant     18,000       18,000       18,000  
    Other liabilities     19,344       19,378       10,247  
    Total liabilities     198,447       198,773       197,990  
                 
    Stockholders’ equity:            
    Common stock     77       77       77  
    Additional paid-in capital     837,586       845,466       861,448  
    Accumulated other comprehensive loss     (10,840 )     (1,773 )     (4,052 )
    Accumulated income     120,945       111,240       51,331  
    Total stockholders’ equity     947,768       955,010       908,804  
    Total liabilities and stockholders’ equity   $ 1,146,215     $ 1,153,783     $ 1,106,794  

    About our Non-GAAP Financial Measures:

    We believe that the presentation of non-GAAP net income, non-GAAP net income per basic and diluted share, non-GAAP gross profit, non-GAAP gross margin, non-GAAP operating expenses, non-GAAP operating income and free cash flow provides supplemental information that is important to understanding financial and business trends and other factors relating to our financial condition and results of operations. Non-GAAP net income, non-GAAP net income per basic and diluted share, non-GAAP gross profit, non-GAAP gross margin, non-GAAP operating expenses, and non-GAAP operating income are among the primary indicators used by management as a basis for planning and forecasting future periods, and by management and our board of directors to determine whether our operating performance has met certain targets and thresholds. Management uses non-GAAP net income, non-GAAP net income per basic and diluted share, non-GAAP gross profit, non-GAAP gross margin, non-GAAP operating expenses, and non-GAAP operating income when evaluating operating performance because it believes that the exclusion of the items indicated herein, for which the amounts or timing may vary significantly depending upon our activities and other factors, facilitates comparability of our operating performance from period to period. We use free cash flow to conduct and evaluate our business as an additional way of viewing our liquidity that, when viewed with our GAAP results, provides a more complete understanding of factors and trends affecting our cash flows. Many investors also prefer to track free cash flow, as opposed to only GAAP earnings. Free cash flow has limitations due to the fact that it does not represent the residual cash flow available for discretionary expenditures, and therefore it is important to view free cash flow as a complement to our entire consolidated statements of cash flows. We have chosen to provide this non-GAAP information to investors so they can analyze our operating results closer to the way that management does, and use this information in their assessment of our business and the valuation of our Company. We compute non-GAAP net income, non-GAAP net income per basic and diluted share, non-GAAP gross profit, non-GAAP gross margin, non-GAAP operating expenses, and non-GAAP operating income, by adjusting GAAP net income, GAAP net income per basic and diluted share, GAAP gross profit, GAAP gross margin, GAAP operating expenses, and GAAP operating income to remove the impact of certain items and the tax effect, if applicable, of those adjustments. These non-GAAP measures are not in accordance with, or an alternative to, GAAP, and may be materially different from other non-GAAP measures, including similarly titled non-GAAP measures used by other companies. The presentation of this additional information should not be considered in isolation from, as a substitute for, or superior to, net income, net income per basic and diluted share, gross profit, gross margin, operating expenses, or operating income in accordance with GAAP. Non-GAAP financial measures have limitations in that they do not reflect certain items that may have a material impact upon our reported financial results. We may expect to continue to incur expenses of a nature similar to the non-GAAP adjustments described above, and exclusion of these items from our non-GAAP net income, non-GAAP net income per basic and diluted share, non-GAAP gross profit, non-GAAP gross margin, non-GAAP operating expenses, and non-GAAP operating income should not be construed as an inference that these costs are unusual, infrequent or non-recurring. For more information on the non-GAAP adjustments, please see the table captioned “Non-GAAP Financial Measure Reconciliations” and “Reconciliation of Cash Provided by Operating Activities to non-GAAP Free Cash Flow” included in this press release.

    Source: FormFactor, Inc.
    FORM-F

    Investor Contact:
    Stan Finkelstein
    Investor Relations
    (925) 290-4273
    ir@formfactor.com

    The MIL Network

  • MIL-OSI Economics: From bottlenecks to breakthroughs: Obeikan’s AI‑powered journey

    Source: Microsoft

    Headline: From bottlenecks to breakthroughs: Obeikan’s AI‑powered journey

    Al-Obeikan hired Tarik Taman, an American with a long history of executive management in software companies, to be general manager of the new O3ai startup. What convinced Taman to take the job was that he could not find anything else like it on the market: a complete smart factory platform underpinned by a guiding philosophy – the Lean management system.

    “Lean transformations drive value, always,” he said. “Automated lean transformations drive even more value, because it’s easier to adopt, easier to track, easier to sustain and easier to optimize because it’s all digital.”

    He said that was evident in the results O3ai achieved at Obeikan – in four years it went from a $750 million company to a $1 billion company with a greatly improved bottom line and better employee engagement.

    Taman said that even though O3ai emerged from a long-established family company, it has many of the virtues of a startup, thanks to the vision of Al-Obeikan.

    “We really have had the good fortune to have something called last-mover advantage,” he said. “We’re one of the first software platforms in our space where the first line of code was written in the 2020s, so we don’t have 10- and 20-year-old legacy code that we’re trying to rewrite the logic of constantly.”

    He credits the partnership with Microsoft for providing an extra competitive advantage.

    “Because we partnered with Microsoft from day one, because we’ve used all of the infrastructure and service that Azure has to offer, we get to move at higher speed as compared to legacy software.”

    Taman said that O3ai started by using machine learning in Azure, but it quickly adopted Azure OpenAI Service and Microsoft Copilot when they became available. O3ai created its own chatbot that digests and interprets all the data that is constantly being produced by the machines on production lines. Each machine is equipped with a system of sensors that feeds data into O3ai — that system is known as IoT, or the Internet of Things.

    MIL OSI Economics

  • MIL-OSI Security: Bible Hill — Bible Hill man charged with child pornography offences

    Source: Royal Canadian Mounted Police

    The RCMP’s Provincial Internet Child Exploitation (ICE) Unit has charged a Bible Hill man with child pornography offences.

    On December 12, 2024, the ICE Unit and Digital Forensic Services, assisted by Colchester County District RCMP, searched a home on Pictou Rd. and seized electronic evidence.

    Investigators were directed to the residence after an electronic service provider notified law enforcement that child pornography was being shared using their service.

    As a result of the search and subsequent investigation, 48-year-old Adam Franklin was arrested on February 4. He’s been charged with Transmitting Child Pornography and Possessing Child Pornography (two counts).

    Franklin, who’s also facing a previous charge of Invitation to Sexual Touching, was released by the courts on conditions. He’s scheduled to appear in Truro Provincial Court on March 12.

    In Nova Scotia, it’s mandatory for citizens to report suspected child pornography; anyone who comes across child pornography material or recordings must report it to the police. Failure to report could result in penalties similar to those for failure to report child abuse under the Child and Family Services Act. Be a voice for children who are victims of sexual exploitation by reporting suspected offences to your local police or to Canada’s national tip line: www.cybertip.ca.

    MIL Security OSI

  • MIL-OSI Security: Missouri Man Guilty of Travelling to Louisiana for Illicit Sexual Conduct with Twelve-Year-Old Girl

    Source: Office of United States Attorneys

    NEW ORLEANS –  U.S. Attorney Duane A. Evans announced that ERIC CHARLES FULLER (“FULLER”), age 54, from Springfield, Missouri, pled guilty on February 4, 2025, before United States District Judge Greg Gerard Guidry, to interstate travel with intent to engage in illicit sexual conduct, in violation of Title 18, United States Code, Section 2423(b).

    According to court documents, on or about December 7, 2023, law enforcement personnel, operating undercover online and pretending to be a twenty-nine-year-old mother with a twelve-year-old daughter, met FULLER on a social network and messaging application. Over approximately the next month, on numerous occasions, FULLER discussed his interest in engaging in various sexual acts with the “mother” and daughter.”  These discussions culminated in FULLER making arrangements to travel from his residence in Springfield, Missouri, to the New Orleans, Louisiana area to engage in sexual contact, individually and collectively, with the ”mother” and “daughter.” During his conversations, FULLER described the contact he anticipated as “highly taboo,” “highly illegal,” “risky,” “not the worst way to be,” and “a way to have a happier life.” FULLER drove from Springfield, Missouri on about January 11, 2024, and arrived at a predetermined location in Mandeville, Louisiana, on January 12, 2024, in order to engage in sexual conduct with the individual FULLER believed to be a twelve-year-old female.

    FULLER faces a maximum term of imprisonment of  thirty (30) years.  FULLER also faces at least five (5) years, and up to a lifetime of supervised release, up to a $250,000 fine and a $100 mandatory special assessment fee.  FULLER may also be required to register as a sex offender.  Sentencing before Judge Guidry has been scheduled for May 13, 2025.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice.  Led by United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    U.S. Attorney Evans praised the work of the Federal Bureau of Investigation in investigating this matter.  Assistant United States Attorney Jordan Ginsberg, Chief of the Public Integrity Unit, is in charge of the prosecution.

    MIL Security OSI

  • MIL-OSI Security: Morgantown Sex Offender Sentenced to 10 Years After Traveling to Mexico to Purchase Child

    Source: Office of United States Attorneys

    CLARKSBURG, WEST VIRGINIA – Scott David Bixler, 43, of Morgantown, West Virginia, was sentenced to the statutory maximum sentence of 120 months imprisonment for failing to update his sex offender registration.  Bixler will serve a lifetime of supervision following his prison sentence.

    Bixler is a convicted sex offender and is required to register under the Sex Offender Registration Act (SORNA) for life.  As part of his registration obligations, he is required to report any international travel. In July of 2023, Bixler fled to Mexico shortly before he was scheduled to appear in state court for sentencing related to criminal convictions for failure to register as a sex offender under West Virginia law.

    When Bixler and his spouse were arrested in Mexico, they possessed two pellet guns, methamphetamine, a cell phone jammer, and a large amount of cash.  The investigation also revealed that the Bixlers were attempting to purchase a young girl while in Mexico.  Fortunately, Mexican authorities thwarted the plan and arrested the couple.

    “The sentence handed down by the Court ensures that the Defendant will be confined in prison for the maximum time allowed by law,” said Acting United States Attorney Randolph J. Bernard.  “I shudder to think what might have happened but for the dedication of AUSA Perri, the federal and state law enforcement agencies, as well as the Mexican authorities.  Our community and children are safer because of their efforts and the sentence imposed.”

    Assistant U.S. Attorney David Perri prosecuted the case on behalf of the government.  The FBI, the U.S. Marshals Services, and the West Virginia State Police investigated this case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit Justice.gov/PSC.

    Chief U.S. District Judge Thomas S. Kleeh presided.

    MIL Security OSI

  • MIL-OSI Security: Columbus Man Admits Attempted Transfer of Obscene Material to Minor in Undercover Investigation

    Source: Federal Bureau of Investigation (FBI) State Crime News

    BILLINGS — A Columbus man accused of attempting to send obscene material to a minor during an undercover investigation admitted to a charge today, U.S. Attorney Jesse Laslovich said.

    The defendant, Jacob Curtis Wyckoff, 25, pleaded guilty to an information charging him with attempted transfer of obscene material to a minor. Wyckoff faces a maximum of 10 years in prison, a $250,000 fine and three years of supervised release.

    U.S. Magistrate Judge Timothy J. Cavan presided. A sentencing date will be set before U.S. District Judge Susan P. Watters. The court will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors. Wyckoff was released pending further proceedings.

    In court documents, the government alleged that in January 2023, law enforcement in the Billings area set up an undercover operation relating to those with a sexual interest in children. The undercover persona was that of a 14-year-old female. The undercover posed on a social media site and on Jan. 26, 2023, Wyckoff reached out on KIK, using the profile name of “Jake Smith.” The undercover made Wyckoff aware in communications that she was “almost 15.” In communications between the two from January 2023 to July 14, 2023, discussions became increasingly sexual in nature. On multiple occasions, Wyckoff expressed a desire to meet the “child” for a sexual encounter. On July 6, 2023, Wyckoff sent the undercover a picture of his allegedly erect penis in his jeans and made sexually suggestive comments.

    The U.S. Attorney’s Office is prosecuting the case. The FBI, Yellowstone County Sheriff’s Office, Laurel Police Department, and Montana Division of Criminal Investigations conducted the investigation.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit Justice.gov/PSC.

    XXX

    MIL Security OSI

  • MIL-OSI Security: Principal Deputy Assistant Attorney General Benjamin C. Mizer Delivers Remarks at Press Conference Announcing Criminal and Civil Actions Related to Unlawful Advertising and Sale of Dietary Supplements

    Source: United States Attorneys General 13

    Remarks as prepared for delivery

    Good afternoon.

