Category: Internet

  • MIL-OSI Security: Registered sex offender charged federally with possession of images of child sexual abuse

    Source: Office of United States Attorneys

    State probation officers find defendant with unauthorized electronic devices allegedly containing child sexual abuse images

    Seattle A 34-year-old Kirkland, Washington man appeared on a federal criminal complaint today charging him with possession of images of child sexual abuse, announced Acting U.S. Attorney Teal Luthy Miller. Daniel Jose Lile was arrested April 16, 2025, by Department of Corrections Officers for possessing unapproved electronic devices. Lile remains detained at the Federal Detention Center (FDC) at SeaTac.

    According to the criminal complaint, Lile was on community supervision from the Washington State Department of Corrections for a 2019 conviction for child sexual abuse. Lile was arrested April 16, 2025, for having unauthorized electronic devices. On May 12, 2025, law enforcement served a search warrant at the residence Lile had shared with his girlfriend. At that location they seized additional unauthorized electronic devices including two external hard drives, a laptop, and a cellphone.

    Forensic analysis of the electronics is ongoing. One of the external hard drives was found to contain more than 130,000 files of child sexual abuse. One folder alone allegedly contains more than fifty videos and picture files of infants and toddlers being sexually abused.

    Law enforcement was in the process of pursuing a report from Google to the National Center for Missing and Exploited Children (NCMEC) about Lile uploading images of child sexual abuse when the Department of Corrections found the unapproved electronics.

    Possession of images of child sexual abuse is punishable by up to 20 years imprisonment and carries a mandatory minimum of ten years in this circumstance.

    The charges contained in the criminal complaint are only allegations.  A person is presumed innocent unless and until he or she is proven guilty beyond a reasonable doubt in a court of law.

    The case is being investigated by Homeland Security Investigations (HSI), the Washington State Department of Corrections and the Kirkland Police Department.

    The case is being prosecuted by Assistant United States Attorney Cecelia Gregson.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: Convicted Child Predator Sentenced To 16 Years In Federal Prison For Distributing Child Sexual Abuse Material

    Source: Office of United States Attorneys

    Offender Committed New Crime Less Than Three Months After Being Released From Prison for a Prior Child Exploitation Offense

    ASHEVILLE, N.C. – A previously-convicted child predator was sentenced to 192 months in prison today for distribution of child sexual abuse material (CSAM), announced Russ Ferguson, U.S. Attorney for the Western District of North Carolina. Justin Matthew Adkins, 40, of Marion, North Carolina, was also ordered to serve a lifetime of supervised release and to register as a sex offender after he is released from prison.

    According to records, Adkins was convicted of Second-Degree Exploitation of a Minor in Buncombe County and was sentenced to a term of imprisonment. Adkins was released from state custody in April 2023, and was placed on post-release supervision until 2028. On November 7, 2023, officers with the North Carolina Department of Adult Corrections, deputies with the McDowell County Sheriff’s Office, and deputy marshals with the U.S. Marshals Service conducted a probation search at Adkins’ home. During the search, law enforcement reviewed Adkins’s electronic devices for compliance with his post-release conditions and found that the defendant possessed CSAM. Law enforcement also seized narcotics and drug paraphernalia.

    Court records show that a computer forensic analyst with Homeland Security Investigations (HSI) analyzed Adkins’s electronic devices and located thousands of CSAM images and videos depicting the sexual abuse of prepubescent children. The analysis also revealed that Adkins had distributed CSAM to other individuals online.

    On December 18, 2024, Adkins pleaded guilty to distribution of child pornography. He is in federal custody and will be transferred to the custody of the Federal Bureau of Prisons upon designation of a federal facility.

    In making today’s announcement, U.S. Attorney Ferguson commended HSI in Greenville, the U.S. Marshals Service, the North Carolina Department of Adult Corrections, and the McDowell County Sheriff’s Office.

    Assistant United States Attorney Alexis Solheim of the U.S. Attorney’s Office in Asheville prosecuted the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse, launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

     

     

     

     

     

     

    MIL Security OSI

  • MIL-OSI Security: Saratoga County Man Arrested and Charged with Sexual Exploitation of a Child

    Source: Office of United States Attorneys

    ALBANY, NEW YORK – Eric Mosier, age 37, of Galway, New York, made an initial appearance yesterday on a criminal complaint charging him with the sexual exploitation of a child.   United States Attorney John A. Sarcone III and Erin Keegan, Special Agent in Charge of the Homeland Security Investigations (HSI) Buffalo Field Office, made the announcement.

    According to the complaint, between on or about March 1, 2025 and May 17, 2025, Mosier used a 4-year-old child to engage in sexually explicit conduct for the purpose of creating child sexual abuse material. The charge in the complaint is merely an accusation. The defendant is presumed innocent unless and until proven guilty.

    United States Attorney John A. Sarcone III stated, “We are thankful for the quick response of the New York State Police and HSI, which led to the defendant’s arrest. As U.S. Attorney I will continue to do everything I can to keep our children safe from sexual predators and pedophiles.”

    HSI Special Agent in Charge Erin Keegan stated: “Through his alleged crimes, the defendant subjected this four-year-old victim to unimaginable exploitation and trauma. Our children deserve the right to be children, free from the awareness of the darkness that exists in our society. HSI Albany commits to working with our state and federal partners in our pursuit for justice on behalf of this victim.”

    Mosier initially appeared yesterday afternoon before United States Magistrate Daniel J. Stewart and was ordered detained pending trial.  If convicted, he faces at least 15 years and up to 30 years in prison, a fine of up to $250,000, and a supervised release term of at least 5 years and up to life.  Mosier may also be ordered to pay restitution to the victim of his offense and forfeit the device used in the offense.  A defendant’s sentence is imposed by a judge based on the particular statute the defendant is convicted of violating, the U.S. Sentencing Guidelines, and other factors.  If convicted, Mosier would also have to register as a sex offender upon his release from prison.

    HSI is investigating this case with assistance from the New York State Police and its Internet Crimes Against Children Task Force.  Assistant United States Attorneys Joseph Hartunian and Allen J. Vickey are prosecuting this case as part of Project Safe Childhood.

    Launched in May 2006 by the Department of Justice, Project Safe Childhood is led by United States Attorney’s offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), and is designed to marshal federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc

    MIL Security OSI

  • MIL-OSI Security: Cayuga County Man Sentenced to 12 Years for Possessing Child Pornography

    Source: Office of United States Attorneys

    SYRACUSE, NEW YORK – Andrew Wilbur, age 25, was sentenced today to 12 years’ incarceration for possessing child pornography. United States Attorney John A. Sarcone III and Craig L. Tremaroli, Special Agent in Charge of the Albany Field Office of the Federal Bureau of Investigation (FBI), made the announcement.

    As a part of his prior guilty plea, Wilbur, who previously served a state sentence for a 2019 child pornography conviction in Cayuga County Court, admitted that between January and May of 2024 he possessed child pornography images and videos depicting children as young as 4 years old being sexually abused.  Wilbur admitted that he maintained these files in both an online social communication platform, and on his cellular telephone.    

    In addition to the 12-year sentence, Wilbur was ordered to serve 15 years of supervised release following his term of incarceration, and to forfeit the cellular telephone he used to commit the offense. In addition, Wilbur will be required to continue to register as a sex offender.

    United States Attorney John A. Sarcone III stated, “This arrest continues to demonstrate my office’s close cooperation with our state and local partners to prosecute offenders to the fullest extent of the law, especially those who repeatedly victimize children.”

    FBI Special Agent in Charge Tremaroli said, “This sentence sends a clear message that our office will use every resource available to bring individuals who repeatedly victimize innocent children to justice. We remain committed to working with our law enforcement partners to protect our communities from these dangerous predators.”

    The FBI’s Child Exploitation and Human Trafficking Task Force investigated this case, which was initiated by the New York State Police, and the Cayuga County District Attorney’s Office. Assistant U.S. Attorney Lisa Fletcher, Project Safe Childhood Coordinator for the Northern District of New York, prosecuted the case. 

    Project Safe Childhood is a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse. Led by the U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: 2023 Cryptocurrency Fraud Report Released

    Source: US FBI

    Losses related to cryptocurrency fraud totaled over $5.6 billion in 2023, a 45% increase in losses since 2022, according to a report from FBI’s Internet Crime Complaint Center (IC3) published on September 9, 2024. The number of complaints from the public regarding cryptocurrency fraud continues to steadily increase, reaching 69,000 in 2023.

    Cryptocurrency is a type of digital currency that you can use to buy goods or services or to invest. Examples of cryptocurrencies include bitcoin, ether, or tether.

    As the use of cryptocurrency in the global financial system continues to grow, criminals are increasingly using cryptocurrency due to its decentralized nature, the speed of irreversible transactions, and the ability to transfer value around the world. Using cryptocurrency also makes it harder for victims to recover stolen funds. Once an individual sends a payment, the recipient owns the cryptocurrency. Recipients often quickly transfer that digital currency into an account overseas for cashout purposes.

    Criminals can exploit cryptocurrencies in many types of criminal schemes. In 2023, most cryptocurrency complaints involved investment scams. These losses totaled $3.9 billion and accounted for almost 71% of all losses related to cryptocurrency in 2023. Other examples of scams associated with cryptocurrency include tech support, confidence and romance, and government impersonation scams.   

    Cryptocurrency investment fraud is the most common type of cryptocurrency scam. In this type of fraud, criminals use various means of manipulation to convince victims to deposit increasing amounts of money into financial “investments” using cryptocurrency. In truth, these investments are fake; criminal actors who are usually located overseas control—and ultimately steal—all victim money. As a result, victims typically lose everything they invested.

    Losses from cryptocurrency-related investment fraud schemes reported to the IC3 rose from $2.57 billion in 2022 to $3.96 billion in 2023‚a 53% increase. Many individuals have accumulated massive debt to cover losses from these fraudulent investments.

    Individuals aged 30-39 and 40-49 filed the most complaints related to cryptocurrency investment fraud (approximately 5,200 reports in each age group). But complainants over the age of 60 reported the highest losses (over $1.24 billion).

    Learn more about the process behind cryptocurrency investment fraud. 

    The FBI, along with the Department of Justice, law enforcement, regulatory agencies, and financial institution partners, is dedicated to identifying the perpetrators of these schemes and bringing them to justice.

    The FBI’s IC3 is the central intake hub for individuals in the U.S. or abroad to report fraud and cybercrime. The IC3 analyzes complaints and aggregates them to identify trends and help develop strategies to combat these schemes and protect scam victims from loss. IC3 also shares the complaints it receives with FBI field offices, other law enforcement agencies, and regulatory entities for further investigation or action, as appropriate.

    In February 2022, the FBI formed the Virtual Assets Unit (VAU), a specialized team dedicated to investigating cryptocurrency-related crimes. The VAU centralizes the FBI’s cryptocurrency expertise into one nerve center, providing technological equipment, blockchain analysis, virtual asset seizure training, and other sophisticated training for FBI personnel. 

    If you believe you or someone you know may be a victim of cryptocurrency fraud, immediately submit a report to the IC3 via ic3.gov or contact your local FBI field office and provide as much transaction information as possible. We encourage you to submit a complaint through ic3.gov, even if a financial loss did not occur.

    When submitting a report to ic3.gov, include as much as you can of the following information: 

    • Financial transaction details, including: 
      • Cryptocurrency wallet addresses 
      • The amounts and types of cryptocurrencies involved 
      • Date and time of the transactions, and transaction IDs (hash)
    • Information about how you met the scammer(s)
    • What platforms you used to communicate with the scammer(s)
    • Any website address(es) involved in the scheme
    • Any phone numbers or other identifiers you might have about the scammer(s)

    You can refer to IC3’s public service announcement, “FBI Guidance for Cryptocurrency Scam Victims,” for more information about what to report.

    Individuals aged 60 or older can also contact the National Elder Fraud Hotline (833-372-8311) to assist with filing an IC3 complaint. 

    MIL Security OSI

  • MIL-OSI Security: FBI Cyber Lead Urges Potential LockBit Victims to Contact Internet Crime Complaint Center

    Source: US FBI

    FBI Cyber Division Assistant Director Bryan Vorndran on June 5 highlighted the Bureau’s “ongoing disruption” of the LockBit ransomware group and its affiliates, and urged potential victims to contact the Bureau’s Internet Crime Complaint Center (IC3)

    The Bureau now has more than 7,000 LockBit decryption keys in its possession, Vorndran said in a keynote at the 2024 Boston Conference on Cyber Security. We can use these keys to help victims get their data back, he noted. Potential victims can contact IC3 by visiting our LockBit Victim Reporting Form at lockbitvictims.ic3.gov

    “We are reaching out to known LockBit victims and encouraging anyone who suspects they were a victim to visit our Internet Crime Complaint Center at ic3.gov,” he said.

    The LockBit ransomware variant has been utilized in over 2,400 cyberattacks around the world—more than 1,800 of which impacted victims in the U.S.—he said. These attacks have targeted various sectors and racked up “billions of dollars in damages,” Vorndran said.

    FBI Cyber Division Assistant Director Bryan Vorndran delivers a keynote address at the 2024 Boston Conference on Cyber Security on June 5, 2024.

    MIL Security OSI

  • MIL-OSI Security: Ohio Woman Loses Life Savings in Cryptocurrency Investment Scam

    Source: US FBI

    CLEVELAND – The United States Attorney’s Office for the Northern District of Ohio (USAO) has filed a civil complaint in forfeiture against 8,207,578 Tether (USDT) cryptocurrency, valued at more than $8.2 million. USDT is a virtual currency which are digital tokens of value circulated over the internet. Its transactions are publicly recorded on what is known as a blockchain.

    According to court documents, the FBI has identified 33 victims of an investment fraud scheme across the country, including a victim from Northeast Ohio residing in the city of Mentor. In total, victims lost approximately $4.9 million. Five more accounts have also been found to be affected and the FBI is attempting to identify the respective owners. The victims associated with the additional accounts have lost approximately $1,071,086.

    Investigators found that scammers initially contacted the victims through seemingly misdirected, or “wrong number,” text messages. The fraudster then gained the victim’s trust and affection using various manipulative tactics. Once trust was established with the victim, the fraudster would share how much success they, or someone they knew, had with investing in cryptocurrency. This personal testimonial lessened any uncertainties the victims may have had about virtual currencies and eventually had the intended effect to persuade the victim to proceed with the investment.

    The fraudster would then guide the victim, step-by-step, on how to open a legitimate cryptocurrency account, most often with a U.S. based virtual currency exchange such as Crypto.com or Coinbase. The scammer would walk the victim through the entire process of transferring money from their bank to the newly created cryptocurrency account. Next, the victim received instructions on how to transfer the purchased cryptocurrency assets to an online “investment platform,” which would turn out to be a fake site created by the fraudsters to look like a legitimate company. Information on the platforms promised lucrative returns which encouraged victims to invest further. However, once the victim transferred their funds to the “investment platform” they unknowingly handed over complete control and ownership of their funds to the scammer. 

    The complaint also outlines that the perpetrators of such investment fraud schemes often allow victims to withdraw a portion of their “profits” early on in the scheme to build trust and reinforce their belief that the “investment platform” was legitimate. But as the scheme progressed, victims were unable to withdraw their funds and given excuses as to why they could not access their funds. For example, the fraudsters referred to a fake “tax” requirement, stating that taxes must be paid on the proceeds generated from the investment platform. Knowing that the scam would run its course soon, the fraudsters used last-ditch efforts to lie to victims that they had to pay a tax. Ultimately, victims were locked out of their account on the investment platform and lost their funds.

    A woman in Lake County, Ohio became the target of such a scam when she responded to a text on her phone from an unknown number in November 2023. She began sharing information via text with the person and the two bonded over topics such as hobbies and religion. Over a period of time, the victim followed instructions from her new “friend” and opened an account at Crypto.com and then transferred funds into the account. When the victim wanted to withdraw funds, her “friend,” relented and said additional payments were needed and she complied. When the victim no longer had any funds left after making additional payments, her “friend” began to threaten her that he would send his friends to “take care of” her friends and family. Having lost her entire life savings of approximately $663,352, including funds from her Roth IRA, the victim filed a complaint with the FBI’s Internet Crime Complaint Center to report the losses in June 2024. The FBI Cleveland Division subsequently initiated an investigation.

    Investigators conducted a blockchain analysis and determined that a portion of the funds stolen from victims were converted to USDT cryptocurrency and placed into three cryptocurrency addresses. Law enforcement officers executed a federal seizure warrant to recover 8,207,578 USDT tokens, in November 2024. Tether Limited then transferred these funds to a law-enforcement-controlled virtual currency wallet.

    By the Complaint in Forfeiture filed on Feb. 27, 2025, the United States seeks to forfeit the entire 8,207,578 USDT cryptocurrency. In the complaint, the United States alleges that the cryptocurrency accounts also contained additional funds above the victims’ traceable losses and, as proceeds of fraud, are also subject to forfeiture. Additionally, the complaint alleges that such other funds were involved in money laundering violations.     

    The claims asserted in the complaint are allegations only, and the United States must prove these allegations by a preponderance of the evidence at trial.

    If successful in this forfeiture action, the United States would seek to return the stolen funds to the victims.

    The FBI Cleveland Division is actively investigating cryptocurrency fraud schemes perpetrated on victims throughout the United States, including in the Northern District of Ohio. The United States is represented in this matter by Assistant United States Attorney James L. Morford. The USAO would like to acknowledge Tether for its assistance in this matter.

    If you observe something that you believe might be fraudulent conduct involving an older adult, contact the dedicated National Elder Fraud Hotline at 1-833-FRAUD-11 or 1-833-372-8311 and visit the FBI’s IC3 Elder Fraud Complaint Center at IC3.gov to report it.

    View Complaint:

    /usao-ndoh/media/1391461/dl?inline 

    MIL Security OSI

  • MIL-OSI Security: Pelham Man Sentenced to 80 Years in Prison on Child Exploitation Charges

    Source: US FBI

    BIRMINGHAM, Ala. – A Pelham man was sentenced today on charges of sexual exploitation of a child, announced U.S. Attorney Prim F. Escalona and Homeland Security Investigations (HSI) Special Agent in Charge Kelly J. Blackmon.

    U.S. District Court Judge L. Scott Coogler sentenced Neal Richard Goodacre, 54, to 960 months in prison, followed by a life term of supervised release.  In July, Goodacre pleaded guilty to two counts of production of child pornography and one count of possession of child pornography. These convictions will require Goodacre to register as a sex offender in accordance with the Sex Offender Registration and Notification Act (SORNA).

    According to the plea agreement, in July 2023, the Queensland, Australia, Child Exploitation Task Force discovered images of child pornography on a Russian file-sharing website. Queensland officers connected the account used to post the images to Goodacre at a residence in Pelham, Alabama. On September 13, 2023, HSI executed a search warrant at Goodacre’s residence.  Agents recovered two electronic devices containing 29 images and one video of child pornography. Goodacre produced some of the child pornography he possessed.

    Homeland Security Investigations investigated the case along with the Queensland, Australia, Child Exploitation Task Force and the Pelham Police Department.  Assistant U.S. Attorney Daniel S. McBrayer prosecuted the case.

    If you suspect or become aware of possible sexual exploitation of a child, please contact law enforcement. To alert the FBI Birmingham Office, call 205-326-6166. Reports can also be filed with the National Center for Missing & Exploited Children (NCMEC) or online at www.cybertipline.org.

    The case was brought as part of Project Safe Childhood, a nationwide initiative launched by the Department of Justice in May 2006 to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    MIL Security OSI

  • MIL-OSI Security: Two Individuals Charged in Conspiracy to Sexually Exploit Children

    Source: US FBI

    BIRMINGHAM, Ala. – Two individuals have been indicted on multiple child sexual exploitation charges, announced U.S. Attorney Prim F. Escalona and FBI Special Agent in Charge Carlton L. Peeples.

    A five-count indictment filed in U.S. District Court charges Wisam A. Sharieff, 43, of Euless, Texas, and Blake Miller Barakat, aka “Hamna,” 50, of Shelby County, Alabama, with conspiracy to engage in the sexual exploitation of children, conspiracy to receive and distribute child pornography, sexual exploitation of children, distribution of child pornography, and possession of child pornography. 

    According to the indictment, between September 27, 2024, and October 15, 2024, Sharieff and Barakat conspired together to coerce a minor child to engage in sexually explicit conduct for the purpose of producing visual depictions of that conduct; and they conspired to receive and distribute child pornography.

    FBI Birmingham’s Child Exploitation and Human Trafficking Task Force investigated the case along with the FBI Dallas-Fort Worth Violent Crimes Task Force and the Shelby County Sheriff’s Office. Assistant United States Attorney R. Leann White is prosecuting the case.

    The case was brought as part of Project Safe Childhood, a nationwide initiative launched by the Department of Justice in May 2006 to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    An indictment contains only charges.  A defendant is presumed innocent unless and until proven guilty.    