    We are here today to explain critical steps the federal government is taking to stem the tide of unlawful dietary supplements being sold to consumers nationwide. 

    Almost every day, news sources on the Internet, television and in print feature stories about the dangers of dietary supplements:  A supplement is laced with an undeclared pharmaceutical ingredient.  A study is released about adverse health consequences of a so-called natural remedy.  An athlete or member of the military falls ill after taking an untested energy product.  These stories arise across the country all too often. 

    Consumers turn to supplements when they want to lose weight, get an edge in athletic performance, or improve their overall well-being.  From California to Maine, consumers ingest pills, powders and liquids every day, not knowing whether they are wasting money or whether they may end up harming, rather than helping, themselves.  Unfortunately, many of these products are not what they purport to be or cannot do what the distributors claim they can do.  In some instances, consumers might be choosing supplements over other, proven therapies for serious conditions under the mistaken belief that these products can help.

    I am honored to be joined at the podium today by my colleagues from the Federal Trade Commission (FTC), the Food and Drug Administration (FDA), the U.S. Postal Inspection Service (USPIS), the Department of Defense (DoD), and the U.S. Anti-Doping Agency (USADA).  Today we are announcing a sweep of actions targeting unlawful dietary supplement makers and marketers.  Over the past year, we have pursued civil and criminal cases against more than 100 makers and marketers of dietary supplements and similar products. 

    A centerpiece of the sweep announced today is the indictment of USPlabs, relating to widely popular workout and weight loss supplements.  Bestselling dietary supplements, with names like Jack3d, OxyElite Pro, and OxyElite Pro “New Formula” and “Advanced Formula,” raked in hundreds of millions of dollars in sales.

    As alleged in the indictment unsealed today, the defendants were on a perpetual search for the next miracle ingredient.  That search generally focused on Chinese chemical manufacturers.  When they found an ingredient that they believed was promising – and knowing full well how the market for dietary supplements operated – they doctored packaging, labeling, and other paperwork to defraud others about what the product was.  Much of the alleged fraud focused on the defendants’ claims that their products were made from natural plant extracts.  In truth, as one defendant put it, “lol stuff is completely 100 % synthethic [sic]”.

    These fraudulent claims ensured that the synthetic chemicals entered the United States, got on store shelves, and were purchased by consumers.  As alleged in the indictment, the defendants falsified paperwork to stay off the radar of regulatory agencies – when the products crossed the border and as they circulated in commerce.  They made misrepresentations to convince well-known retailers, who had concerns about untested synthetic chemicals, to sell their products.  They falsified labeling and marketing materials to convince consumers, who prized natural ingredients, to buy their products.  All of these people – regulators, retailers and consumers – trusted that the defendants were telling the truth about their products.  All of these people were deceived.

    This deception put lives at risk.  The indictment describes the safety testing – or, more accurately, the lack of safety testing – that the defendants undertook before hawking these factory-made stimulants.  For instance, the indictment alleges that the defendants sometimes tested the ingredients on themselves and sold the ones that made them feel good.  With one product, the defendants allegedly recognized that the substance could potentially cause “liver toxicity.”  Yet without conducting a single test to determine whether that substance was safe, they went ahead and sold it, working from the baseless assumption that they weren’t using enough of the substance in their products to cause problems. 

    But there were problems.  There was an outbreak of liver injuries allegedly associated with the OxyElite Pro New Formula.  Consumers experienced jaundice; several needed transplants to save their lives.  How did the defendants respond?  As the indictment alleges, they promised the FDA and the public that they would stop distributing the product at issue.  They didn’t.  Instead, they undertook a surreptitious, all-hands-on-deck effort to sell as much of the product as they could.

    We are here today, in part, to take an important step in holding USPlabs accountable for its actions.  The indictment unsealed today charges USPlabs in Texas, four of its executives, and one of its consultants with a series of crimes associated with the sale of dietary supplements.  Charged with these defendants is S.K. Laboratories based in Southern California, which manufactured many of USPlabs’ products, and one of S.K. Laboratories’ executives.  As noted, this is just a step.  All of the defendants will have their day in court.  Whatever the outcome, I am confident that the dedicated men and women – from the Department of Justice and the special agents from the FDA and IRS Criminal Investigation – who have worked so hard to bring us to this point will ensure that justice is served.

    The allegations against USPlabs and its operators should serve as a wake-up call to the supplement industry.  The unmistakable message is that the Department of Justice and its partners will be vigilant when it comes to the health and safety of the American public.  Fighting illegal activity in the dietary supplement industry is a high priority on our consumer protection agenda.

    The USPlabs case is only one of the many cases brought as part of the sweep announced today.  Over the past year, law enforcement and regulatory officials have focused efforts on many additional products that cause high levels of concern among health officials nationwide.

    Many of the cases we have brought relate to products that misrepresent the ingredients they contain. 

    We have also brought cases involving products that make unsupported claims about their effects.  In numerous matters, the defendants are selling products online through websites and touting their products to consumers for the cure, treatment, or prevention of diseases ranging from cancer to Alzheimer’s disease to herpes.  Making these disease cure claims defines these products as drugs under the law.  And even though they were warned by the FDA – and in some cases, through joint letters with the FTC – to stop making such claims, a number of the individuals and companies at issue continued to make these claims and promote their products as treatments or cures for diseases.  Yet these drugs lack substantial evidence of safety and effectiveness.  They are also being sold without adequate directions for their use.  Selling them in interstate commerce in these circumstances is illegal. 

    The government is taking a multi-faceted approach to combat the problem of unlawful dietary supplements.  In addition to criminal actions, we are using civil and administrative tools to safeguard consumers from harmful products.  As part of this sweep, the Department of Justice brought a dozen civil injunctive actions (including five in the last week) under the Food, Drug, and Cosmetic Act, and in some cases, using the civil mail fraud injunction statute, seeking to stop the defendant entities and individuals from violating the law.  In these cases we are asking the courts to order the defendants to stop their illegal conduct and to put in place processes and procedures to prevent them from violating the law in the future.  Our partner agencies, including the FTC, FDA, USPIS, DoD and USADA, are taking other measures both to enforce the law and to educate the public.

    As I mentioned, I stand here in partnership with other agencies with whom we have joined forces to address this problem.  Through enforcement and education, each agency is performing its own mission to protect consumers or service members or athletes from dangerous, ineffective products.  You will hear more from my colleagues about the actions their agencies are taking.  Together, through cooperation and teamwork, we can multiply the impact of our efforts.  These actions will not put an end to this widespread problem.  But they will go some distance toward bringing change to the industry.

    We are not here to criticize the entire supplement marketplace.  Not every supplement contains an undisclosed ingredient.  Not every label lies about what is contained in the bottle.  Not every claim about dietary supplements is unsupported by scientific evidence.

    But consumers must be on guard before taking dietary supplements.  Oftentimes, it may be difficult or impossible to tell the conditions under which the supplements are manufactured, and it is challenging to sort through real scientific substantiation for a product as compared to unsupported hype.

    How can consumers perform their own due diligence? 

    Talk to your health care provider.  At physical exams, ask a physician whether the bottle seen on store shelves or on the Internet could cause you harm, or whether it is worth the money you are spending to buy it.

    Consult the public education materials provided by the FTC, FDA, DoD and USADA.  The FDA’s website, for example, includes tips for making informed decisions and evaluating dietary supplements, and the FTC’s website also has a wealth of information. 

    The Department of Defense and USADA have developed extraordinary tools, including a cell phone app, to help consumers make informed choices about supplements.

    This is only the beginning.  Thanks to the partnerships we have built, our efforts in this area will continue.  We will keep investigating violators and we will use all available tools at our disposal to advance our enforcement goals and to protect consumers.

    MIL Security OSI

  • MIL-OSI Security: Director Tracy Toulou of the Office of Tribal Justice Testifies Before the Senate Committee on Indian Affairs Oversight Hearing “Tribal Law and Order Act (TLOA) — Five Years Later: How Have the Justice Systems in Indian Country Improved?”

    Source: United States Attorneys General 13

    Remarks as prepared for delivery

    Chairman Barrasso, Vice-Chairman Tester and Members of the Committee:

    I am honored to appear before you to discuss the implementation efforts of the Department of Justice to fulfill our responsibilities as established in the Tribal Law and Order Act of 2010 (TLOA) and, ultimately, to improve public safety in Indian country.  In introducing this Act in April 2009, Chairman Dorgan illuminated some of the hard realities faced by tribes in modern times, including: astonishingly high rates of violence, criminal exploitation of complex and sometimes confusing jurisdiction and crippling limitations on the legal authorities of tribal governments to ensure safety on their lands.  The introduction of TLOA included a charge to the federal government to provide tribal governments with the tools they need to better protect their communities, to live up to our treaty and trust obligations and to be more accountable for our efforts to enhance public safety in Indian country.  Thank you for the opportunity to provide an overview of the department’s efforts over the past five years to fulfill our responsibilities under this Act and honor our broader obligations to Indian country.  

    In October 2009, the department held a listening session with tribal leaders to help guide and inform the department’s policies, programs and activities affecting Indian country going forward.  Our leadership recognized the need to swiftly and meaningfully improve our contributions to public safety in Indian country and as a result of this listening session, launched a department-wide initiative to enhance public safety in Indian country, which is ongoing.  With the passage of TLOA in July 2010, the department’s initiative expanded to absorb new responsibilities and assumed a renewed sense of urgency.  Our work to enhance public safety has been and continues to be, shaped by our commitment to empower tribal governments; to improve coordination and collaboration at the federal, tribal, state and local levels; and to be appropriately accountable for the work we do.

    Empowering Tribal Governments

    The department views tribes as partners in ensuring public safety in Indian country and is committed to maximizing tribal control over tribal affairs.  It is our belief, informed by experience, that challenges faced by tribes are generally best met by tribal solutions.  In support of this commitment and the government-to-government nature of our relationships with tribes, the department has worked to fulfill its responsibilities under TLOA in a way that will ultimately empower tribes to operate with more autonomy.

    In order to support law enforcement activity by tribal officials in Indian country, tribes require access to law enforcement databases.  Under TLOA, the department must ensure that tribal law enforcement officials have access to national crime information databases.  The ability of tribes to fully engage in national criminal justice information sharing via state networks, which are the long-time conduit for such activities, has been dependent upon regulations, statutes and policies of the states that may not consistently enable tribal participation.  In order to improve access for tribes, the department has established two new programs and partnered on a third.

    First, the Justice Telecommunications System (JUST) program, which was launched in 2010, provided participating tribes with access to the National Crime Information Center (NCIC).  This program is ongoing and currently serves 23 tribes.  This program, as well as the other two programs to improve data base access, were the result of on-going, substantive dialog with tribal governments and law enforcement.  

    Second, the department recently launched a more comprehensive access program based on feedback from tribes and lessons learned from the JUST program: the Department of Justice’s Tribal Access Program for National Crime Information (TAP).  The TAP program, first announced in August 2015, is designed to provide access to CJIS services, including: Next Generation Identification (NGI); National Data Exchange (N-DEx); Law Enforcement Enterprise Portal (LEEP); National Crime Information Center (NCIC); National Instant Criminal Background Check System (NICS); and Nlets, the International Justice and Public Safety Network.  Nlets is an interstate public safety network for the exchange of law enforcement, criminal justice and public safety information owned by the states.  Nlets supports inquiry into state databases, such as motor vehicle, driver’s license and criminal history, as well as inquiry into several federal databases, such as Drug Enforcement Administration’s (DEA) Drug Pointer Index, ICE’s Law Enforcement Support Center and FAA’s Aircraft Registration and Canada’s Canadian Police Information Center.  With funding from the Office of Justice Programs’ (OJP) Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering and Tracking (SMART), the TAP program has selected ten tribal participants to help provide user feedback on the training, technical assistance, equipment, and maintenance of this program.  Early feedback has been very positive and it is our intention to eventually make this program available to any interested tribe.  We will continue to work with Congress for additional funding to more broadly deploy the program.

    The TAP Program was the result of a 2014 working group, which consisted of representatives from the Departments of Justice and the Interior.  From this same close collaboration, the department partnered with Interior’s Bureau of Indian Affairs Office of Justice Services (BIA-OJS) in a third program known as  “BIA Purpose Code X,” which gives tribes the ability through BIA-OJS to perform emergency name-based background checks for child placement purposes.  This is a crucial capability for tribal social service agencies seeking emergency placement of children in Indian country.