    MIL Security OSI

  • MIL-OSI Security: New Hope Man Pleads Guilty to Cyberstalking, Extortion, and Production of Child Pornography and Agrees to 40-Year Prison Sentence

    Source: US FBI

    HUNTSVILLE, Ala. – A New Hope man pleaded guilty today to stalking and extorting a woman and producing child pornography involving two minor victims, announced U.S. Attorney Prim F. Escalona and Federal Bureau of Investigation Special Agent in Charge Carlton L. Peeples. 

    Donald Wayne Carmody, 30, of New Hope, Alabama, pleaded guilty before U.S. District Judge Liles C. Burke to cyberstalking, two counts of extortion, and two counts of production of child pornography. 

    According to the plea agreement, Carmody used anonymous text messages to threaten to release pictures of the victim on the internet if she did not send him intimate photographs. Carmody also obtained the victim’s login credentials for her social media accounts and accessed their contents. After Carmody was arrested on cyberstalking and extortion charges for this conduct, investigators discovered a USB thumb drive belonging to him that contained images of child pornography that involved two victims under the age of twelve. The FBI’s Video Forensic Analysis Unit compared the images from the thumb drive, which showed a person’s hand, to pictures of Carmody’s hands taken during the investigation. The Unit identified similar class and distinguishing characteristics between the images, demonstrating that the hand in the images on the thumb drive belonged to Carmody.     

    As part of the plea agreement, Carmody stipulated to a 480-month sentence of imprisonment for the offenses. If the Court rejects the stipulated sentence, Carmody or the United States could withdraw from the plea agreement. 

    The maximum penalty for cyberstalking is five years imprisonment. The maximum penalty for extortion is two years imprisonment. The maximum penalty for production of child pornography is 30 years imprisonment. Each offense also carries the possibility of a $250,000 fine.

    The FBI investigated the case. Valuable assistance was provided by the Madison County Sheriff’s Office. Assistant U.S. Attorney John M. Hundscheid is prosecuting the case.

    The U.S. Attorney’s Office (USAO) and the National Children’s Advocacy Center (NCAC) have partnered and released a digital series to educate parents and caretakers about sextortion and how they can help prevent kids and teens from being victims. This series offers three-to-five-minute videos about current online safety topics and provides essential information about the true dangers of online activities.  These videos titled “Sextortion Prevention” can be accessed at https://www.youtube.com/@nationalcac/videos

    If you suspect or become aware of possible sexual exploitation of a child, please contact law enforcement. To alert the FBI Birmingham Office, call 205-326-6166. Reports can also be filed with the National Center for Missing & Exploited Children (NCMEC) or online at www.cybertipline.org.

    The case was brought as part of Project Safe Childhood, a nationwide initiative launched by the Department of Justice in May 2006 to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov. For more resources on cybercrime, visit www.ic3.gov.

    MIL Security OSI

  • MIL-OSI Security: New Mexico Man Sentenced to More than 27 Years in Prison for Advertising and Selling Child Pornography Online

    Source: US FBI

    BIRMINGHAM, Ala. – A New Mexico man was sentenced yesterday on two felony charges related to his online child sexual exploitation activities, announced U.S. Attorney Prim F. Escalona and FBI Special Agent in Charge Carlton L. Peeples. 

    U.S. District Court Judge Anna M. Manasco sentenced Wesley Alan Crownover, II, 37, to 330 months in prison, followed by a life term of supervised release.  In August 2023, Crownover pleaded guilty to one count of advertising child pornography and one count of sale of child pornography. These convictions will require Crownover to register as a sex offender in accordance with the Sex Offender Registration and Notification Act (SORNA).

    According to the plea agreement, Crownover was a member of 10 separate online groups dedicated to users who have a sexual interest in children. Within some of these groups, Crownover marketed his child pornography collection comprising of thousands of images and videos for sale. When contacted by an FBI undercover agent in one of the online groups, Crownover sold 30 videos containing child sexual abuse material for $25.

    A federal complaint and arrest warrant were obtained in the Northern District of Alabama, and a search warrant for Crownover’s residence was obtained from the District of New Mexico. When the warrants were executed, Crownover was not on the premises. Nonetheless, he saw law enforcement at his residence and fled the state. Crownover was a fugitive from justice for only a few months before he was located in Colorado Springs, Colorado, and arrested by the United States Marshals Service.

    FBI Birmingham’s Child Exploitation and Human Trafficking Task Force investigated the case along with the assistance of FBI Albuquerque, New Mexico, and the United States Marshals Service. Assistant U.S. Attorneys R. Leann White and Kristen Osborne prosecuted the case.

    If you suspect or become aware of possible sexual exploitation of a child, please contact law enforcement. To alert the FBI Birmingham Office, call 205-326-6166. Reports can also be filed with the National Center for Missing & Exploited Children (NCMEC) or online at www.cybertipline.org.

    The case was brought as part of Project Safe Childhood, a nationwide initiative launched by the Department of Justice in May 2006 to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov

     

    MIL Security OSI

  • MIL-OSI Security: Wasilla Man Charged with Child Pornography, Firearm Offenses

    Source: US FBI

    ANCHORAGE, Alaska – A Wasilla man was charged by criminal complaint last week for allegedly possessing child pornography and possessing a firearm as a felon.

    According to court documents, in June 2022, law enforcement obtained and executed a search warrant for a cell phone belonging to Paul Allen Greeno, 44. Upon review of the phone’s contents, agents found images of child sexual abuse, including sexual abuse of toddlers aged one to four years old.

    On Aug. 5, 2024, the FBI executed a search warrant on Greeno’s person and residence. During the search, agents found four long gun rifles from a vehicle on his property. Several boxes of ammunition were also found in Greeno’s closet in his bedroom. Greeno was convicted of felony misconduct involving a weapon in December 2023.

    The criminal complaint filed against Greeno alleges that he befriended vulnerable youth in Anchorage with promises to supply them with drugs and then sexually exploited them.

    Greeno is charged with one count of being a felon in possession of a firearm and one count of possession of child pornography depicting minors who have not attained 12 years of age. If convicted, Greeno faces up to 20 years in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    U.S. Attorney S. Lane Tucker for the District of Alaska and Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office made the announcement.

    The FBI Anchorage Field Office is investigating the case. If anyone has information concerning Greeno’s alleged actions or may have encountered someone in person or online using the name Paul Allen Greeno, please contact the FBI Anchorage Field Office at (907) 276-4441 or anonymously at tips.fbi.gov.

    Assistant U.S. Attorney Alana Weber is prosecuting the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

    A criminal complaint is merely an allegation, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    ###

    MIL Security OSI

  • MIL-OSI Security: Arizona Man Associated with Online Terror Network Arrested for Production of Child Sex Abuse Material and Cyberstalking

    Source: US FBI

    Baron Martin, 20, of Tucson, Arizona, was arrested on Dec. 11 for producing child sexual abuse material and cyberstalking offenses carried out as part of his participation in online violent terror networks known as 764 and CVLT.

    “764 remains a dangerous network of violent extremists who systematically target children and weaponize child sexual abuse material for the purpose of furthering an accelerationist agenda, destroying civilized society, and causing the collapse of the U.S. Government,” said Assistant Attorney General for National Security Matthew G. Olsen. “The Department of Justice is fully committed to stopping 764’s acts of terrorism and disrupting the 764 network.”

    ”The Department’s Project Safe Childhood strives to protect America’s youth, whether from individual stalkers or organized, virtual networks,” said U.S. Attorney Gary Restaino for the District of Arizona. “This case serves not only to deter unlawful conduct, but also to encourage parents and children to remain vigilant and seek help when they encounter predatory and violent activity in the online world.”

    “The details in this case are simply horrific as the defendant allegedly coerced children to harm themselves multiple times,” said Executive Assistant Director Robert Wells of the FBI’s National Security Branch. “The FBI’s mission is to protect the American people and we take that especially seriously when it comes to the young and vulnerable. The FBI will use all of our authorities to investigate and hold accountable anyone who preys on children.”

    The unsealed complaint alleges that 764 is a network of violent extremists who engage in criminal conduct within the United States and abroad. Those involved with the 764 network, individually and as a network, methodically target vulnerable, underage populations across the United States and the globe by using known online social media communications platforms to support the possession, production, and sharing of extreme gore media and child sexual abuse material (CSAM) with vulnerable, juvenile populations. Members of 764 seek to desensitize young people to violence and break down societal norms regarding violence, and they normalize the possession, production, and sharing of explicit CSAM and gore material to corrupt and groom their victims toward future violence.

    Historically, members of 764 systematically target underage females, groom them, extort them, and force them to mutilate themselves or others and either film or photograph such activity, at times while streaming it online for other members of the network. The network members will then commonly edit compilation photographs or videos of their victims, share these photographs or videos on their social media platforms to gain notoriety among other members of the network, and spread fear among their victims all for the purpose of accelerating chaos under the 764 ideology with an aim toward the disruption of society. The network has shifted names over time and spawned known offshoot networks. Although the network moves between social media channels and changes its name, the core goals and membership remain consistent and appear under the overarching threat of 764.

    Since approximately 2021, “Convict” has appeared as a participant in chatrooms related to the online terror networks 764 and CVLT. According to the complaint, Martin admitted to using the moniker “Convict” on social media platforms and, on multiple occasions, claimed online to be an owner of 764 and CVLT, teaching 764 members how to extort victims, describing himself as the “king of extortion,” and boasting he was “the catalyst for thousands of extortions” in 764. Martin also created and posted on a social media platform a detailed guide on how to identify, groom, and extort vulnerable juveniles.

    The complaint accuses Martin of producing child sex abuse material on Discord, a chat and gaming platform, in September 2022, by making two separate minors self-mutilate for him. On one occasion, Martin had a 13-year-old child cut his name “in every possible place” she could to include her chest, stomach, and thighs, and threatened to “leak” pictures of her if she did not comply. On other occasions, Martin directed this same minor child to cut certain designs into her body to include swastikas and satanic symbols.

    Martin also directed another minor victim, 16, on Discord, to scratch herself with her nails, ordering her to “draw blood,” saying “I want it dripping.” He then told her to pour rubbing alcohol over the wounds. Martin later sent three videos of this sadistic abuse of the minor to another Discord user. In the videos, the minor is scratching her forearm with her nails and pouring rubbing alcohol onto the scratches before curling up in apparent pain with a rag in her mouth.

    Martin is also accused of cyberstalking a different 13-year-old minor for threats he sent over Discord in September 2022. Martin told this minor victim he put a “hit” on her grandmother, and he solicited individuals to kill the victim’s grandmother. Martin agreed to pay one person $3,000 to kidnap and murder the victim’s grandmother, whose address he provided. The complaint alleges that in a separate server chat, Martin posted the phone numbers of both the minor and her grandmother and told the network to contact both numbers to harass them.

    If convicted, Martin faces a penalty of up to 30 years in prison for producing child sexual abuse material and a penalty of up to 10 years in prison for cyberstalking when the victim is a minor and no bodily injury resulted from the conduct. Each offense also carries a fine of up to $250,000 and up to a lifetime of supervised release. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI is investigating the case.

    Assistant U.S. Attorneys Liza Granoff and Carin C. Duryée for the District of Arizona and Trial Attorneys Justin Sher and James Donnelly of the National Security Division’s Counterterrorism Section are prosecuting the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    A complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Registered Sex Offender Sentenced to 10 Years in Federal Prison for Child Pornography Offense

    Source: US FBI

    FORT SMITH – A Van Buren man was sentenced today to 120 months in prison followed by 10 years of supervised release on one count of Transportation of Child Pornography. The Honorable P.K. Holmes III presided over the sentencing hearing in the U.S. District Court in Fort Smith.

    According to court documents, James Allen Price, age 42, is a registered sex offender. In July 2023 law enforcement was alerted by NCMEC (National Center for Missing and Exploited Children) that someone had emailed child pornography from one email account to another. Subsequent law enforcement investigation identified Price as the owner of both email accounts. A federal search warrant was conducted on Price’s residence and electronic devices were seized. Price was interviewed by law enforcement where he admitted to emailing himself child pornography. Price possessed images of children under the age of twelve years old.

    U.S. Attorney David Clay Fowlkes of the Western District of Arkansas made the announcement.

    The Federal Bureau of Investigation, Van Buren Police Department and Joplin, Missouri Police Department investigated the case.

    Assistant U.S. Attorney Carly Marshall prosecuted the case.

    This case was prosecuted as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    Related court documents may be found on the Public Access to Electronic Records website @ www.pacer.gov.

    MIL Security OSI

  • MIL-OSI Security: Registered Sex Offender Charged with Sex Trafficking Children by Force

    Source: US FBI

    WASHINGTON – Linwood Barnhill, 59, a registered sex offender living in the District of Columbia, was arrested on May 1, 2025, and federally charged with sex trafficking children by force and related counts. The alleged offenses occurred between April 1, 2024, and April 29, 2025.

    The criminal complaint was announced today by U.S. Attorney Edward R. Martin Jr., FBI Special Agent in Chief Sean Ryan of the Washington Field Office Criminal and Cyber Division, and Chief Pamela Smith of the Metropolitan Police Department (MPD).

    Barnhill, a former officer with the Metropolitan Police Department, is charged with sex trafficking by force, fraud, or coercion; sex trafficking of children; coercion and enticement; transportation with intent to engage in criminal sexual activity; and interstate travel or transportation in aid of racketeering enterprises. According to the complaint, the defendant allegedly recruited a series of minor children to engage in commercial sex acts and financially profited from those commercial sex acts.

    This case is being investigated by FBI’s Child Exploitation and Human Trafficking Task Force. It is being prosecuted by Assistant U.S. Attorney Caroline Burrell.

    This case was brought as part of the Department of Justice’s Project Safe Childhood initiative. In February 2006, the Attorney General created Project Safe Childhood, a nationwide initiative designed to protect children from online exploitation and abuse. Led by the U.S. Attorney’s Offices, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet, as well as identify and rescue victims. For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    MIL Security OSI

  • MIL-OSI Security: Man Arraigned in Federal Court on Multiple Charges of Sexual Exploitation of Children

    Source: US FBI

    HUNTSVILLE, Ala. – A Lawrence County man was arraigned in federal court last week on multiple child sexual exploitation charges, announced U.S. Attorney Prim F. Escalona and FBI Special Agent in Charge Carlton Peeples.

    A 13-count indictment filed in U.S. District Court charges David Edward Collier, 46, with four counts of sexual exploitation of children, eight counts of transportation of child pornography, and one count of possession of child pornography.

    According to the indictment, between January 2017 and August 2022, Collier used, induced, or coerced minor children to engage in sexually explicit conduct for the purpose of producing any visual depiction of that conduct.  Between October 2022 and September 2023, Collier transported the child pornography.  Collier was also charged with possession of child pornography.  

    FBI North Alabama Violent Crime Task Force and Cybercrime Squad investigated the case along with the assistance of the Lawrence County Sheriff’s Office, Moulton Police Department, Madison County Sheriff’s Office, Huntsville Police Department, and Limestone County Sheriff’s Office. Assistant United States Attorney R. Leann White is prosecuting the case.

    The U.S. Attorney’s Office (USAO) and the National Children’s Advocacy Center (NCAC) have partnered and released a digital series to educate parents and caretakers about sextortion and how they can help prevent kids and teens from being victims. This series offers three-to-five-minute videos about current online safety topics and provides essential information about the true dangers of online activities.

    The videos can be accessed from the following locations:

    nationalcac.org/sextortion-prevention/

    https://www.youtube.com/@nationalcac

    The case was brought as part of Project Safe Childhood, a nationwide initiative launched by the Department of Justice in May 2006 to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    MIL Security OSI

  • MIL-OSI Security: Kentucky Man Sentenced to 25 Years in Prison Related to Sextortion Scheme

    Source: US FBI

    BIRMINGHAM, Ala. – A Kentucky man was sentenced today on a charge of sexual exploitation of children, announced U.S. Attorney Prim F. Escalona and Federal Bureau of Investigation Special Agent in Charge Carlton L. Peeples.

    U.S. District Court Judge L. Scott Coogler sentenced Aden Willis Yeager, 22, of Louisville, Kentucky, to 300 months in prison, followed by a life term of supervised release.  As part of his sentence, Yeager was ordered to pay $92,620 in restitution to the victims and a $50,000 special assessment under the Amy, Vicky, and Andy Act. In March, Yeager pleaded guilty to one count of production of child pornography. 

    According to the plea agreement, in November 2020, the West Alabama Human Trafficking Task Force received a CyberTipline report from the National Center for Missing and Exploited Children related to acts of sextortion committed by Yeager towards a minor female. Yeager coerced and enticed the minor to send him nude photos of herself, and then he sold the photos online.  When the minor would refuse to send more pictures, Yeager would threaten to send her nude photos to everyone in her contact list on social media. Further investigation revealed over 60 individual folders in Yeager’s Dropbox account that were labeled by female names and contained sexually explicit images and videos. FBI agents were able to positively identify and locate 19 minor females who had been contacted by Yeager to send pornographic photos.

    FBI Birmingham’s Child Exploitation and Human Trafficking Task Force investigated the case along with FBI Louisville, Kentucky; the West Alabama Human Trafficking Task Force; and the University of Alabama Police Department. Assistant U.S. Attorney R. Leann White prosecuted the case.

    The U.S. Attorney’s Office (USAO) and the National Children’s Advocacy Center (NCAC) have partnered and released a digital series to educate parents and caretakers about sextortion and how they can help prevent kids and teens from being victims. This series offers three-to-five-minute videos about current online safety topics and provides essential information about the true dangers of online activities.

    The videos can be accessed from the following locations:

    nationalcac.org/sextortion-prevention/

    https://www.youtube.com/@nationalcac

    If you suspect or become aware of possible sexual exploitation of a child, please contact law enforcement. To alert the FBI Birmingham Office, call 205-326-6166. Reports can also be filed with the National Center for Missing & Exploited Children (NCMEC) or online at www.cybertipline.org.

    The case was brought as part of Project Safe Childhood, a nationwide initiative launched by the Department of Justice in May 2006 to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    MIL Security OSI

  • MIL-OSI Security: Ketchikan Man Sentenced to 13 Years and Four Months for Running Child Pornography Distribution Group Chat

    Source: US FBI

    JUNEAU, Alaska – A Ketchikan man was sentenced today to 13 years and 4 months in prison for distributing child pornography through a group messaging platform.

    According to court documents, Walter William Onstad, 46, was an administrator of a messaging group known as “Anything Goes.” The chat was used exclusively to exchange child pornography, with some of the visuals depicting the sexual abuse of pre-pubescent minors.

    Court documents say investigators with the National Center for Missing and Exploited Children received a tip in April 2022 that an individual, later identified as Onstad, sent at least 12 images and videos of child pornography to another user through the messaging platform.

    An investigation revealed that Onstad solicited images depicting child sexual abuse from those wanting to enter the “Anything Goes” group chat. The defendant would personally verify the images, upload the images to the group chat and grant access to people who provided them.

    As the investigation continued, the defendants cell phone was taken by law enforcement and over 300 images and 40 videos of child sexual abuse were in his possession on the phone. The defendant admitted to being responsible for the possession and distribution of over 600 images. Some of the images he possessed and distributed included the sexual abuse of minors as young as infants and toddlers.

    “Mr. Onstad contributed to the victimization of children by running a child sexual abuse material distribution chat and was responsible for sharing hundreds of images of innocent children,” said U.S. Attorney S. Lane Tucker for the District of Alaska. “We will continue to work with law enforcement to relentlessly pursue, arrest and prosecute individuals who traffic images of child sexual abuse and hold them responsible for the incalculable damage they’ve caused.”

    “Innocent children are revictimized each time CSAM is distributed,” said Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office. “As an administrator of a CSAM distribution operation, Walter Onstad fueled a market that preys on our most vulnerable. No matter how they commit their crimes, those who sexually exploit children will be pursued and held accountable by the FBI and law enforcement partners, for justice and the safety of our children.”

    The Juneau Resident Agency of the FBI Anchorage Field Office, with assistance from the Ketchikan Police Department and North Carolina’s Internet Crimes Against Children (ICAC) Task Force, investigated the case.

    Assistant U.S. Attorney Jack Schmidt prosecuted the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: Chicago Man, Woman Charged in Fraud Scheme Targeting North Pole Business

    Source: US FBI

    FAIRBANKS, Alaska – A federal grand jury in Alaska returned an indictment charging a Chicago man and woman with allegedly running a scheme to defraud a North Pole restaurant of over $128,000.

    According to court documents, from July to August 2022, Jacob Centeno, 39, and Amber Davila, 35, allegedly illegally obtained banking and identification information for the restaurant and restaurant owner by gaining access to their email. The defendants used this information and access to misrepresent themselves as the owner and divert proceeds from the owner’s bank account to a different account registered under a false identity that the defendants created and had access to.

    In total, roughly $128,246 was diverted to the defendants’ fraudulent bank account between Aug. 4 and Aug. 9, 2022.