    The Department of Justice has increased its efforts to support tribal governments that are exercising expanded sentencing authority rooted in TLOA.  While TLOA properly does not require the department to review or certify a tribe’s use of enhanced felony sentencing authority or the status of a tribe’s efforts to amend its codes and court processes to provide defendants with the due process protections described in TLOA, we have taken steps to help ensure that tribes interested in exercising enhanced sentencing authority have knowledge of and access to relevant resources.  For example, OJP’s Bureau of Justice Assistance’s Tribal Civil and Criminal Legal Assistance Program has provided training and technical services to support tribal civil and criminal legal procedures, legal infrastructure enhancements, public education and the development and enhancement of tribal justice systems.  More specifically, training and technical services have included the following: indigent legal defense services; civil legal assistance; public defender services; and strategies for the development and enhancement of tribal court policies, procedures and codes.

    The provision of high-quality training to tribal representatives has been an area of increased activity within the department since the passage of TLOA.  The department believes that ensuring access to quality training is a necessary element to bolstering tribal autonomy.  In July 2010, the Executive Office of U.S. Attorneys (EOUSA) launched the National Indian Country Training Initiative (NICTI) to ensure that federal prosecutors and agents, as well as state and tribal criminal justice personnel, receive the training and support needed to address the particular challenges relevant to Indian country prosecutions.  Importantly, the department covers the costs of travel and lodging for tribal attendees at classes sponsored by the NICTI. This allows many tribal criminal justice officials to receive cutting-edge training from national experts at no cost to the student or tribe.  The NICTI has sponsored approximately 75 training courses, and reached over 200 tribal, federal and state agencies.

    Additionally, the Federal Bureau of Investigation (FBI) announced a forthcoming training course to be held at the FLETC campus in Artesia, New Mexico.  Jointly taught by FBI and BIA “mentors” and FLETC common core instructors, the course will include instruction in forensic evidence collection and preparatory instruction on investigations common to Indian country, such as domestic violence, child abuse, violent crimes, human trafficking and drug trafficking.  This course will be held four times each year, with a total of 24 students in each session.  This course, the result of collaboration between FBI, BIA and FLETC, was developed out of a recognized need to train federal and tribal law enforcement officers together.  Another recent training was held by the DEA.  In September 2015, the National Native American Law Enforcement Association held a collaborative training event where the DEA provided on-site training on clandestine lab awareness for first responders, emerging technologies, and money laundering.  The training included federal, state, local, and tribal partners with Indian country responsibility.   

    One of the most meaningful displays of the department’s commitment to a government-to-government relationship with tribes is in our efforts to cross-deputize tribal law enforcement officials.  In doing so, we not only expand their authorities, but we send an important message that we are partners and allies with tribes in our collective efforts to enhance public safety in Indian country.  The Special Assistant U.S. Attorney (SAUSA) Program was developed prior to the passage of TLOA to train tribal prosecutors in federal criminal law, procedure and investigative techniques to increase prosecutions in federal court, tribal court, or both.  The program enables tribal prosecutors to bring cases in federal court and to serve as co-counsel with federal prosecutors on felony investigations and prosecutions of offenses originating in tribal communities.  The program has grown considerably since the passage of TLOA.  To date, there are 25 SAUSAs representing 23 tribes.  In addition to the SAUSA program, the Department of Justice investigative agencies have cross-deputized tribal law enforcement officers through joint task forces.  For example, the FBI has deputized 85 tribal law enforcement officers as part of the Safe Trails Task Forces.  There are currently 15 active Safe Trails Task Forces located around the country, working to combat violent crime, drugs, gangs and gaming violations. 

    In 2014, the Bureau of Prisons (BOP) fulfilled a key provision of TLOA by accepting certain tribal offenders sentenced in tribal courts for placement in BOP institutions.  The pilot program allowed any federally-recognized tribe to request that the BOP incarcerate a tribal member convicted of a violent crime under the terms of Section 234 of TLOA and authorized the BOP to house up to 100 tribal offenders at a time, nationwide.

    A fundamental goal of the BOP is to reduce future criminal activity by encouraging inmates to participate in a range of programs that have been proven to help them adopt a crime-free lifestyle upon their return to the community.  Through the pilot program, tribal offenders have access to the BOP’s many self-improvement programs, including work in prison industries and other institution jobs, vocational training, education, treatment for substance use disorders, classes on parenting and anger management, counseling, religious observance opportunities and other programs that teach essential life skills.  BOP has also ensured that there are culturally-appropriate offerings for native inmates.  In addition to increasing access to critical programs and treatments, the pilot program facilitated tribes’ ability to exercise enhanced sentencing authority under TLOA, which is an important indication of support for tribal sovereignty.  The pilot program was, by all accounts, a success and both tribes and the department would be supportive of necessary Congressional action to reauthorize this program.

    An important part of our support to tribes is necessarily tied to funds.  The department launched the Coordinated Tribal Assistance Solicitation (CTAS) in 2010, as a response to tribes’ request for increased flexibility.  Through CTAS, tribes and tribal consortia are able to submit a single application to apply for a broad range of the Department of Justice tribal grant programs.  Through CTAS, the department has awarded over 1,400 grants totaling more than $620 million.  Over time, we have refined this solicitation to enable tribes to take a truly comprehensive approach to improving public safety in tribal communities.  Under TLOA, the department was required to offer specific grants for delinquency prevention and response and to include dedicated funding for regional information sharing.  To date, we have awarded more than $44 million in support of tribal youth programs and more than $108 million to support regional information sharing systems.  The department continually seeks feedback from tribes on ways to improve CTAS and each year with our solicitation announcement we also communicate steps we have taken during the previous year to improve the process.  The most recent solicitation was released on Nov. 19, 2015, with an application deadline of Feb. 23, 2016.  It incorporates a number of changes, including the elimination of certain eligibility requirements, broadening allowable activities and extending the award period for certain grants.  Each year, the intention is to increase the accessibility and usefulness of CTAS grants.   

    In parallel to our outward-facing efforts, the department has made a number of internal structural changes to ensure our revamped presence in Indian country is long-lived.

    Evolution of Agency Infrastructure 

    To ensure that the day-to-day operations at the department are supportive of the policy and programmatic changes we have made since the passage of TLOA, we have made a number of internal adjustments across the department, from headquarters to field offices.  The intent in making these changes was to absorb the principles that drive the TLOA and our response to that Act, thus integrating them into the way we do business at the department.  Indeed, although not a direct response to TLOA, the department issued Attorney General Guidelines Stating Principles for Working with Federally Recognized Tribes (Statement of Principles) in December 2014 to guide and inform all of the department’s interactions with federally-recognized tribes.  This Statement of Principles serves as a point of reference for department employees and, importantly, a standard to which tribes can hold the department accountable.  

    In 1995, then-Attorney General Janet Reno established the Office of Tribal Justice (OTJ).  OTJ has operated continuously since then, although it was not made permanent until the passage of TLOA.  On Nov. 17, 2010, less than four months after TLOA’s enactment, the department published in the Federal Register a final rule that established OTJ as a permanent, standalone component of the department.  My office serves as a principal point of contact in the department for federally-recognized tribes, provides legal, policy and programmatic advice to the Attorney General with respect to the treaty and trust relationship between the United States and Indian tribes, promotes internal uniformity of department policies and litigation positions relating to Indian country and coordinates with other federal agencies and with state and local governments on their initiatives in Indian country. 

    The U.S. Attorneys’ Offices with Indian country in their districts play a primary role in our interactions with tribes.  U.S. Attorneys’ Offices often are the nexus of activity when federal involvement on reservations is necessary, from investigations to prosecutions to providing services to victims.  Every U.S Attorney’s Office, whose district includes Indian country or a federally-recognized tribe, has at least one Tribal Liaison and some districts have more than one.  Along with the TLOA-driven requirement that each relevant office appoint a Tribal Liaison, the U.S. Attorneys are required to hold annual consultations with tribes in their districts.  In order to assist the U.S. Attorney’s Offices and the Attorney General’s Advisory Committee’s Native American Issues Subcommittee, as well as to serve as a liaison to other department components, the Executive Office for U.S. Attorneys formally established the position of Native American Issues Coordinator.          

    These changes to the structure of the department were driven by the department’s support for and fulfillment of its responsibilities under TLOA.  There have been a series of policy shifts that are not a direct response to the Act but are in keeping with the spirit of that legislation.  For example, the issuance of the Department of Justice Statement of Principles, discussed earlier, marks an important shift in our approach at all levels of the department to interacting with tribes.  Similarly, the Department of Justice Consultation Policy is based on three guiding principles: that the department must engage with tribal nations on a government-to-government basis; that tribal sovereignty and Indian self-determination are now and must always be, the foundations of every policy or program; and that communication and coordination with our tribal partners, among federal agencies and with our state and local counterparts are essential to accountability and to success.

    Greater Accountability

    Accountability is a critical element in a true partnership and the department has taken a number of steps to increase our accountability to tribes.  The TLOA-mandated reports were intended to promote greater transparency of department activities in Indian country and the process of responding has been a useful exercise for our agency to scrutinize trends and patterns of activity.  In some cases, the reports have revealed a need to expand our agency response to meet specific needs and organize our resources more effectively, such as those related to long-term detention.  In other cases, the reporting process highlighted positive impacts that department activity has had in Indian country over time and a need to perpetuate beneficial initiatives, such as the BOP pilot program report and the Office of Community Oriented Policing Services (COPS) Report.  In tracking prosecutions and crime data, the department has benefitted from taking a focused look at our response to trends in Indian country and as a result is in a better position to adjust our resources internally to address emerging trends and issues.

    The department has made progress over the past five years in bolstering our government-to-government relationship with tribes and in honoring our treaty and trust obligations.  We are all fully cognizant that there is significant work still to be done to live up to our responsibilities in Indian country and we are committed to seeing this work through.  We appreciate Congress’ efforts to foster public safety and look forward to working closely with our partners in Indian country to fully honor our responsibilities.  I will be happy to answer any questions you may have.    

    MIL Security OSI

  • MIL-OSI Security: Attorney General Loretta E. Lynch Delivers Keynote Address on Counterterrorism and International Cooperation

    Source: United States Attorneys General 13

    Thank you, Dr. [Robin] Niblett, for that kind introduction; for your leadership here at the Royal Institute of International Affairs; and for your lifetime of dedicated work in the service of international cooperation and global security.  I also want to thank Prime Minister [David] Cameron and the members of Her Majesty’s government for their hospitality during my visit to the United Kingdom.  And I’d like to thank this group of distinguished colleagues, inspiring leaders and devoted public servants for participating in this important conversation.  It’s a privilege to join you here today as we honor the unique bond between our nations; as we reaffirm the cherished values and ideals that we share; and as we rededicate ourselves to building the stronger, safer, and more united world for which we have fought together in the past, and toward which we continue to strive today.

    The United Kingdom and the United States have long been close partners and staunch allies and the connection between us – which Winston Churchill referred to as our “special relationship” – is one with deep roots and a rich history.  Almost all of America’s founders proudly considered themselves Englishmen and many were hesitant to shed that honorable title, even after the start of the American Revolution.  And the revolution itself – though it pitted us against one another in armed conflict – was inspired by the ideals of the British Enlightenment: responsive government, robust rights and liberties, and the fundamental equality of all people.      

    Those ideals have been a source of mutual understanding and shared strength ever since – and while they have been threatened by injustice within our nations and hostility from beyond our shores, they have continued not only to endure, but to expand.  Through the courageous struggles of prominent leaders and humble citizens; of freed slaves and former colonial subjects; of suffragists, ethnic minorities, religious dissenters and gay and lesbian advocates – we have extended the rights of liberty, equality and justice.  Through the tremendous courage and sacrifice of our countrymen –in two World Wars, in battlefields of Korea and today in the skies over Syria and Iraq– we have defended our beliefs against tyranny and oppression.  And together, we have come to the aid of others inspired by the principles that we share.

    Today, the values that have guided and defined us for centuries are facing a persistent threat: the rise of global terrorism and extremism – a scourge that has inflicted its pain on both of our nations in the recent past.  Ten years ago, this great city endured devastating attacks on its public transportation system, and you suffered another attack in the Underground only this week.  In the United States, as you know, we have also suffered terrorist attacks and we are currently investigating last week’s tragic shootings in California as an act of terror.  And as recent events in Paris, Beirut, and Mali remind us, we are far from alone in being targeted by these agents of violence.  These attacks are carried out with a single, repugnant purpose: to harm, frighten and intimidate anyone who believes in open and tolerant societies; in free and democratic governments; and in the right of every human being to live in peace, security and freedom.  As two nations who serve as beacons of those ideals to people around the world, we have a special responsibility to take on this terrorist threat, and to prevent it from causing the destruction it is so desperate to inflict.