    As part of the scheme, Centeno and Davila allegedly purchased over $41,000 worth of money orders from the fraudulent bank account over the course of multiple days in Chicago. They then deposited the money orders into their various personal and business accounts in aggregate amounts of less than $10,000. Finally, to further conceal their scheme, they withdrew money from a business account registered in their names and deposited it into their personal accounts.

    Centeno and Davila were arrested in Chicago on June 4 and are charged with one count of aggravated identity theft in violation of 18 U.S.C. §1028A(a)(1), one count of conspiracy to commit wire fraud in violation of 18 U.S.C. §1349, five counts of wire fraud in violation of 18 U.S.C. §1343, one count conspiracy to commit money laundering in violation of 18 U.S.C. §1956(h), 18 U.S.C. §1956(a)(1)(B)(i), and eight counts of money laundering in violation of 18 U.S.C. §1956(a)(1)(B)(i). The defendants will make their initial court appearance on a later date. If convicted, they face a mandatory minimum of two years for aggravated identity theft, which is served consecutive to any other sentence for their alleged crimes. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    U.S. Attorney S. Lane Tucker of the District of Alaska and Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office made the announcement.

    The FBI Anchorage Field Office, FBI Fairbanks Resident Agency, FBI Chicago Field Office and North Pole Police Department are investigating the case.

    Assistant U.S. Attorneys Carly Vosacek and Michael Heyman are prosecuting the case. The U.S. Attorney’s Office, Northern District of Illinois provided significant legal support in this case.

    If you or someone you know might be a victim of fraud or other crime, you can report it to the FBI at tips.fbi.gov or through the Internet Crime Complaint Center (IC3) at ic3.gov.

    An indictment is merely an allegation, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    ###

    UPDATE: This release has been updated to no longer state that the indictment came back “today” and correct the year in paragraph three from “2024” to “2022” in the text. 

    MIL Security OSI

  • MIL-OSI Security: Yellville Man Sentenced to 30 Years in Federal Prison for Online Sexual Enticement of a Minor

    Source: US FBI

    FayettevilleIsaac James Melder, age 42, of Yellville was sentenced on February 13, 2024, to 360 months in prison without the possibility of parole after being found guilty of communicating with a minor through the internet to entice the minor to engage in illegal sexual activity.  The Honorable Judge Timothy L. Brooks presided over the sentencing hearing in the U.S. District Court in Fayetteville.

    According to court documents, in May of 2022, a fourteen-year-old female was reported missing after failing to get on the afternoon school bus.  An extensive search involving multiple law enforcement agencies began, during which officers discovered that Melder and the victim had communicated via the internet using an Xbox.  The messages revealed the two had planned to run away and live in a cave in the Marion County wilderness. The investigation further revealed that Melder had groomed both the victim and her family by providing groceries, money, alcohol, and marijuana and referred to the victim as his wife.

    On June 22, 2022, an informant led law enforcement to the cave where Melder and the victim had lived since their May disappearance.  Melder was immediately taken into state custody.

    Melder was indicted by a Grand Jury in the Western District in April of 2023 and entered a plea of guilty in July 2023.

    U.S. Attorney David Clay Fowlkes of the Western District of Arkansas made the announcement.

    Mountain Home Police Department, Baxter County Sheriff’s Office, Marion County Sheriff’s Office, Arkansas State Police, Flippin Police Department, Arkansas Department of Correction, the U.S. Marshal’s Service, Federal Bureau of Investigation, Harrison Police Department, Arkansas Game and Fish Commission, Arkansas State Parks, the 14th Judicial District Drug Task Force, investigated or assisted in the search in the case.

    Assistant U.S. Attorney Devon Still prosecuted the case for the United States.

    This case was prosecuted as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    Related court documents may be found on the Public Access to Electronic Records website @ www.pacer.gov

    MIL Security OSI

  • MIL-OSI Security: FBI San Diego Seizes Cryptocurrency Recovery Websites

    Source: US FBI

    SAN DIEGO — Special Agents with the FBI San Diego Field Office have seized websites belonging to three cryptocurrency recovery services. The seizures come as the FBI continues to crack down on an emerging scam tactic aimed at further defrauding cryptocurrency scam victims.

    The web domains were from the following cryptocurrency recovery services: MyChargeBack, Payback LTD, and Claim Justice. These companies claim to provide cryptocurrency tracing and promise the ability to recover lost funds. Representatives of these companies often advertise strong success in recovering victim funds but have no track record in doing so. They often charge significant upfront fees and ask for a commission should funds be recovered. These companies use extensive social media advertising, including false reviews, to convince victims of the legitimacy of their services.

    Potential ways to identify this type of scheme:

    • Recovery scheme fraudsters charge an up-front fee and either cease communication with the victim after receiving an initial deposit or produce an incomplete or inaccurate tracing report. They may also request additional fees to recover funds.
    • Fraudsters may claim affiliation with law enforcement or legal services to appear legitimate.
    • Scammers may reference actual financial institutions and money exchanges to build credibility and further their schemes.

    Tips to avoid becoming a victim:

    • Be wary of advertisements for cryptocurrency recovery services. Research the advertised company and beware if the company uses vague language, has a minimal online presence, and makes promises regarding an ability to recover funds.
    • If an unknown individual contacts you and claims to be able to recover stolen cryptocurrency, do not release any financial or personal identifying information, and do not send money.
    • Law enforcement does not charge victims a fee for investigating crimes. If someone claims an affiliation with the FBI, contact the FBI San Diego Field Office at 858-320-1800 to confirm.

    Individuals who believe they may have been a victim of this type of scheme should file a report with the FBI’s Internet Crime Complaint Center at ic3.gov.

    MIL Security OSI

  • MIL-OSI Security: Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers

    Source: US FBI

    Note: View the affidavit here.

    The Justice Department today announced a court-authorized law enforcement operation that disrupted a botnet consisting of more than 200,000 consumer devices in the United States and worldwide. As described in court documents unsealed in the Western District of Pennsylvania, the botnet devices were infected by People’s Republic of China (PRC) state-sponsored hackers working for Integrity Technology Group, a company based in Beijing, and known to the private sector as “Flax Typhoon.”

    The botnet malware infected numerous types of consumer devices, including small-office/home-office (SOHO) routers, internet protocol (IP) cameras, digital video recorders (DVRs), and network-attached storage (NAS) devices. The malware connected these thousands of infected devices into a botnet, controlled by Integrity Technology Group, which was used to conduct malicious cyber activity disguised as routine internet traffic from the infected consumer devices. The court-authorized operation took control of the hackers’ computer infrastructure and, among other steps, sent disabling commands through that infrastructure to the malware on the infected devices. During the course of the operation, there was an attempt to interfere with the FBI’s remediation efforts through a distributed denial-of-service (DDoS) attack targeting the operational infrastructure that the FBI was utilizing to effectuate the court’s orders. That attack was ultimately unsuccessful in preventing the FBI’s disruption of the botnet.

    “The Justice Department is zeroing in on the Chinese government backed hacking groups that target the devices of innocent Americans and pose a serious threat to our national security,” said Attorney General Merrick B. Garland. “As we did earlier this year, the Justice Department has again destroyed a botnet used by PRC-backed hackers to infiltrate consumer devices here in the United States and around the world. We will continue to aggressively counter the threat that China’s state- sponsored hacking groups pose to the American people.”

    “Our takedown of this state-sponsored botnet reflects the Department’s all-tools approach to disrupting cyber criminals. This network, managed by a PRC government contractor, hijacked hundreds of thousands of private routers, cameras, and other consumer devices to create a malicious system for the PRC to exploit,” said Deputy Attorney General Lisa Monaco. “Today should serve as a warning to cybercriminals preying on Americans – if you continue to come for us, we will come for you.”

    “This dynamic operation demonstrates, once again, the Justice Department’s resolve in countering the threats posed by PRC state-sponsored hackers,” said Assistant Attorney General Matthew G. Olsen of the National Security Division. “For the second time this year, we have disrupted a botnet used by PRC proxies to conceal their efforts to hack into networks in the U.S. and around the world to steal information and hold our infrastructure at risk. Our message to these hackers is clear: if you build it, we will bust it.”

    “The disruption of this worldwide botnet is part of the FBI’s commitment to using technical operations to help protect victims, expose publicly the scope of these criminal hacking campaigns, and to use the adversary’s tools against them to remove malicious infrastructure from the virtual battlefield,” said FBI Deputy Director Paul Abbate. “The FBI’s unique legal authorities allowed it to lead an international operation with partners that collectively disconnected this botnet from its China-based hackers at Integrity Technology Group.”

    “The targeted hacking of hundreds of thousands of innocent victims in the United States and around the world shows the breadth and aggressiveness of PRC state-sponsored hackers,” said U.S. Attorney Eric G. Olshan for the Western District of Pennsylvania. “This court-authorized operation disrupted a sophisticated botnet designed to steal sensitive information and launch disruptive cyber attacks. We will continue to work with our partners inside and outside government, using every tool at our disposal, to defend and maintain global cybersecurity.”

    “The FBI’s investigation revealed that a publicly-traded, China-based company is openly selling its customers the ability to hack into and control thousands of consumer devices worldwide. This operation sends a clear message to the PRC that the United States will not tolerate this shameless criminal conduct,” said Special Agent in Charge Stacey Moy of the FBI San Diego Field Office.

    According to the court documents, the botnet was developed and controlled by Integrity Technology Group, a publicly-traded company headquartered in Beijing. The company built an online application allowing its customers to log in and control specified infected victim devices, including with a menu of malicious cyber commands using a tool called “vulnerability-arsenal.” The online application was prominently labelled “KRLab,” one of the main public brands used by Integrity Technology Group.

    The FBI assesses that Integrity Technology Group, in addition to developing and controlling the botnet, is responsible for computer intrusion activities attributed to China-based hackers known by the private sector as “Flax Typhoon.” Microsoft Threat Intelligence described Flax Typhoon as nation-state actors based out of China, active since 2021, who have targeted government agencies and education, critical manufacturing, and information technology organizations in Taiwan, and elsewhere. The FBI’s investigation has corroborated Microsoft’s conclusions, finding that Flax Typhoon has successfully attacked multiple U.S. and foreign corporations, universities, government agencies, telecommunications providers, and media organizations.

    A cybersecurity advisory describing Integrity Technology Group tactics, techniques and procedures was also published today by the FBI, the National Security Agency, U.S. Cyber Command’s Cyber National Mission Force, and partner agencies in Australia, Canada, New Zealand and the United Kingdom. 

    The government’s malware disabling commands, which interacted with the malware’s native functionality, were extensively tested prior to the operation. As expected, the operation did not affect the legitimate functions of, or collect content information from, the infected devices. The FBI is providing notice to U.S. owners of devices that were affected by this court-authorized operation. The FBI is contacting those victims through their internet service provider, who will provide notice to their customers.