    As Attorney General of the United States, my highest priorities are the security of our country and the safety of the American people.  At the Department of Justice, we are working tirelessly to uncover and disrupt plots that take aim not only at the United States, but at nations around the world.  We are acting aggressively to defuse threats as they emerge.  And we are vigorously investigating and prosecuting individuals who seek to harm innocent people.  To stop plots before they can be brought to fruition, we are going after individuals engaged in preparatory activities like fundraising, recruitment, planning and training.  Our approach has yielded important results: since 2013, we have charged more than 70 individuals for conduct related to foreign terrorist fighter interests and homegrown violent extremism and we continue to take action designed to monitor and thwart potential extremist activity. 

    But no nation can fight terrorism alone.  As our world continues to grow more interconnected and interdependent, cooperation and joint action are more essential than ever to combating cross-border threats like terrorism, cybercrime, corruption and human trafficking.  And while modern technology has helped to widen the circle of opportunity for so many citizens around the globe, it has also provided new channels that criminals can exploit for their own ends.  Online, violent ideologies can rapidly proliferate and spread and threats can leap borders and oceans in an instant.  No nation can exist in a bubble of isolation; no country can imagine themselves immune from world events; and the security of each state increasingly depends on the security of all states.  The words of four centuries past ring ever true today, “no man is an island entire of itself.”  In this environment, our strategic understanding and our common humanity demand that we supplement nationwide vigilance with international cooperation.

    That is why the United States is working with organizations like INTERPOL and EUROPOL to share information on foreign fighters.  It’s why we have provided resources, including FBI agents, to support INTERPOL’s Fusion Cell, which investigates the training, financing, methods and motives of terrorist groups around the world.  And it is why we have crafted information-sharing agreements with more than 45 international partners to identify and track suspected terrorists – a partnership that has now provided INTERPOL with approximately 4,000 profiles on foreign terrorist fighters.  From efforts to degrade terrorist capabilities, to building cooperative networks that help to preserve and share information and evidence after an attack, we are demonstrating our deep commitment to collaboration worldwide. 

    Let me give one example of how critical it is that we work together.  Terrorists, like other criminals, count on the difficulties that law enforcement agencies have in sharing information across borders – difficulties that are magnified now that electronic information may be stored in many different countries and may quickly disappear.  But starting some years ago, criminal justice experts from the U.S., the UK, France and the other G7 countries created the 24/7 cyber network – a rapid reaction system that now links approximately 70 countries.  Thanks to that system, after the recent horrific attacks in Paris, French investigators were able to work immediately with the U.S. Department of Justice and with U.S. Internet Service Providers, to preserve data from social media accounts and webpages identified as connected to the attacks, and to seek emergency disclosures to protect lives.  It is this kind of innovative thinking about international information sharing that we need to increase.

    Of course, it is also important to emphasize that our efforts to fight terrorism must always be compatible with safeguarding privacy and civil liberties – exactly as the 24/7 cyber system is designed to be.  Often, in conversations like this one, there is an implicit assumption that our safety must be balanced against our rights and our values; that there is a necessary trade-off between the hopeful optimism of our ideals and the cold reality of our national security.  But the view that we must abdicate our values to maintain our security presents a false choice.  Rather, our security exists to protect our values, because they are the wellspring of all that we are.  Progress within our nations has always been driven by our desire to live up to our ideals – of inclusiveness and opportunity, of equal rights and equal justice – and if we curb those rights in a misguided bid for short-term security, we betray not only our ancestors; not only ourselves; and not only our children – but all those for whom the United States and the United Kingdom represent the possibility of a better, freer future.

    In this regard, I am proud to say that the Obama Administration, with the support of Congress, has made the protection of civil liberties and privacy a priority in the fight against terrorism.  The record is a remarkable one: President Obama has created unprecedented transparency regarding our guidelines for collection and use of signals intelligence, including signals intelligence collected in bulk.  The President nominated and the senate has confirmed, an independent Privacy and Civil Liberties Oversight Board, as envisioned by Congress.  And just last week, independent public advocates were appointed to advise the Foreign Intelligence Surveillance Court, as called for by the USA Freedom Act.  

    Moreover, in all of these efforts, as President Obama has made clear, our goal is to extend privacy protections not only to U.S. citizens, but to foreign nationals as well.  That is why, after years of negotiation, I am very happy to say that we were able to initial in September the U.S./EU “Umbrella” Data Privacy and Protection Agreement regarding law enforcement information.  And it is why – in a truly unprecedented step – the Administration has supported legislation to extend judicial redress rights to foreign nationals for privacy breaches regarding law enforcement information – legislation that, thanks to strong Congressional support, already has passed our House of Representatives, and is now pending in the Senate.  

    These actions are not only unprecedented, but reflective of the United States’ deep commitment to the principles they protect, as well as the importance of our relationship with our European partners in this struggle.  That is why it is particularly disappointing that the European Court of Justice – in a case based on inaccurate and outdated media reports – recently struck down the Safe Harbor Agreement in the Schrems decision.  And it is highly concerning to us that data privacy legislation advancing in the European Parliament might further restrict transatlantic information sharing – a step that not only ignores the critical need for that information sharing to fight terrorism and transnational crime, but also overlooks the enormous steps forward that the Obama Administration and Congress have taken to protect privacy.  It is important that all of us – on both sides of the Atlantic – work to set the record straight regarding our commitment to protect not only the safety of our citizens, but also their civil liberties and privacy.

    But one thing I am confident of in our work on these issues and in the larger fight against terrorism – we will not lose ourselves to fear.  We will respond to this and other threats the way we know best – by reaffirming the very ideals that distinguish us from those who wish us harm: freedom of speech; religious tolerance; the open exchange of ideas; and government that represents the will of its people.  These are the principles of Runnymede and Philadelphia, of the Glorious Revolution and the American Revolution – the principles that we have risen to defend time and again and emerged victorious.  For centuries, these ideals have inspired countless men and women around the world to seek the better life that is the promise of humanity and to demand that the elemental dignity of all mankind be recognized and respected.  And we must keep their promise alive.  

    There is no doubt that we come together at a time of uncertainty, facing dangerous threats and determined adversaries.  But in this moment of global challenge, we remain dedicated to the task that remains before us and to the work that so many have given their last full measure of devotion to fulfill.  Our nations may have been bloodied, but we will remain unbowed – in defense of our citizens, in solidarity with our allies and in allegiance to the values that make us who we are. 

    The road ahead will not always be easy.  We will encounter more times of uncertainty and setbacks.  But as we move forward in the work that will secure our homelands and prove our principles once more, we are fortified with the strength of our time-tested traditions, by the partnership of our longstanding allies and by the legacies of the brave men and women who fought to make our nations everything they are today.  I am confident about the road ahead.  I know that our promise will endure.  And if we can lean on our faith in our enduring values – and hold fast to our unshakeable belief in the cause of justice and the rule of law – then I have no doubt that out of a long and difficult night of challenge, a brighter day will come.

    Thank you.

    MIL Security OSI

  • MIL-OSI Security: Assistant Attorney General Leslie R. Caldwell Delivers Remarks at the 12th Annual State of the Net Conference

    Source: United States Attorneys General 13

    Remarks as prepared for delivery

    Good morning. The Attorney General apologizes for not being able to be here today.  She was at the World Economic Forum in Switzerland – addressing cybercrime issues – and, unfortunately, unable to get back to D.C. in time for this because of the snowstorm.

    Thank you, Tim [Lordan], for that warm welcome, and for your leadership of the Internet Education Foundation (IEF).  I also want to thank the IEF for the invaluable services you have provided since your organization was founded nearly two decades ago – and that you continue to provide today.  Through this conference series, you bring together industry leaders, dedicated experts and devoted public servants to explore how we can harness new technologies to build more empowered communities and a stronger nation.

    As the Assistant Attorney General of the Criminal Division, my foremost task in the cyber area is the vigorous, fair and effective enforcement of our cyber laws.  The Justice Department does that by finding ways to protect our networks against evolving threats, by thwarting bad actors online, and by ensuring that both our security and our liberties remain as strong in the digital age as they have been throughout our history. 

    Essentially, we are focused on a question that President Obama posed in his State of the Union address a few weeks ago: How do we make technology work for us, and not against us? 

    In our age of rapid change and constant disruption, that question is relevant to almost every aspect of our lives, including law enforcement and national security.

    There is no doubt that technology has both expanded and complicated our capacity to detect, investigate and prosecute crimes.  Today, by using new technologies, we can analyze some types of evidence with unprecedented speed and accuracy, and coordinate with partners around the world in real time. 

    But as law enforcers have become better equipped, so have the law breakers we’re working to disrupt.  Digital technology has transformed how police and prosecutors do our jobs, but it has also transformed how wrongdoers commit their crimes.  Our bank accounts and personal information now exist online, tempting thieves and fraudsters. 

    The greater anonymity of cyberspace gives cover to drug dealers and arms traffickers.  Dark websites are used to circulate illicit content, like images of child sexual exploitation and stolen credit cards. 

    Communication is frequently by instant message and email, so there are no actual paper trails, but rather virtual ones in data stored on digital devices, hard drives and in the cloud.  And it isn’t just criminals who exploit the Internet for nefarious purposes. 

    The web also hosts groups and individuals who seek to harm our core security interests – from state-sponsored hackers conducting economic espionage; to rogue militants and official cyber warfare units targeting our infrastructure; to terrorist groups plotting attacks, radicalizing recruits and spreading hateful ideologies.

    These emerging threats require nimble, innovative and adaptive responses, and at the Department of Justice, we are committed to doing our part to ensure that law enforcement stays a step ahead of bad actors. 

    The FBI continues to investigate cyber intrusions and national security threats while monitoring individuals, organized groups and state actors who might attempt to steal sensitive data or inflict harm.  We recently created a Cybersecurity Unit within our Criminal Division, staffed with experienced prosecutors fluent in the law, policy and practice of cybercrime prevention. 

    And the Bureau of Alcohol, Tobacco, Firearms and Explosives has established an Internet Investigations Center (known as IIC) where federal agents, legal counsel and investigators track and counter illegal online firearms trafficking.  The IIC – which was highlighted in the president’s recent recommendations to curb gun violence – has already identified a number of significant traffickers operating over the Internet, and their work has led to prosecutions against individuals and groups using the “dark net” to traffic guns to criminals or attempting to buy firearms illegally online. 

    Of course, the Department of Justice’s work to combat cybercrime is enhanced through our collaboration with law enforcement partners in other agencies, such as the U.S. Secret Service and U.S. Postal Inspection Service.  And we are working to enhance cybersecurity and information sharing through our work with the Department of Homeland Security.

    These are important steps to protect our online information and to combat crime here at home – but with an entity as vast and complex as the Internet, we must also reach beyond our own borders to partner with other countries.  And that’s exactly what we’ve done. 

    In the last fiscal year, the FBI’s Cyber Division embedded three permanent Cyber Assistant Legal Attachés in the United Kingdom, Canada and Australia to help facilitate information-sharing, improve cooperation on investigations and build even stronger relationships with our allies. 

    We recently placed a Criminal Division prosecutor with Eurojust in The Hague and one in Southeast Asia.  These positions will help to facilitate information-sharing, improve cooperation on investigations and build even stronger relationships with our law enforcement partners in other countries.

    We’ve also created a cyber unit in our Office of International Affairs (OIA) dedicated to responding to and executing requests for electronic evidence from foreign authorities – requests that have increased by 1,000 percent over the last decade. 

    To help manage that significant growth, we have been actively hiring additional attorneys and professional staff for OIA’s Mutual Legal Assistance Treaty Modernization Project, and we hope to continue expanding our ability to help our overseas counterparts.  And we are providing critical, real-time assistance to foreign counterparts through the 24/7 Points of Contact Network established by the Group of Seven Nations and by the Budapest Cybercrime Convention – a convention that, I am pleased to note, continues to be joined by countries around the world committed to fighting cybercrime.

    Partnerships like these don’t just cultivate closer connections with our friends and allies – they also get results.  In 2012, we participated in a multinational sweep of child-pornography websites, ultimately dismantling more than 200 websites that sexually exploited children. 

    In November 2014, we joined more than 15 countries under the auspices of the European Cybercrime Centre – or EC3 – to launch Operation Onymous, which shuttered a number of so-called “dark market websites” peddling drugs, weapons, stolen credit card data, fake passports and computer-hacking tools. 

    And this past July, our joint effort with EC3 shut down the Darkode hacking forum – an underground site where hackers convened to buy, sell and trade malicious software, botnets, intrusion tools and stolen personal information.  That operation involved a coalition of 20 nations, led by the U.S. Department of Justice and EC3, and allowed us to charge, arrest or search 70 Darkode members and associates around the world. 