    The FBI’s San Diego Field Office and Cyber Division, the U.S. Attorney’s Office for the Western District of Pennsylvania, and the National Security Cyber Section of the Justice Department’s National Security Division led the domestic disruption effort. Assistance was also provided by the Criminal Division’s Computer Crime and Intellectual Property Section. These efforts would not have been successful without the collaboration of partners, including French authorities, and Lumen Technologies’ threat intelligence group, Black Lotus Labs, which first identified and described this botnet, which it named Raptor Train, in July 2023.

    If you believe you have a compromised computer or device, please visit the FBI’s Internet Crime Complaint Center (IC3) or report online to CISA. You may also contact your local FBI field office directly.

    The FBI continues to investigate Integrity Technology Group’s and Flax Typhoon’s computer intrusion activities.

    MIL Security OSI

  • MIL-OSI USA: ICE, Europol, law enforcement partners, dismantle major illicit drug networks in global Darknet crackdown

    Source: US Immigration and Customs Enforcement

    WASHINGTON — U.S. Immigration and Customs Enforcement, in collaboration with Europol, the Joint Criminal Opioid and Darknet Enforcement Team, and various national and international partners, announced the results of Operation RapTOR May 22. This historic takedown, led by Europol, resulted in the highest number of seizures in JCODE’s history.

    The seizures, to which ICE Homeland Security Investigations significantly contributed, include more than $200 million in currency and digital assets, over two metric tons of drugs, comprised of 144 kilograms of fentanyl or fentanyl-laced narcotics, and over 180 firearms. In addition, the United States and international law enforcement partners made 270 arrests of dark web vendors, buyers, and administrators in Austria, Brazil, France, Germany, Netherlands, South Korea, Spain, Switzerland, United Kingdom, and the United States.

    Led by Europol’s European Cyber Crime Centre Operation RapTOR united the FBI-led JCODE team — comprised of ICE HSI and law enforcement partners from the United States, Europe, South America, and Asia — to disrupt fentanyl and opioid trafficking, as well as sale of other illicit goods and services on the Darknet. Building on the successes of prior years’ operations, Operation RapTOR furthered global efforts to dismantle darknet marketplaces, resulting in the seizure of darknet infrastructure from Nemesis, Tor2Door, Bohemia, and Kingdom Markets. These actions provided investigators across the globe with invaluable leads and evidence, strengthening the ongoing fight against cybercrime and illicit activities on the darknet.

    “This record-breaking operation sends a clear message to every trafficker hiding behind a screen — your anonymity ends where our global reach begins,” said ICE acting Director Todd Lyons. “Thanks to the unwavering efforts by ICE HSI, Europol and our international partners, we’re cracking the code of the so-called ‘safe spaces’ for cybercriminals — they are in our sights and we’re not backing down.”

    The Head of Europol’s European Cybercrime Centre, Edvardas Šileris, commented: “Operation RapTor shows that the dark web is not beyond the reach of law enforcement. Through close cooperation and intelligence sharing, officers across three continents identified and arrested suspects, sending a clear message to those who think they can hide in the shadows. Europol will continue working with our partners to make the internet safer for everyone.”

    In furtherance of Operation RapTOR and in their first action as a JCODE member agency, the Office of Foreign Assets Control (OFAC) additionally sanctioned Behrouz Parsarad, an Iranian national, for his role as the founder and operator of Nemesis Market following seizure of the market.

    “This historic international seizure of firearms, deadly drugs, and illegal funds will save lives,” said Attorney General Pam Bondi. “Criminals cannot hide behind computer screens or seek refuge on the dark web — this Justice Department will identify and eliminate threats to the American people regardless of where they originate.”

    “By cowardly hiding online, these traffickers have wreaked havoc across our country and directly fueled the fentanyl crisis and gun violence impacting our American communities and neighborhoods. But the ease and accessibility of their crimes ends today,” said FBI Director Kash Patel. “The FBI could not do this work without our partners both at home and abroad, and the staggering success of this year’s record-breaking amount of fentanyl, guns, and drugs seized prove that our efforts are working. Anyone looking to anonymously harm our citizens through illicit darknet trafficking: your days of recklessness are numbered.”

    “These predators who peddled poison on the dark web might have thought they are untouchable — hiding behind screens, pushing fentanyl, fueling overdoses, and cashing in on misery. However, Operation RapTor just proved them wrong,” said DEA acting Administrator Robert Murphy. “DEA and our global partners reached across borders, across platforms, and across currencies to rip their networks apart. Let this stand as a warning: no mask, no marketplace, and no digital wallet can hide you from facing justice.”

    “This unprecedented operation is a testament to the power of global partnership and the unwavering dedication of our team,” said Chief Guy Ficco of IRS Criminal Investigation (IRS-CI). “Working through the JCODE initiative, IRS Criminal Investigation and our international partners led the largest and most impactful takedown to date — seizing over $200 million in assets, removing deadly drugs and weapons from circulation, and holding more than 270 individuals accountable. This critical strike against dark web networks fueling the fentanyl crisis marks a proud moment in our ongoing effort to protect communities worldwide.”

    “Operation RapTor shows what’s possible when the U.S. Postal Inspection Service and our partners around the world stand united. No matter where criminals hide, we will find them, dismantle their operations, and bring them to justice. This operation was about protecting innocent people from predatory criminals who profit from violence, addiction, and fear. Our commitment is unwavering,” said Chief Postal Inspector Gary Barksdale, United States Postal Inspection Service.

    “The FDA is committed to continuing its work to disrupt and dismantle the illegal sales of drugs on the dark web, where such sales far too often have tragic consequences,” said Chad Menster, Deputy Director of the Food and Drug Administration’s Office of Criminal Investigations (FDA OCI). “We will continue to monitor, investigate and bring to justice those who misuse the internet in a quest for profits with reckless disregard for the risk to public health and safety.”  

    The impact of Operation RapTOR builds on years-long legacy of dark web enforcement and the tireless work of HSI and our U.S. and international law enforcement partners, as seen in the following cases:

    • “Incognito Market” Owner Pleads Guilty For Operating One Of The Largest Illegal Narcotics Marketplaces On The Internet
      • Incognito Market sold more than $100 million of narcotics — including hundreds of kilograms of cocaine and methamphetamine as well as heroin, cocaine, LSD, MDMA, oxycodone, methamphetamine, ketamine, and alprazolam, and misbranded prescription medication. Incognito Market was available globally to anyone with internet access and was designed to foster seamless narcotics transactions across the world. It incorporated many features of legitimate e-commerce sites such as branding, advertising, and customer service. While concealing their identities users were able to search thousands of listings for narcotics of their choice. Prescription medication was also listed that was advertised as being authentic but was not, as seen in November 2023, when an undercover federal agent purchased and received several tablets that purported to be oxycodone, but were in fact, fentanyl pills.
    • Central District of California | Two Southern California Men Who Supplied Fentanyl Sold to Darknet Customers in All 50 States Sentenced to Federal Prison | United States Department of Justice
      • Ruiz of Orange County was sentenced to over 17 years in federal prison, and Omar Navia of South Los Angeles was separately sentenced to 15 years in federal prison in January 2025 for supplying fentanyl-laced pills to a drug trafficking ring that sold these drugs to more than 1,000 customers nationwide via the Darknet Navia and Ruiz admitted that at least August 2021 to December 2022, they supplied fentanyl-laced pills to Michael Ta, 26, of Westminster, and Rajiv Srinivasan, 38, of Houston, who used the Darknet and encrypted messaging applications to sell more than 120,000 fentanyl-laced pills, 20 pounds of methamphetamine, and other drugs directly to more than 1,000 customers in all 50 states, causing several fatal overdoses in the process.
    • In February 2024, the Eastern District of Virginia issued a criminal complaint charging Joshua Vasquez, Joseph Vasquez, and Rafael Roman with conspiracy to distribute 500 grams or more of methamphetamine.
      • Joshua Vasquez, Joseph Vasquez, and Rafael Roman conspired to sell counterfeit Adderall containing methamphetamine on darknet markets such as Bohemia and Tor2Door. The defendants allegedly sold drugs on darknet marketplaces in exchange for cryptocurrency. Collectively, these prolific darknet vendors were responsible fulfilling over 13 thousand drug orders shipped throughout the United States, ranging in size from user quantities, e.g., 5 pills, to “reseller” quantities, e.g., 10 thousand pills. While executing search warrants in New Jersey and New York, Federal Law Enforcement officers seized more than $330 thousand, close to 80 thousand counterfeit Adderall pills, one firearm, and two industrial pill press machines. FBI, FDA, and USPIS investigated this matter with significant contributions from HSI and our law enforcement partners.
    • Van Nuys Man Sentenced to More Than 20 Years in Prison for Trafficking Fentanyl and Cocaine via Darknet Marketplaces and Possessing Guns
      • A San Fernando Valley man was sentenced to 20 plus years in federal prison for using darknet marketplaces to sell hundreds of thousands of dollars’ worth of fentanyl-laced pills and cocaine to buyers nationwide. He admitted in court documents to causing one fatal fentanyl overdose. From at least April 2021 to May 2023, McDonald and others conspired to sell fentanyl and cocaine via multiple darknet marketplaces. Specifically, McDonald purchased bulk quantities of fentanyl and cocaine and then directed the activities of other coconspirators to carry out hundreds of drug sales involving the distribution of large quantities of both fentanyl and cocaine, including hundreds of thousands of fentanyl-laced pills. The FBI and the DEA investigated this matter as part of JCODE.

    “Cybercriminals think the Darknet makes them untouchable — we just proved they’re dead wrong,” said ICE HSI acting Executive Associate Director Robert Hammer. “HSI is on the front lines of a digital battlefield, deploying cutting-edge tech, relentless enforcement, and global coordination to hunt down these predators. Cybercrime is a global threat, and that’s why we’re committed to working hand-in-hand with our partners at Europol and across the world to dismantle these networks together. If you profit from pain online, we’re looking for you — and you’ll soon learn that no corner of the internet is beyond our reach.”

    Operation RapTOR includes law enforcement actions taken by JCODE member agencies, to include ICE HSI; the DEA; FBI; FDA-OCI; IRS-CI; and USPIS; in addition to foreign partners listed below. Credible reporting from the referenced agencies, in addition to contributions from ATF; Army CID; CBP; Department of Treasury’s FinCEN and Office of Foreign Assets Control; and NCIS enabled domestic law enforcement actions in support of Operation RapTOR. Local, state, and other federal agencies also contributed to investigations through task force participation and regional partnerships. The investigations leading to Operation RapTOR were significantly aided by support and coordination from the Justice Department Criminal Division’s Narcotic and Dangerous Drug Section and Computer Crime and Intellectual Property Section, with additional support from the Organized Crime Drug Enforcement Task Forces; multi-agency Special Operations Division; Money Laundering and Asset Recovery Section’s Digital Currency Initiative, and Fraud Section; the Justice Department’s Office of International Affairs; Europol and its Dark Web team; and international partners.