    The Justice Department will continue to work with foreign law enforcement agencies to prevent and prosecute groups and individuals that illegally use the Internet for crime and exploitation.  Of course, as we seek to ensure the safety and integrity of our devices, databases and networks, it is crucial that we work closely not only with other law enforcement officers, but also with the people who create and design these products themselves – the executives, entrepreneurs and engineers who make America’s tech sector the envy of the world. 

    Our collaboration has been instrumental in a range of important victories, including the takedown of the GameOver Zeus Botnet, an operation in which technology and data-security companies played an invaluable role.  We are committed to building on those successes by maintaining strong partnerships with the private sector. 

    That’s why the department has placed a high priority on entities like the FBI’s National Cyber Investigative Joint Task Force, which enables collaboration across government to respond to computer intrusions and attacks, and the National Cyber-Forensics & Training Alliance, which brings together law enforcement, private partners and experts in academia to address the cyber threats we face together. 

    And it’s why the Attorney General and I have been meeting regularly with industry leaders to foster cooperation and discuss urgent issues – including last week at the World Economic Forum in Switzerland, where the Attorney General joined with industry leaders to endorse five recommendations for enhancing public/private partnerships to fight cybercrime.  We will continue to reach out to representatives of the tech industry, and our door is always open to new ideas for combatting cybercrime and online extremism. 

    One area where cooperation between the government and the private sector is especially important is in addressing the growing problem of the government’s inability to obtain critical information in electronic form even when we have court authorization to do so.  This is the problem known as “going dark.” 

    While investigations used to rely on physical evidence – like handwritten notes, or documents stored in filing cabinets – as you can imagine, in the 21st century that kind of evidence is growing scarce.  Our ability to track and prosecute criminals now often depends on instant messages, emails and other forms of digital information.  In fact, nearly every criminal investigation we undertake at the federal level relies on electronic evidence. 

    But as new ways of using encryption become an increasingly standard feature of personal electronic devices and messaging platforms, companies are losing the ability to respond to lawful processes.  Those materials are increasingly inaccessible to law enforcement officers, even when we have a warrant to examine them.  And we find ourselves facing obstacles which can stop our investigations and prosecutions in their tracks.

    The security of our online information is critically important, and so is the legal process that protects our values and our safety.  These are complementary, not competing priorities.  After all, digital security is a vital tool, but it is not a cure-all – especially when it impedes our ability to protect ourselves and each other in the physical world. 

    The Department of Justice is completely committed to seeking and obtaining judicial authorization for electronic evidence collection in all appropriate circumstances.  But once that authorization is obtained, we need to be able to act on it if we are to keep our communities safe and our country secure. 

    From gang activity to child abductions to national security threats, the ability to access electronic evidence in a timely manner is often essential to successfully conducting lawful investigations and preventing harm to potential victims. 

    As FBI Director [James] Comey recently said, in May, two terrorists attempted to kill a lot of people.  One of the terrorists exchanged 109 messages with an overseas terrorist.  We have no idea what he said because it was encrypted.  That is a big problem.  We have to grapple with it.

    That’s why the Justice Department and organizations like the International Association of Chiefs of Police, the National District Attorneys Association and the Major Cities Chiefs Association feel strongly that there needs to be a way for law enforcement to retrieve critical information in cases where it’s necessary and authorized.  We are committed to working with innovators, leaders and problem-solvers like you to figure out how we can best meet this public need together.

    Of course, our interest in working together with you extends beyond this particular issue.  The Internet has so fundamentally changed the way we live our lives that there are times when institutions like law enforcement must evolve.  And as we seek to adapt to this new reality in a wide variety of ways, your creativity, your expertise and your leadership can help us ensure that the innovations we enjoy will benefit and protect the American people – and not those who would harm them or their liberties and rights.

    We understand that this is no easy task.  These are novel and difficult challenges.  But what makes us confident about our ability to succeed is that, throughout our history, this country has always found a way to move forward while retaining the values that make us who we are.  We are certain that we will do the same in the digital age.  And together, we will build a brighter, safer and more prosperous future for all.

    Thank you for your ongoing cooperation in that effort, and for your commitment to our shared goals.  I look forward to all that we will accomplish – together – in the weeks and months ahead.

    MIL Security OSI

  • MIL-OSI Security: Principal Deputy Associate Attorney General Bill Baer Delivers Remarks Highlighting Elder Justice at the State Of Financial Fraud in America Event

    Source: United States Attorneys General 13

    Remarks as prepared for delivery

    Thank you Robert for that kind introduction and for your leadership and dedication as CEO of Financial Industry Regulatory Authority (FINRA).  And thank you to the Stanford Center on Longevity and the FINRA Investor Education Foundation, for hosting this conference and for the great work that you do.  It is an honor to join with the many people in this audience who dedicate their lives to combatting financial fraud and protecting elderly Americans.  This is a noble and enduring effort.   

    As many people here know, financial fraud targeted at the elderly is a serious problem.  At the beginning of 2011, the first Baby Boomers reached the age of 65.  I reached that milestone myself just last year.  Indeed, 10,000 Americans turn 65 every day, and the percentage of Americas over 65 is growing.  5.8 percent of this group experiences identity theft in a given year.  I had that ugly experience just last month. 13.8 percent experiences consumer fraud in a given year.  4.5 percent of people over 50 experience financial fraud in a five-year period.  While there are varying accounts about how much the overall financial loss is, it is well into the billions of dollars.  

    Statistics aside, we are here together because we know all too well that this is a problem that takes a personal toll.  Almost all of us know someone who has been the victim of financial fraud.  And while it affects people of all ages, it can be especially devastating for elderly people, many of whom are dependent on their savings and are concerned about their own mental decline or other people’s perception of their mental decline.  

    I recently saw letters written by the victims of a set of schemes that we took action against.  One described having sent “hundreds of checks” for a company’s “great offers” and tried to explain to the fraudster that “due to bad eyes, [he] has to use magnifying glasses to read” and had “been caught paying many times for th[e] very same offer.”  Another, believing that the con men would send him a promised gift, tried to explain that he had sent his prior payments by money order and was now enclosing cash, “all [he] can send.”  Another explained that when she gets the vast inheritance she’d been promised, she would use it to help her family, the homeless and needy children.   

    The nature and scope of elder fraud varies tremendously.  At the Department of Justice, we see small, family based schemes, such as caregivers tricking elderly victims out of their savings or abusing powers of attorney.  We see institutional schemes, such as nursing homes that provide unnecessary services or bill for services never provided.  And we see global fraud networks that are—quite literally—organized crime.  These schemes involve networks of businesses with careful divisions of labor.  They target millions of Americans, maintain lists of victims, and, once someone has been duped, target those people again and again. One recent victim wrote a letter explaining: “Each day I keep getting more and more offers and it’s almost impossible for me to keep up with them.” 

    Large and diverse problems like this require broad based solutions.  We at the Department of Justice know we can’t solve this problem alone.  Coordination is essential not only with our federal partners, but with local, state and international authorities.  And public and private partnerships are key to our understanding of the scope of the problem and to the lasting success of any solution.

    Research into basic questions, such as why are elderly people vulnerable, and how can we detect fraud and abuse, is critical to attacking the problem.  The FINRA Foundation and Stanford Center on Longevity launched the Financial Fraud Research Center five years ago.  As some of your ongoing research has demonstrated, there is a natural decline in cognition as people age, especially ability to think fast and process new information.  The elderly are sometimes lonely or otherwise socially isolated. Some are uncomfortable with technology.  Many have pools of relatively liquid retirement assets.  Some are dependent on caregivers.  All of these factors make the elderly particularly susceptible to certain schemes. 

    There is much more to learn.  The Department of Justice has invested in partnerships to help us all better understand the causes and risk factors associated with elder financial exploitation.  For example, just a few weeks ago, we announced an award of nearly $800,000 to the Urban Institute and the University of Southern California to develop and test prevention programs that will address elder abuse, neglect and financial exploitation.  To enhance our understanding of financial exploitation by conservators and guardians, last year our Office for Victims of Crime funded a project to search for innovative, evidence-based programs and practices that successfully detect and remedy conservator fraud.  And people like you are furthering our understanding.  This conference is highlighting emerging research on susceptibility to fraud and fraud prevention.

    Beyond efforts to understand how and why elder fraud occurs, continuing dedication to enforcement is required to stop it.   This is not a partisan issue.  We have seen Democratic and Republican administrations alike express a shared commitment to using all tools in the Department of Justice’s enforcement arsenal.  Back in the 1990s, under Attorney General Reno, the Department of Justice created the Elder Justice Initiative to centralize information, facilitate training, and coordinate within the Department and across the federal government.  During the Bush Administration, the Department of Justice initiated an elder mistreatment research grant program, funding cutting edge research on elder abuse and financial exploitation that continues today.

    During this Administration, Congress created the Elder Justice Coordinating Council as part of the Affordable Care Act to facilitate interagency cooperation at the highest of levels.  At the Department of Justice, we formed the Attorney General’s Advisory Committee’s Elder Justice Working Group, which is comprised of U.S. Attorneys from across the country who are dedicated to improving our information sharing on financial scams targeting the elderly.  And just this year, we created ten regional Elder Justice Task Forces that operate throughout the country, partnering with state and local law enforcement and prosecutors to enhance our collective response to elder financial fraud and abuse. 

    Our Elder Justice Initiative has also been assisting with community capacity building.  This includes supporting the training of local law enforcement and prosecutors.  And to enhance civil legal aid to seniors, in June 2016, the Department of Justice, in collaboration with the Corporation for National and Community Service, launched the Elder Justice AmeriCorps, the first-ever army of lawyers and paralegals to help elderly victims of abuse and exploitation.  The program will support 300 AmeriCorps members throughout the country and is expected to reach over 8,000 older adults over the next two years.

    A multi-faceted problem requires coordination between different federal agencies; it demands a whole of government approach.  Mail is involved; we must coordinate with the Postal Inspection Service.  Money is involved; we must coordinate with the Treasury Department.  People target the elderly; we must coordinate with agencies that serve the elderly, such as the Social Security Administration.  

    And more and more, we are seeing schemes that are highly complex and global.  Stopping these schemes require extensive cooperation—not just with state and local authorities, but also across the federal government and with our international counterparts.  For example, the Department of Justice’s Consumer Protection Branch co-chairs the International Mass-Marketing Fraud Working Group, a network of civil and criminal law enforcement agencies from Australia, Belgium, Canada, Europol, the Netherlands, Nigeria, Norway, Spain, the United Kingdom and the United States.  

    We can point to meaningful progress.  In the past several years, we have successfully shut down several international lottery scams where con men and women have contacted elderly victims in the United States, told the victims they won cash and prizes, and persuaded them to send thousands of dollars in fees to release the money.  Of course, the victims never received cash or prizes in return.  In a series of cases, perpetrators made calls from Jamaica using Voice Over Internet Protocol technology that made it appear as if the calls were coming from the United States.  They convinced victims to send money to middlemen in South Florida and North Carolina, who forwarded the money to Jamaica.  We have had great success breaking up these networks through joint efforts between Jamaican law enforcement and U.S. agencies including the Postal Inspection Service, Department of Homeland Security, U.S. Marshals Service, Federal Trade Commission and Internal Revenue Service.  Since 2009, the Department of Justice has prosecuted or is prosecuting over 100 individuals linked to such lottery schemes, and has convicted and sentenced over 40 defendants.

    We have had similar success going after global “psychic schemes.”  Con men and women send letters purportedly written by “world-renowned psychics” stating that they had a vision revealing that the recipient has the opportunity to obtain great wealth.  The letters appear personalized, refer to the recipient by name, and often contain portions that appear handwritten.  The solicitations urge victims to purchase products and services that will ensure this good fortune.  Investigations by the Department of Justice and Postal Inspection Service, among others, revealed the complexity of these schemes.  Not only were there the fraudsters themselves, but there were separate companies performing different roles, such as processing victim payments and maintaining databases of consumers who responded to solicitations.  In a two-week period, one company in the United States processed as much as $500,000 in payments for just one psychic scheme.  We have discovered similar companies in Quebec, Hong Kong, Switzerland and France.  

    Perhaps the most significant example of cooperation to date were our wide-ranging enforcement actions taken in September of this year to dismantle a global network of mass mailing schemes targeting elderly and vulnerable victims.  The schemes involved a network with components in Canada, France, India, the Netherlands, Singapore, Switzerland, Turkey and the United States.   The network included an India-based printer that manufactured solicitations and arranged for bulk shipment to U.S. victims; a mailer in Switzerland; list brokers in the United States who bought and sold lists of victims so that once victims had fallen prey, others could target them; a “caging” service in the Netherlands that collected money; and a Canadian payment processor that, for more than 20 years, helped dozens of international fraudsters gain access to U.S. banks and take money from Americans.  Stopping this network involved coordination between the Department of Justice, Department of Treasury, Postal Inspection Service, Federal Trade Commission, Iowa Attorney General’s office and counterparts in other countries.  Just to give you a sample of the coordinated actions, on Sept. 22, 2016: 

    • The Treasury Department’s Office of Foreign Assets Control blocked assets from the Canadian payment processor and a network of individuals and entities across 18 countries.
    • The Justice Department filed criminal charges and a civil injunction against a Turkish mass mailer. 
    • The Justice Department brought a series of civil actions to shut down companies based in the United States, India, Switzerland and Singapore.  These companies were responsible for mailing millions of multi-piece solicitations to potential victims throughout the United States.  
    • The Justice Department entered into a consent decree with two Dutch “caging” businesses that collected and forward money.  Our efforts were coordinated with Dutch authorities who executed search warrants on the businesses and took control of the Dutch post office boxes used to receive victims’ funds.   
    • The Federal Trade Commission filed a case against a related mass-mailer, printer, and list broker.  
    • The Iowa Attorney General negotiated a compliance agreement with two firms that brokered victim lists.

    Of course, what matters even more than going after these schemes is preventing people from falling prey in the first place.  Here too, federal agencies are working in cooperation and dedicated to the effort.   The Department of Justice has distributed educational materials about these kinds of scams, the U.S. Postal Inspection Service has developed an electronic press kit for media outlets, my former colleagues at the Federal Trade Commission operate a “Pass It On” campaign that encourages people to share information about frauds that affect older Americans, the Social Security Administration is educating beneficiaries through its network of over 1,200 field offices nationwide, and the Consumer Financial Protection Bureau has produced a mail fraud alert placemat in coordination with Meals on Wheels America to distribute to seniors nationwide.  Similarly, private organizations that work in the area of elder justice and consumer protection are doing their part.  For example, AARP will be posting information through its Fraud Watch Network.  And the Consumers Union, the policy arm of Consumer Reports, is alerting consumers about a variety of elder scams.  

    Going forward, the Department of Justice will continue to work with private, local, state, federal and global partners.   And we urge all of you to tell us where the Department can do more.  The federal government’s work on behalf of the elderly began long before this Administration, and it will continue long after.  I expect that my successors, and my successors’ successors, will share our commitment to making sure our parents, grandparents and friends age with grace and dignity.  And I look forward to all of you, who have worked so hard in this area, working with the next Administration to combat financial fraud and protect elderly Americans.  Thank you again for having me here today.  

    MIL Security OSI

  • MIL-OSI Security: Assistant Attorney General Leslie R. Caldwell Delivers Remarks Highlighting Cybercrime Enforcement at Center for Strategic and International Studies

    Source: United States Attorneys General 13

    Good morning, and thank you, Jim [Lewis], for that kind introduction.  I am pleased to be here speaking to you today, and I want to thank the Center for Strategic and International Studies (CSIS) for having me.  

    Over the past two and a half years, I have had the honor of serving as the Justice Department’s Assistant Attorney General for the Criminal Division – and with that, the responsibility of ensuring that the division and its over 700 prosecutors have the support and authorities they need to fulfill their responsibilities to the American people.  I have also had the opportunity to see first-hand the dedication, rigor, intelligence and respect that America’s prosecutors bring to their work every day.  As my time as the Assistant Attorney General of the Criminal Division comes to a close, I am incredibly proud of where the division stands today and all that we have accomplished together.

    One constant truth about investigating and prosecuting crime is that it is never without its challenges, although the precise nature of the difficulties and obstacles we face changes with the times.  Today, some of the most significant hurdles we encounter relate to technology and the Internet.  

    Innovation in computing, the Internet, and related services has had tremendous benefits for our economy, our ability to connect with others, and the convenience, efficiency, and security of our everyday lives.  It has also transformed how we in law enforcement do our jobs by expanding our ability to detect, investigate and prosecute criminal activity.  

    However, these same innovations permit criminals to more easily victimize Americans, including from afar, while concealing their identities and enabling destruction of evidence.  We face an enormous task in responding to these new threats – ranging from botnets and ransomware to online child sexual exploitation and firearms trafficking, to name just a few – and that task is not getting any easier.  This morning I will focus on four challenges that have been and must continue to be the center of our work if we intend to succeed: 
    •    First, the growth of sophisticated, global cyber threats; 
    •    Second, dangerous loopholes in our legal authorities; 
    •    Third, the widespread use of warrant-proof encryption; and, 
    •    Fourth, inefficient cross-border access to electronic evidence.

    As I will explain in more detail, the past few years have marked some significant progress in some of these areas.  We have grown more nimble and effective in cooperative international law enforcement efforts to bring cyber criminals to justice and remediate cybercrime.  And we have managed to effect some targeted and common-sense improvements in legal authorities.  But in other areas, the challenges remain, and in some cases have become more prominent.  Let me begin with the threat.  The global nature of the Internet means that criminals now can easily victimize more people within the United States in more dangerous ways, all without ever setting foot here.  Some of the most significant criminal activity in recent years is the result of sophisticated criminal groups reaching across our borders from perceived safe harbors.  As we rely more and more on network communications to handle virtually every aspect of our lives, the cost of cybercrime will only rise – to over two trillion globally by 2019, according to some estimates – and the United States is a uniquely attractive target.

    We have responded first and foremost by aggressively identifying, apprehending, and prosecuting offenders.  This past October, for example, the Russian cybercriminal Roman Seleznev was convicted by a jury in Seattle.  Seleznev was a hacker who, from the other side of the world, pilfered data for millions of payment cards from the computer systems of small business owners across America – a crime that strikes at the trust and security of our everyday financial transactions.  Seleznev was the son of a member of the Russian parliament, and the Russian government filed diplomatic protests and tried to pressure us into releasing him.  But that’s not how justice in America works, and he is now in an American prison.

    We recognize that we cannot prosecute our way out of cybercrime, but prosecution must remain an integral component of our response to global cyber threats.  That is why foreign hackers like “Guccifer” – who hacked into the email and social media accounts of about a hundred Americans, including two former U.S. presidents – as well as Vladimir Drinkman and Dmitriy Smilianets – who, along with co-conspirators, conducted a worldwide hacking scheme that compromised more than 160 million credit card numbers – have likewise found themselves within the reach of American law enforcement.  Thanks to the work of our colleagues in the National Security Division, the same holds true for individuals like Su Bin – who conspired with Chinese military hackers to steal cutting-edge U.S. aircraft designs – and Ardit Ferizi – who shared stolen PII belonging to 1,300 U.S. military and government personnel with a member of ISIL, for publication on a hit list.  All have now been brought to the United States to face justice.  

    The department’s strong track record in this area is a critical deterrent to would-be attackers.  Over the last twenty years, for example, our Computer Crime and Intellectual Property Section (CCIPS) – the centerpiece of our prosecutorial response to criminal cyber threats – has successfully prosecuted cases involving more than one billion stolen pieces of information, including payment card data, email addresses and social security numbers – more than three pieces of data for every American alive today.

    Our international partnerships make this work possible.  And they have been key in another way as well.  Even when prosecution is not yet an option – for example, because we have been unable to identify or apprehend a criminal target – we have developed operational expertise in disrupting cybercriminal infrastructure in the United States and abroad.  For example, we have worked hand-in-hand with our foreign partners to address technical threats like botnets, so-called “bulletproof” hosts, Darknet markets and international hacking forums.  

    Indeed, just last week, the department led a multinational operation to dismantle a vast network of dedicated criminal servers known as “Avalanche,” which allegedly hosted more than two dozen of the world’s most dangerous and persistent malware campaigns.  The Avalanche network served clients operating as many as 500,000 infected computers on a daily basis and is associated with monetary losses in the hundreds of millions of dollars worldwide.  We were joined in this effort by investigators and prosecutors from more than 40 jurisdictions across the globe.  We must maintain existing international law enforcement cooperation – and develop new mechanisms to work with foreign partners – if we hope to continue these successes.

    These efforts have also benefitted from growth in our technical and investigative capacity.  The Criminal Division has steadily increased resources for CCIPS, along with its in-house Cybercrime Lab, over the last two years.  The Cybercrime Lab has become the go-to resource across U.S. law enforcement for intractable problems in accessing and understanding digital evidence, whether that means uncovering evidence that a defendant accessed online terrorist radicalization materials to rebut a claim of entrapment, or cracking passwords to dozens of devices that hold key evidence of serious crimes.

    We have also found that augmenting our own expertise and legal authorities with insight from private sector institutions allows us to identify and develop new, creative responses.  For example, in 2014, the FBI, in conjunction with a coalition of nearly a dozen foreign countries and a group of elite computer security firms, dismantled the Gameover Zeus botnet.  That botnet, which infected more than one million computers around the world, inflicted over $100 million in losses on American victims alone, and was responsible for the spread of the Cryptolocker ransomware.  The Gameover Zeus operation represents what we can achieve when law enforcement agencies collaborate with private sector experts, and indeed, many private organizations provided similar assistance in the recent Avalanche take-down.  I hope that it will continue to serve as a model for the department’s future work.

    This relationship works in both directions.  The investigative experience of our CCIPS prosecutors can offer important lessons for private sector entities.  In addition, navigating the federal laws that govern network monitoring practices – laws in which CCIPS specializes – can be fraught for organizations seeking to improve their cybersecurity.  That is why, two years ago, we created the Cybersecurity Unit, a group of CCIPS prosecutors who can leverage their case-related experience to develop and share practical cybersecurity advice with the private sector.  The Unit has also played an integral role in implementation of the Cybersecurity Information Sharing Act (CISA).  So not only have we benefitted from private sector experts for our operational needs, but we have made a practice of sharing our knowledge base as well.

    Even as the department addresses technical obstacles to preventing and prosecuting cybercrime, however, we confront a second challenge: arbitrary gaps in the law that frustrate some of our most pressing investigations.  One example of such a loophole was the venue provision of Rule 41 of the Federal Rules of Criminal Procedure. 

    As that Rule existed prior to Dec. 1, 2016, when law enforcement sought court approval for a search warrant, it generally was required to seek authorization from a court sitting in the same geographic district where the property to be searched was located.   This Rule made perfect sense in dealing with the physical world.  But in the cyber-world, we increasingly face scenarios where criminals use technology to hide the location of their computers, meaning that we could not know where the computers were located.  In those circumstances, federal law did not clearly identify which judge could authorize a search.   

    Similarly, we regularly encounter crimes like mass hacking through botnets that are carried out in multiple districts at once, all across the country.  But in order to respond in a timely, comprehensive manner, the prior version of the Rule arguably required authorities to obtain a warrant in each district – up to 94 in all, across 9 time zones, ranging from the Virgin Islands to Guam.  

    Last week, a three year effort, spearheaded by the Criminal Division, and approved by the U.S. Supreme Court, culminated in a targeted, procedural fix to the venue provisions of the Rule to ensure that technology does not render our investigative abilities obsolete.  The update to the Rule does not alter the probable cause or other standards we must meet to obtain a search warrant.   What the Rule does change is that now, when criminals hide the location of their computers through anonymizing technology, we don’t have to figure out in which federal district the computers are physically located before we can act to stop criminal activity.  Likewise, when a criminal deploys a botnet that indiscriminately infects computers nationwide – as many botnets now do – we don’t have to go to as many as 94 different judges. 

    The need to update Rule 41 was not theoretical.  Today, dozens of websites on Tor – a proxy network – openly distribute images of child rape and sexual exploitation, where they are frequented by tens of thousands of pedophiles.  These sites can thrive in the open because proxy networks, like Tor, hide the locations of the criminals’ servers and the identities of their administrators and users.  While law enforcement – and the general public – can easily find images of child sexual exploitation by visiting one of these sites, we often cannot locate and shut down the websites or identify and apprehend the abusers.  More troubling, the child victims stand little chance of rescue.

    The recent investigation of “Playpen,” a Tor site used by more than 100,000 pedophiles to encourage child sexual abuse and trade sexually explicit images of that abuse, illustrates why a Rule 41 fix was necessary.  In that case, authorities were able to wrest control of the site from the administrators, and then obtained court approval to use a remote search tool to retrieve limited information, including the user’s IP address, only if a user accessed child pornography on the site.  This enabled a traditional, real-world investigation, leading to more than 200 active prosecutions and the identification or rescue of at least 49 American children who were subject to sexual abuse.  