    The international partners include Europol; Eurojust; Austria’s Criminal Intelligence Service with various Provincial Criminal Police Departments (Bundeskriminalamt und Landeskriminalämter); Brazil’s Civil Police of the State of Pará (Polícia Civil do Estado do Pará) and Civil Police of the State of São Paulo (Polícia Civil do Estado do São Paulo); France’s French Customs (Douane), National Gendarmerie (Gendarmerie Nationale); Germany‘s Federal Criminal Police Office (Bundeskriminalamt), Prosecutor’s Office in Cologne – Central Cybercrime Contact Point (Staatsanwaltschaft Köln, Zentral- und Ansprechstelle Cybercrime), Central Criminal Investigation in Oldenburg (Zentrale Kriminalinspektion Oldenburg) various police departments (Dienststellen der Länderpolizeien), German Customs Investigation (Zollfahndungsämter); The Netherlands’s National Police (Politie), Post Interventie Team; Spain’s National Police (Policía Nacional); South Korea’s Seoul Central District Prosecutors’ Office – Darknet Investigations Unit; Switzerland’s Zurich Cantonal Police (Kantonspolizei Zürich) and Public Prosecutor’s Office II of the Canton of Zurich (Staatsanwaltschaft II); and the United Kingdom’s National Crime Agency, National Police Chiefs’ Council.

    HSI is a worldwide law enforcement leader in Darknet and other cyber-related criminal investigations. The DHS Cyber Crimes Center (C3) combats cybercrime, online child sexual exploitation, and criminal exploitation of the internet with state-of-the-art forensic technology. The Center investigates large-scale cybercrime threats and provides expertise on cybercrime investigations to the field. It also uses global law enforcement networks, like Europol, to combat cybercrime threats.

    C3 delivers computer and cyber-based technical services in support of HSI cases — including investigations into underground online marketplaces selling illegal drugs, weapons and other contraband; enabling the trade of images of child exploitation materials; and facilitating the theft of intellectual property, trade secrets, and export-controlled technology and data.

    Individuals across the world can report suspicious criminal activity to the ICE Tip Line 24 hours a day, seven days a week at 866-DHS-2-ICE. Highly trained specialists take reports from both the public and law enforcement agencies on more than 400 laws enforced by ICE.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI USA: SPC Severe Thunderstorm Watch 311

    Source: US National Oceanic and Atmospheric Administration

    Note:  The expiration time in the watch graphic is amended if the watch is replaced, cancelled or extended.Note: Click for Watch Status Reports.
    SEL1

    URGENT – IMMEDIATE BROADCAST REQUESTED
    Severe Thunderstorm Watch Number 311
    NWS Storm Prediction Center Norman OK
    1055 AM CDT Thu May 22 2025

    The NWS Storm Prediction Center has issued a

    * Severe Thunderstorm Watch for portions of
    Southern and East-Central Oklahoma
    North Texas

    * Effective this Thursday morning and afternoon from 1055 AM
    until 400 PM CDT.

    * Primary threats include…
    Scattered large hail likely with isolated very large hail events
    to 2.5 inches in diameter possible
    Scattered damaging wind gusts to 70 mph possible

    SUMMARY…Clusters of storms will continue to spread generally
    east-southeastward across the region, with large hail possible. The
    most intense storms are expected across southern Oklahoma into parts
    of North Texas, where damaging wind potential may also increase this
    afternoon.

    The severe thunderstorm watch area is approximately along and 70
    statute miles east and west of a line from 40 miles west northwest
    of Muskogee OK to 35 miles south of Sherman TX. For a complete
    depiction of the watch see the associated watch outline update
    (WOUS64 KWNS WOU1).

    PRECAUTIONARY/PREPAREDNESS ACTIONS…

    REMEMBER…A Severe Thunderstorm Watch means conditions are
    favorable for severe thunderstorms in and close to the watch area.
    Persons in these areas should be on the lookout for threatening
    weather conditions and listen for later statements and possible
    warnings. Severe thunderstorms can and occasionally do produce
    tornadoes.

    &&

    AVIATION…A few severe thunderstorms with hail surface and aloft to
    2.5 inches. Extreme turbulence and surface wind gusts to 60 knots. A
    few cumulonimbi with maximum tops to 500. Mean storm motion vector
    29020.

    …Guyer

    SEL1

    URGENT – IMMEDIATE BROADCAST REQUESTED
    Severe Thunderstorm Watch Number 311
    NWS Storm Prediction Center Norman OK
    1055 AM CDT Thu May 22 2025

    The NWS Storm Prediction Center has issued a

    * Severe Thunderstorm Watch for portions of
    Southern and East-Central Oklahoma
    North Texas

    * Effective this Thursday morning and afternoon from 1055 AM
    until 400 PM CDT.

    * Primary threats include…
    Scattered large hail likely with isolated very large hail events
    to 2.5 inches in diameter possible
    Scattered damaging wind gusts to 70 mph possible

    SUMMARY…Clusters of storms will continue to spread generally
    east-southeastward across the region, with large hail possible. The
    most intense storms are expected across southern Oklahoma into parts
    of North Texas, where damaging wind potential may also increase this
    afternoon.

    The severe thunderstorm watch area is approximately along and 70
    statute miles east and west of a line from 40 miles west northwest
    of Muskogee OK to 35 miles south of Sherman TX. For a complete
    depiction of the watch see the associated watch outline update
    (WOUS64 KWNS WOU1).

    PRECAUTIONARY/PREPAREDNESS ACTIONS…

    REMEMBER…A Severe Thunderstorm Watch means conditions are
    favorable for severe thunderstorms in and close to the watch area.
    Persons in these areas should be on the lookout for threatening
    weather conditions and listen for later statements and possible
    warnings. Severe thunderstorms can and occasionally do produce
    tornadoes.

    &&

    AVIATION…A few severe thunderstorms with hail surface and aloft to
    2.5 inches. Extreme turbulence and surface wind gusts to 60 knots. A
    few cumulonimbi with maximum tops to 500. Mean storm motion vector
    29020.

    …Guyer

    Note: The Aviation Watch (SAW) product is an approximation to the watch area. The actual watch is depicted by the shaded areas.
    SAW1
    WW 311 SEVERE TSTM OK TX 221555Z – 222100Z
    AXIS..70 STATUTE MILES EAST AND WEST OF LINE..
    40WNW MKO/MUSKOGEE OK/ – 35S GYI/SHERMAN TX/
    ..AVIATION COORDS.. 60NM E/W /22SSW TUL – 28NE TTT/
    HAIL SURFACE AND ALOFT..2.5 INCHES. WIND GUSTS..60 KNOTS.
    MAX TOPS TO 500. MEAN STORM MOTION VECTOR 29020.

    LAT…LON 35889478 33219546 33219788 35889728

    THIS IS AN APPROXIMATION TO THE WATCH AREA. FOR A
    COMPLETE DEPICTION OF THE WATCH SEE WOUS64 KWNS
    FOR WOU1.

    Watch 311 Status Report Message has not been issued yet.

    Note:  Click for Complete Product Text.Tornadoes

    Probability of 2 or more tornadoes

    Low (10%)

    Probability of 1 or more strong (EF2-EF5) tornadoes

    Low (10%)

    Wind

    Probability of 10 or more severe wind events

    Mod (40%)

    Probability of 1 or more wind events > 65 knots

    Low (20%)

    Hail

    Probability of 10 or more severe hail events

    Mod (60%)

    Probability of 1 or more hailstones > 2 inches

    Mod (40%)

    Combined Severe Hail/Wind

    Probability of 6 or more combined severe hail/wind events

    High (80%)

    For each watch, probabilities for particular events inside the watch (listed above in each table) are determined by the issuing forecaster. The “Low” category contains probability values ranging from less than 2% to 20% (EF2-EF5 tornadoes), less than 5% to 20% (all other probabilities), “Moderate” from 30% to 60%, and “High” from 70% to greater than 95%. High values are bolded and lighter in color to provide awareness of an increased threat for a particular event.

    MIL OSI USA News

  • MIL-OSI USA: Booker, Schumer, Padilla, Schiff, Raskin, Swalwell, and Johnson Introduce Bicameral Bill to Move US Marshals Service to Judicial Branch

    US Senate News:

    Source: United States Senator for New Jersey Cory Booker

    WASHINGTON, D.C. — Today, U.S. Senators Cory Booker (D-NJ), Democratic Leader Chuck Schumer (D-NY), Alex Padilla (D-CA), and Adam Schiff (D-CA) introduced legislation that would address the potential for weaponization of the U.S. Marshals Service (“Marshals” or “USMS”) by President Trump and the executive branch. The Maintaining Authority and Restoring Security to Halt the Abuse of Law Act (MARSHALS Act) would move the Marshals from the operation and direction of the executive branch to the judiciary, ensuring that USMS can perform its primary mission of protecting federal judges and to obeying, executing, and enforcing federal court orders without political interference. U.S. Representatives Eric Swalwell (D-CA-14), House Judiciary Committee Ranking Member Jamie Raskin (D-MD-08), and House Judiciary Subcommittee on Courts Ranking Member Hank Johnson (D-GA-04) introduced companion legislation in the House.

    President Trump and members of his Administration are systematically undermining judicial independence and the rule of law: the President himself called for impeachment of a federal judge who ruled against him, the Vice President has suggested that the executive branch does not need to follow court orders, and a federal judge has found that the Trump Administration demonstrated a “willful disregard” for its court order. Against the backdrop of Trump’s attacks on the rule of law, serious threats of violence against federal judges and their families have risen to alarming levels. Hundreds of unsolicited pizza deliveries have been sent to the homes of federal judges and their relatives across seven states in an apparent attempt to intimidate the judiciary. Many of the deliveries have been sent to judges who ruled against the Trump Administration and some have been placed in the name of Daniel Anderl, the son of New Jersey District Judge Esther Salas, who was fatally shot by an attorney who appeared in her courtroom.