    Yet in some of the resulting cases, federal courts relying on the language of the prior version of Rule 41 found that even though the probable cause and other standards for obtaining a warrant were satisfied, evidence obtained in searches nevertheless had to be excluded because the judges who issued warrants lacked venue over the computers, which turned out to be physically located outside their geographic districts.  This is a perverse result, as it would mean that criminals who are savvy enough to hide their locations – which is not difficult given current technologies – could place themselves beyond the reach of law enforcement.  

    This is a good example of why the amendments to Rule 41 are such a crucial step forward.  They make clear which courts are available to consider whether a particular warrant application comports with the Fourth Amendment, without altering in any way the substantive requirements for – or privacy protections provided by – a warrant.  This will ensure that criminals who use anonymizing technologies are not immune from justice, and that threats like botnets are not too big to investigate and remediate effectively.

    This fix is a not a cure-all, however.  Our response to cyber threats requires revisiting laws that simply did not anticipate and cannot adjust to modern technology.  We must continue to move forward – not backward – to ensure that our laws protect Americans from criminals, and not the other way around.

    I now want to turn to some challenges that, despite the best efforts of many, will continue to confront policymakers in the years to come.  As society’s use of computers and the Internet has grown, so too has the importance of digital evidence in criminal investigations.  In nearly every criminal investigation we undertake at the federal level – from homicides and kidnappings to drug trafficking, organized crime, financial fraud and child exploitation – critical information comes from smart phones, computers and online communications, often instead of physical evidence.  Yet, these materials are increasingly unavailable to law enforcement as a result of certain implementations of encryption, even when we have a warrant to examine them.

    This is because, in an attempt to market products and services as protective of personal privacy and data security, companies increasingly are offering products with built-in encryption technologies that preclude access to data even when a court has issued a search warrant.  Service providers with more than a billion user accounts, that transmit tens of billions of messages per day around the world, now advertise themselves as unable to comply with warrants.  And device manufacturers that have placed hundreds of millions of products in the market have embraced the same principle.  We in law enforcement often describe this sort of encryption as “warrant-proof encryption.”  

    Let me be clear: the Criminal Division is on the front lines of the fight against cybercrime.  We recognize that the development and adoption of strong encryption is essential to counteracting cyber threats and to promote our overall safety and privacy.  But certain implementations of encryption pose an undeniable and growing threat to our ability to protect the American people.  Our inability to access such data can stop our investigations and prosecutions in their tracks.

    Inaction is not a suitable response.  Our occasional success in accessing information protected by seemingly “warrant-proof encryption” is unpredictable and inadequate.  There are devices in evidence lockers across the country that remain locked.  

    As the President reminded us recently, the Government has different responsibilities – a different “balance sheet” and different “stakeholders” – than a corporation.  There is nothing wrong with companies pursuing profits and marketing strategies, but no one should expect that they will take into account all of the societal interests that are at stake.  And that is especially true for our public safety mission.  Our ability to protect Americans from crime has become dependent, in thousands of cases, on the business decisions of for-profit corporations.  More troublingly, even when companies have the technical ability to reasonably assist us in accessing encrypted information, they have refused to do so for fear of “tarnishing” their image.  Regardless of which side of this issue you are on, we can all agree that market-driven decisions are not and have never been a substitute for sound public safety policies. 

    Business decisions made by for-profit companies have had enormous effects on our public safety in other ways as well.  Data held by major Internet service providers can be crucial to identifying and holding accountable the perpetrators of virtually every federal crime we handle.  Increasingly, however, American providers and other providers subject to the jurisdiction of the United States are storing such information outside the United States, and not always at rest and in the same location.  The data can be partitioned and stored in multiple locations, or moved about on an ongoing basis, and some providers may not even know where all data relating to a particular user is at a given time.  

    It is this last challenge – foreign-stored digital evidence – that I will close with today.  The department has worked diligently to increase the cross-border availability of data, through mechanisms like the 24/7 Network, which facilitates the preservation of digital evidence, as well as mutual legal assistance treaties and the Budapest Convention on Cybercrime, which enhance international cooperation in obtaining that evidence.  The Criminal Division has also directed additional resources toward a dedicated cyber mutual legal assistance unit in our Office of International Affairs, which has seen a 1,000 percent increase in incoming requests for computer records since 2000.

    But while these are important crime-fighting tools, they have significant shortcomings.  The United States has mutual legal assistance treaties with less than half the countries in the world, some of which place limitations on when assistance is available or the types of evidence that can be obtained.  Even then, obtaining evidence can take months, if not years.  Ireland, for example, reports that in routine cases it takes 15 to 18 months to execute a request for assistance from a foreign country.  In less experienced or less cooperative countries, the process can take even longer.  Sometimes we never receive a response at all.  

    Recently, the difficulties caused by foreign-stored data for public safety have become more acute.  In July, the Second Circuit Court of Appeals, in the so-called “Microsoft Ireland” case, held that U.S. authorities cannot use a search warrant issued by a U.S. court pursuant to the Stored Communications Act (SCA) to compel a U.S. service provider, such as Microsoft, to produce data that it chooses to store for its own business purposes (and typically without the knowledge or input of its subscribers) outside the United States.

    So, what is already a difficult and time-consuming process of gathering electronic evidence may now also become an impossible one, for both the United States and our partners.  Since the Microsoft decision was handed down, U.S. providers such as Google, Microsoft and Yahoo! have refused to produce information that they have chosen to store abroad in response to search warrants issued by courts even outside the Second Circuit.  This has been the case even in instances where the account-holder was an American citizen residing in the United States, and when the crime under investigation is carried out on American soil.  And this includes warrants obtained on behalf of foreign countries pursuant to mutual legal assistant requests.

    U.S. law generally does not require our providers to store this data in a particular location or make it accessible in any particular way.  But as a result, the ability of law enforcement to effectively investigate serious crime may now be determined entirely by a provider’s data management practices, well-intentioned or not.  One major American provider, for example, is unable to determine the country in which foreign-stored data is located; and even if it could, the data is frequently moved and may not be in the same country from day to day.  Under the Second Circuit’s decision, a SCA warrant is not available.  But sending an MLAT request to a foreign country could result – after months of delay – in a notification that the relevant data is no longer there.

    It is for this reason that, in October, the department filed a petition for the case to be reheard by the entire Second Circuit en banc.  It is also why we intend to submit legislation to Congress to address the decision’s significant public safety implications.  This issue must be resolved before we move to other important initiatives, such as legislation to implement a cross-border data agreement with the United Kingdom.

    Looking forward, I cannot predict how the rehearing petition, or the broader concerns implicated by the Microsoft decision, will play out.  And I suspect that, whether the issue relates to warrant-proof encryption or cross-border access to evidence, reaching a resolution will be challenging.  But these decisions must be made in the policy arena, not by the private sector alone.  We cannot allow changing technologies or the economic interests of the private sector to overwhelm larger policy issues relating to the needs of public safety and national security.  And we must let government fulfill its fundamental responsibilities to protect the American people.

    I know that the panel to follow will focus on some of these challenges for the future, but let me offer my own thoughts here.  In each of these areas, we must proceed thoughtfully and balance multiple different legitimate interests.  Yet several basic principles should be obvious.  First, sitting back and doing nothing is not an acceptable option.  The world is changing around us, and those seeking to do harm are evolving with it; if those responsible for ensuring public safety do not have the same ability to adapt, public safety will suffer.  Second, these changes pose policy challenges, and we need to develop policy responses.  Rather than let evolutions in technology dictate our responses, we must think ahead as a society and develop appropriate frameworks to address new and upcoming challenges before they become crises.  And finally, when there are multiple interests at stake – public safety, cybersecurity, international comity and civil rights and civil liberties – we cannot allow the most consequential decisions to be made by a single stakeholder, or leave them to the whim of the commercial marketplace.  We would never tolerate that approach in other areas of importance to society, and we should not do so here.  Thank you.

    MIL Security OSI

  • MIL-OSI Security: New Carrollton Man Sentenced to 20 Years in Federal Prison for Kidnapping Minors, Producing Child Sexual Abuse Material

    Source: Federal Bureau of Investigation (FBI) State Crime News

    Greenbelt, Maryland – On January 31, 2025, U.S. District Judge Deborah L. Boardman sentenced Julian Everett, 41, of New Carrollton, Maryland, to 20 years in federal prison and 20 years of supervised release, for kidnapping minors and producing child sexual abuse material.

    Erek L. Barron, U.S. Attorney for the District of Maryland, announced the sentence with Special Agent in Charge William J. DelBagno, of the Federal Bureau of Investigation, Baltimore Field Office; Prince George’s County State’s Attorney Aisha N. Braveboy; and Chief Malik Aziz, Prince George’s County Police Department.

    According to the guilty plea, in 2005, 2015 and 2016, Everett acknowledged sexually abusing and capturing sexual abuse material of several victims at his New Carrollton home – four were minors.

    On July 11, 2005, Everett drove Victim 2 — who was16 at the time — from the Commonwealth of Virginia to his New Carrollton residence.  While at his residence, Everett provided Victim 2 with a beverage, before engaging in sexual intercourse without her consent. Everett also took nude photographs of the victim without her consent.

    Additionally, on August 23, 2015, Everett drove another victim — who was 18 at the time — from a Washington, D.C. night club to a gas station. While there, Everett created and provided Victim 3 with a beverage before driving her to his New Carrollton residence. Everett then engaged in sexual acts with Victim 3 without her consent.

    Then on August 21, 2016, Everett drove Victim 1 — who was then 17 at the time — from her Washington, D.C. residence to a Northwest D.C. barbershop where he worked. While at the barbershop, Everett created and provided Victim 1 with a beverage. Victim 1 drank it and eventually lost consciousness before waking up at Everett’s home while he was performing a sexual act on her. Additionally, Everett recorded the sexual encounter and took naked pictures of the victim without her consent.

    Authorities arrested Everett in Prince George’s County on March 21, 2019. Federal law enforcement obtained a search warrant for Everett’s electronic devices, revealing images of child sexual abuse material, including a video of Everett engaging in sexual intercourse with an unidentified fifth female victim. During the video, Victim 5 can be heard mumbling and is physically unresponsive with her eyes closed.

    On March 26, 2019, a fourth victim reported a sexual-assault incident to the Prince George’s County Police Department’s Criminal Investigation Division. Between March and April 2015, Everett transported Victim 4 — who was16 at the time — from her Washington D.C. residence to his New Carrollton home.  After arriving at his house, Everett mixed a drink for Victim 4 who drank it and became lightheaded. Everett then engaged in multiple sexual acts with Victim 4 without her consent, which he also digitally recorded. He also took nude photos of her. 

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorney’s Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc. For more information about Internet safety education, please visit www.justice.gov/psc and click on the “Resources” tab on the left of the page.

    U.S. Attorney Barron commended the FBI, Office of State’s Attorney for Prince George’s County, Maryland, and the Prince George’s County Police Department for their work in the investigation. Mr. Barron also thanked Assistant U.S. Attorneys Timothy Hagan and Thomas Sullivan who prosecuted the federal case.

    For more information about the Maryland U.S. Attorney’s Office, its priorities, and resources available to help the community, please visit www.justice.gov/usao-md and https://www.justice.gov/usao-md/community-outreach.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Deputy Attorney General Rod Rosenstein Delivers Remarks at the Interpol 87th General Assembly

    Source: United States Attorneys General 13

    Remarks as prepared for delivery

    It is a privilege to join you at this 87th INTERPOL General Assembly.  I am grateful to the United Arab Emirates for hosting our conference. Thank you President Kim Jong Yang for your exceptional leadership and for providing stability to INTERPOL.  

    Our theme this year is innovation.  Many digital innovations affect law enforcement, from the rise of cybercrime, to the increasing importance of electronic evidence, to encryption and the dark net. 

    In addressing these innovations, we must respect the primary value that is constant in our work: the rule of law.  Law provides the framework for civilized people to conduct their lives.  At its best, law reflects moral choices; principled decisions that promote the best interests of society, and protect the fundamental rights of citizens. 

     The term “rule of law” describes the government’s obligation to follow neutral principles and fair processes. The ideal dates at least to the time of Greek philosopher Aristotle, who wrote, “It is more proper that law should govern than any one of the citizens: upon the same principle, if it is advantageous to place the supreme power in some particular persons, they should be appointed to be only guardians, and the servants of the law.”

    The rule of law is indispensable to a thriving and vibrant society.  It shields citizens from government overreach.  It allows businesses to invest with confidence.  It gives innovators protection for their discoveries.  It keeps people safe from dangerous criminals.  And it allows us to resolve differences peacefully through reason and logic.

    When we follow the rule of law, it does not always yield the outcome that we prefer. In fact, one indicator that we are following the law is when we respect a result although we do not agree with it. We respect it because it is required by an objective analysis of the facts and a rational application of the rules.

    The rule of law is not simply about words written on paper.  The culture of a society and the character of the people who enforce the law determine whether the rule of law endures.

    Since we met last year in Beijing, the news media has reported several prominent challenges to the rule of law, including the lawless attacks on Sergei and Yulia Skripal and Jamal Khashoggi.  Last month, international attention focused on INTERPOL, as a result of the disappearance of President Meng Hongwei.  Such events give rise to questions about whether our member countries abide by shared principles.  In evaluating our actions at this General Assembly, observers may ask whether our votes reflect the values that we profess. We must stand for the rule of law.  

    INTERPOL exists to promote international police coordination and discourage departures from the law. We represent diverse forms of government. But if we serve with integrity, each of us functions as a trustee for our fellow citizens.

    When our successors look back on how we dealt with the issues of our era, they will ask whether we honored our fiduciary duties.

    First, did we develop the knowledge to understand our challenges?

    Second, did we inculcate the wisdom to solve them?

    Third, did we demonstrate the courage to defend our principles?

    Fourth, did we maintain the resolve to achieve our goals?

    I traveled here to speak about INTERPOL’s role in responding to the major innovation of our lives: the rise of a cyber-connected world. 

    The Internet holds immeasurable promise as a repository of ideas, and as a forum for speech and commerce.  It connects citizens across cultures and countries.  It is accessible to the rich and the poor, the powerful and the powerless.  It creates efficiencies and innovations that immensely improve our lives.

    But like every innovation that offers opportunities for good, the Internet also can be exploited by wrongdoers. Today, there is a growing divergence between the Internet as it is, and the Internet as it could be.

    Malicious actors use the Internet for evil ends.  Cyber criminals employ modern technologies to damage information systems, steal data, commit fraud, violate privacy, attack critical infrastructure, and sexually exploit children. They also launch misleading schemes to influence people’s opinions, seeking to foment division and disrupt democratic processes.

    The Internet enables attacks on businesses, government agencies, and individual citizens that cause damage costing billions of dollars.  And new technologies allow criminals to conceal themselves, which frustrates law enforcement’s efforts to keep honest citizens safe. 

    We must acknowledge the divergence between the Internet in theory and the Internet in practice. Closing that gap will ensure the viability of an open Internet governed by the rule of law.

    Enforcing the law on the Internet requires rapid and accurate detection of criminal activity; cooperation among law enforcers from different nations; prosecution of accused criminals in judicial systems that provide due process of law; and just punishment of guilty offenders.  It means not tolerating virtual online locations where crime is unchallenged.  It means not condoning physical safe havens for cyber criminals.

    Detecting, disrupting, deterring, and prosecuting malicious cyber activity are among our highest law enforcement priorities in the United States.  The cyber threats we face are varied and evolving, and our resolve to keep our people safe must extend to every corner of the Internet.

    My office recently issued a comprehensive report about our work to combat cybercrime.  It describes the global challenges posed by cyber-enabled crime.  It explains how hostile cyber actors damage computer systems, steal data, engage in cyber fraud, violate personal privacy, infiltrate critical infrastructure, and pursue malign foreign influence operations.  The report also details our efforts to detect and disrupt those threats, and our commitment to inform citizens about the dangers.

    The perceived anonymity of the Internet attracts many criminals, including terrorists and those trafficking in child pornography, illicit weapons, illegal and deadly drugs, murder-for-hire, malware, and stolen identities.  The barriers to entry are low.  Criminal opportunities are on offer for anyone with an Internet browser and an inclination to break the law.  

    Yet our police agencies repeatedly demonstrate that with the support of international partners, we can find and dismantle malign internet operations.  We identify anonymous users who commit illegal activity, seize their infrastructure and proceeds, and pursue criminal charges against them.  Criminals operating on the dark web should be on notice that our investigative tools allow us to expose them.

    We must not allow cybercriminals to hide behind cryptocurrencies.  Virtual currencies have some legitimate uses.  But bad actors are using them to fund crimes and to hide illicit proceeds.  For example, Bitcoin was the exclusive method of payment for the WannaCry ransomware attack that spread around the globe, causing billions of dollars in losses. 

    In addition, fraudsters use the lure of coin offerings and the promise of new currencies to bilk unsuspecting investors, promote scams, and engage in market manipulation.  The challenges of regulating, seizing, and tracing virtual currencies demand a multinational response.  We must work together to make clear that the rule of law can reach the entire blockchain.

    To that end, last year, prosecutors in the United States announced the indictment of Alexander Vinnick and the virtual currency exchange he allegedly operated. That exchange received more than $4 billion of virtual currency. It was designed without any means to control money laundering, so predictably it served as a hub for international criminals seeking to hide and launder ill-gotten gains. 

    We filed criminal charges and assessed a $110 million civil penalty against the exchange for willfully violating our anti-money laundering laws, as well as a $12 million penalty against Vinnick.

    To prevent virtual currency from being abused by criminals, terrorist financiers, or sanctions evaders, all of us must implement policies that mitigate the risks posed by the new technology.  My country includes virtual currencies in our anti-money laundering regulations.  And the Financial Action Task Force urges all nations to make clear that global anti-money laundering standards apply to virtual currency products and service providers. We must guard against abuses of digital currency.

    We also need to protect against abuses of encrypted communications.  Encryption can be useful in the fight against cybercrime.  Encrypting data makes it more safe and secure.  But the proliferation of warrant-proof encryption also poses a challenge to effective law enforcement. 

    Encryption technologies designed to be impervious to legal process impede our ability to access investigative data.  In September, the chief law enforcement officials of the United States, the United Kingdom, Canada, Australia, and New Zealand joined together to issue a “Statement of Principles on Access to Evidence and Encryption.”

    While acknowledging the benefits of encryption, they called for urgent, sustained attention and informed discussion about the increasing difficulty law enforcement agencies face in accessing evidence of criminal conduct.

    We will continue to work closely with technology companies to establish responsible practices that consider both privacy concerns and public safety imperatives.

    On the Internet, data is decentralized, information flows across continents, and online activities are dispersed across global networks. Cybercrime knows no borders.  As a result, international cooperation is indispensable.  INTERPOL is central to that cooperation.

    We must ensure that appropriate criminal laws are enforced.  Each of us must do our part to bring malicious actors to justice.  We rely on international partners to locate, arrest, and extradite cybercriminals so that they may be held accountable.  Cybercriminals should find no safe haven, either on the dark web or within national borders.

    In the United States, we continue to faithfully discharge our responsibility to extradite fugitives. In the last five years, we extradited 95 Americans, honoring inquiries whenever the requesting state presents sufficient evidence of criminality.

    For example, last year the United States sent Shawn Gregory Towner to Ireland.  Towner was arrested in Ireland in 2006 after authorities found him watching images of child sexual abuse on his laptop in Dublin, but he fled to the United States after being released on bail.  My country located Towner and sent him to Ireland to stand trial. 

    We process extraditions without regard to the nationality of the offender. 

    But that cooperation must be reciprocated.

    International cooperation was essential to our successful dismantlement of the Kelihos botnet, a global network of tens of thousands of infected computers.  Criminals used the network to harvest login credentials, distribute hundreds of millions of spam e-mails, and install ransomware and other malicious software. 

    In 2017, prosecutors obtained judicial orders authorizing law enforcement to neutralize the botnet by seizing control of malicious domains and redirecting traffic to servers we controlled. 

    Disabling the botnet was only part of the equation. The criminals responsible for creating and administering the botnet also should be held accountable. American prosecutors charged Peter Levashov of St. Petersburg, Russia for multiple offenses stemming from his control and operation of the Kelihos botnet.  Levashov is a cybercriminal who operated multiple botnets with impunity for nearly two decades. 

    Spanish authorities arrested Levashov and extradited him to the United States. In September, Levashov was found guilty in a fair and public judicial proceeding.

    Levashov’s extradition represented effective coordination with our foreign partners.  Unfortunately, not every case is a success story.  In some instances, nations shield their citizens from the rule of law with schemes that waste resources, cause needless delay, thwart investigative efforts, and undermine justice. 

    Consider the prosecution of accused hacker Aleksey Belan.  Belan is a Russian national who was indicted in the United States for massive computer breaches on American companies.  After the United States issued an arrest warrant, Belan was reportedly arrested in 2013.  But he was permitted to return to Russia. 

    A second indictment alleges that in 2014, after Belan returned to Russia, Russian intelligence agents recruited him to carry out one of the largest data breaches in history, stealing information from more than 500 million individual email accounts of people around the world. 

    The rule of law suffers when cybercriminals are given safe havens.  The United States will continue to promote the rule of law by identifying, exposing, and seeking to extradite perpetrators who harm innocent people.  And we will continue to support legitimate investigations and prosecutions conducted by our INTERPOL partners. 

    At the same time, we will expose schemes to manipulate the extradition process.  We will identify nations that routinely block the fair administration of justice and fail to act in good faith, with a sincere commitment to holding criminals accountable.

    As cyber threats grow in scale and sophistication, we increasingly need to search throughout the world for evidence, witnesses, and defendants.  Our responses must be as innovative as the criminal activity. We depend on expeditious international cooperation and coordination in dismantling malicious criminal operations. 

    Child exploitation cases provide a useful model for international coordination.  INTERPOL’s International Child Sexual Exploitation image and video database uses image and video comparison software to identify and locate child sexual exploitation victims and their abusers.  The database has led to the arrest of nearly 6,300 offenders. Recently, it helped authorities rescue five victims in Spain.  That is a superb example of innovative law enforcement.

    In my country, we play a leading role by identifying cases in which child exploitation materials are generated from or hosted in other countries.  Then we disseminate the information to the appropriate INTERPOL member countries. Our partners often request follow-up information to assist in their own investigations. Last year, almost nine million investigative leads were distributed through this program, resulting in many arrests and prosecutions. 

    Children around the world are safer when our law enforcement agencies work together – quickly, and with methods like those pioneered by INTERPOL.

    Finally, I am proud that the United States takes seriously our responsibility to help secure evidence that our international partners need for their investigations.  We receive thousands of requests for mutual legal assistance each year, and we do all that we can to comply.  We employ expert attorneys and staff dedicated to assisting with foreign requests for electronic evidence.  We devote additional resources when necessary to meet your needs.

    We call upon each of you to do the same.  By devoting appropriate resources to international cooperation efforts, we can properly address the increasing threat of cybercrime.

    My country recently enacted a new law to remove legal impediments to compliance with foreign court orders in cases that involve serious crimes.  The legislation demonstrates our commitment to the vision of the Budapest Convention on Cybercrime, the primary treaty for harmonizing national interests and enhancing international cooperation against cybercrime.  Sixty-one nations have fully ratified the treaty, agreeing that national laws should include authority to compel providers to disclose data they control, even when it is held elsewhere. 

    New cyber conventions are sometimes proposed that would limit the free flow of information between nations. But that would dangerously impede efforts to investigate cybercrime. It would protect criminals and allow cyber threats to proliferate and grow in scale and sophistication.  That is untenable in a world in which criminals using computers shielded by layers of anonymity can harm innocent victims in any one of our nations, anywhere in the world. Such limitations would be a step backward, not an innovative law enforcement approach.

    No nation should exempt itself from just and reasonable law enforcement cooperation. No nation will be more prosperous, more secure, or more respected because it supports cybercriminals. 

    My fellow delegates, there is a parable about three stonecutters asked to describe what they are doing.  They answer in varying ways. The first stonecutter focuses on how the job benefits him. He says, “I am earning a living.” The second man narrowly describes his personal task: “I am cutting stone.” The third man has a very different perspective. Instead of focusing solely on his work, he explains what it means to others: “I am helping these stonecutters build a shrine.”

    Similarly, each of us helps to construct a legacy. INTERPOL delegates should always support leaders and policies that promote international police coordination and preserve the rule of law – in practice, and not just in theory. We must uphold the rule of law, so it will be there for us when we need it.

    When our successors speak of our time here, give them reason to say that we understood the challenges; we found the solutions; we defended our principles, and we stayed the course to support liberty and justice for all. 

    I am honored to work with you in advancing the INTERPOL mission and making the world safer and more prosperous for all law-abiding citizens. Shukran.  Thank you very much.

    MIL Security OSI