    The USMS, the nation’s oldest federal law enforcement agency, risks being ensnared in Trump’s efforts to upend our constitutional order. While the USMS’s “primary role and mission” is to protect the federal judiciary and obey and enforce its court orders, the USMS is under the control of the executive branch, specifically the U.S. Attorney General who in turn answers to the President. The potential conflict looming between the USMS’s duty to provide security for and carry out the orders of the federal judiciary and the Attorney General’s control of the Marshals will put our democracy to the test if the Administration directs the USMS to ignore a court order or otherwise prevents the USMS from carrying out its duties. For example, at a recent meeting of the Judicial Conference of the United States, a federal judge expressed concern that the President could order the USMS to stop protecting judges.

    “President Trump has made it abundantly clear through his words and actions that he does not respect the law, court orders, the safety of our judges, or our institutions,” said Senator Booker. “Since 1789, the U.S. Marshals have valiantly protected our nation’s judges and enforced court orders. But their dual accountability to the executive branch and the judicial branch paves the way toward a constitutional crisis. To ensure these necessary functions are carried out, Congress must act to move the bureau into the judicial branch. Our U.S. Marshals are critical to protecting the rule of law, and they must be able to do their jobs without political interference.”

    “Trump’s tenure has been marked by corruption, chaos, and abuse, with his administration waging a war against the rule of law,” said Leader Schumer. “We will not allow Trump and Pam Bondi to interfere with the marshals as they enforce court orders, or weaponize them to intimidate government employees or American citizens. This legislation would protect the U.S. Marshals Service from abuse by the executive branch and ensure that law enforcement officers perform their essential duties.”

    “The Trump Administration has repeatedly undermined judicial independence and misused the U.S. Marshals Service for political gain,” said Senator Padilla. “They’ve politicized the Marshals Service by intimidating the former pardon attorney, threatening USAID officials, and potentially risking the security of federal judges. Our bill restores the Marshals Service’s independence by placing it within the judicial branch so it can fulfill its core mission of protecting judges and enforcing court orders without political interference.” 

    “We’ve seen threats against judges escalate as the president has threatened impeachment of those who rule against him. We have also seen the administration pull security from former officials who are still at risk because the president views them as enemies. And we have also seen the president ignore court orders he doesn’t like. The U.S. Marshals are central to preserving our democracy and upholding the rule of law. Marshals must be able to protect all judges, enforce all court orders and have the independence necessary to do their jobs,” said Senator Schiff.

    “We’re seeing a rise in outrageous attacks on federal judges simply for doing their jobs. Congress must act to make sure that our courts have reliable personal, physical and electronic security to count on, and that means security not subject to the discretionary whims of a president who may disrespect judicial independence and the rule of law. This legislation is necessary to fortify the independence of the judicial branch which is essential to the survival of strong democracy. Our legislation will ensure that the U.S. Marshals can perform their duties without political interference or coercive pressure from the president or anyone else in the executive branch,” said Ranking Member Raskin.

    “Judges should be in charge of their own security. Today, they’re not. And they’re facing more death threats than ever in the history of the judiciary. Today, independent judges must rely upon the executive branch, whose cases are often in front of them, for personal security. We’re in a constitutional crisis that necessitates a structural change to protect judges from political violence and intimidation,” said Congressman Swalwell. “I have seen how threats of violence to members of Congress pressure them into staying silent or influence their votes on the House floor. We cannot allow the same calculations to creep into the deliberations of independent judges. That is why I’m proud to introduce the MARSHALS Act to prevent political interference in the courts. In a time when we face a lawless president, giving the defendant command and control over the security of their judges is indefensible. That’s why my colleagues and I are moving forward to realign the U.S. Marshals Service under the judicial branch—the very institution they are sworn to protect.”

    “The independence of the judicial branch and the rule of law itself are under assault by Donald Trump and his MAGA cronies,” said Representative Johnson, ranking member of the House Judiciary Subcommittee on Courts, Intellectual Property, Artificial Intelligence, and the Internet. “Putting control of the U.S. Marshals Service squarely within the judiciary goes a long way towards protecting the judicial branch from continued abuse by the Trump Administration.”

    Specifically, the MARSHALS Act would: 

    1. Create a U.S. Marshals Board modeled on the Board of the U.S. Capitol Police, the federal law enforcement agency that protects Congress. The Board would consist of the Chief Justice of the United States and the Judicial Conference of the United States.
    2. Authorize the Chief Justice, in consultation with the Board, to select a Director of the U.S. Marshals Service and U.S. Marshals in each judicial district of the United States and its territories.
    3. Allow the Marshals to continue their existing work of protecting judges and enforcing judicial subpoenas and court orders without political interference and preserve their other law enforcement functions (pursuing fugitives, seeking missing children, etc.) at the request of the Attorney General and with the consent of the Director of the Marshals

    The MARSHALS Act is endorsed by the following organizations: Citizens for Responsibility and Ethics in Washington (CREW), Court Accountability, Demand Justice, Fix the Court, People for the American Way, and Public Citizen.

    “As a co-equal branch of government the judiciary should be responsible for the security of judges and should not have to rely on the benevolence of the executive branch to enforce court decisions,” said Debra Perlin, Vice President for Policy at Citizens for Responsibility and Ethics in Washington. “But under our current system the courts rely almost exclusively on the executive branch for judicial security with the Attorney General overseeing the U.S. Marshals Service, the Department of Justice bureau responsible for protecting judges and enforcing court orders. With threats against judges both from litigants and public officials reaching historic highs, it is past time for this to change. We thank the lead sponsors for introducing the MARSHALS Act and encourage all senators to work together to ensure that the judiciary can fulfill its constitutional and statutory functions safely and without fear of political interference.”

    “This legislation is a critical bolster for checks and balances at a time when the Trump administration is defying court orders and leveling threats against judges simply for doing their jobs. If we want fair-minded judges to be able to defend the rule of law, it’s essential that we empower the judiciary to ensure compliance with its orders and protect judges from a dangerous surge in violent threats,” said Alex Aronson, co-founder and executive director, Court Accountability.

    “Trump has shown us that virtually nothing is out-of-bounds when it comes to eliminating checks on his dangerous, unpopular agenda. The Marshals must be able to carry out their duties without political interference and judges deserve to have protection regardless of how they rule on cases. This has been made even clearer by Trump and his allies’ threats and intimidation tactics against federal judges and others they view as their political enemies. We applaud the bill sponsors for introducing this bill and taking this important first step,” said Maggie Jo Buchanan, Interim Executive Director of Demand Justice.

    “Presidents supervise more than a dozen law enforcement agencies, but the fact that the primary mission of one of them is to protect members of another branch has never made a whole lot of structural sense. I applaud the bill’s sponsors for crafting a bill to move that agency, the U.S. Marshals Service, from Article II to Article III, thereby ensuring that judges’ safety isn’t subject to interbranch politics or other distractions — all the more important today, as both Democratic and Republican appointees face unprecedented threats,” Fix the Court executive director Gabe Roth said.

    “The US Marshals Service plays an essential role in enforcing federal court orders and protecting federal judges. Now, with a president who is undermining the rule of law and challenging courts’ authority,  coupled with a rising tide of threats against federal judges, the integrity of the Marshals Service is more important than ever. Without fair and independent courts, our freedom to speak our minds and challenge those in power will come to an end. Judges must be able to freely and fairly interpret the law and the constitution without fear for theirs and their families’ safety. We cannot wait until it’s too late to protect our courts. We congratulate Senator Booker, Leader Schumer, Senator Schiff, and Senator Padilla on introducing this important legislation and lifting up the need for robust protections for the safety and sanctity of our federal courts,” said People For the American Way, President Svante Myrick.

    “This commonsense legislation from Leader Schumer, Senator Booker, Senator Schiff, and Senator Padilla will simply ensure that the judiciary’s decisions are followed. In this era of executive branch court defiance, a repositioning of the marshals within the judiciary branch is a sensible move to protect the prerogatives of our coequal branches of government. Public Citizen applauds this smart policy,” said Lisa Gilbert, Public Citizen, Co-President.

    To read the full text of the bill, click here.

    MIL OSI USA News

  • MIL-OSI: WISeKey Updates on the Negotiations to Acquire 100% of IC’ALPS

    Source: GlobeNewswire (MIL-OSI)

    WISeKey Updates on the Negotiations to Acquire 100% of IC’ALPS

    Geneva, Switzerland – May 22, 2025 – Ad-Hoc announcement pursuant to Art. 53 of SIX Listing Rules – WISeKey International Holding Ltd (NASDAQ: WKEY / SIX: WIHN) (“WISeKey” or “the Company”), a global leader in cybersecurity, digital identity, and IoT technologies, today shares an update on the exclusive negotiations entered into by its subsidiary, SEALSQ Corp (“SEALSQ”), a leading developer and provider of Semiconductors, PKI, and Post-Quantum technology hardware and software solutions, to acquire 100% of the share capital and voting rights of IC’ALPS SAS (“IC’ALPS”), an Application-Specific Integrated Circuit (“ASIC”) design and supply specialist based in Grenoble, France (“the Acquisition”).

    These exclusive negotiations result from the execution of a Letter of Intent with IC’ALPS and its shareholders (the “Sellers”). This proposed strategic Acquisition (subject to the signing of a Share Purchase Agreement and satisfaction of closing conditions) is expected to reinforce SEALSQ’s commitment to advancing its ASIC development to meet the growing demand in the sector and would add approximately 100 highly skilled staff based out of IC’ALPS’ current centers in Grenoble and Toulouse.

    SEALSQ and the Sellers have reached an agreement in principle to sign a Share Purchase Agreement (“SPA”) based on the following elements:

    • A fixed purchase price of EUR 12.5 million (subject to a ‘No Leakage’ undertaking clause) comprised of EUR 10 million consideration payable in cash and EUR 2.5 million consideration to be paid to one of the Sellers in fully paid and non-assessable Ordinary Shares of SEALSQ, the number of which would be calculated based on the volume weighted average price of an Ordinary Share of SEALSQ on the Nasdaq Stock Market during the ninety trading days ending on the trading day immediately prior to the closing of the Acquisition.
    • An earn-out payment in Ordinary Shares of up to EUR 4 million in value based on IC’ALPS achieving revenue in excess of EUR 11 million in the twelve months ending on December 31, 2025 (revenue to be accounted for in accordance with US GAAP and audited by SEALSQ’s statutory auditors).
    • The Ordinary Shares of SEALSQ to be issued as part of the equity consideration would be subject to a mandatory holding period of one hundred and eighty days from their date of issuance, during which the relevant Seller would be restricted from selling, transferring, or otherwise disposing of the SEALSQ Ordinary Shares.
    • Conditions precedent to the closing of the Acquisition include, among others, approval of the Acquisition by the French Ministry of the Economy in accordance with articles L.151-3 and R.151-1 et seq of the French Financial and Monetary Code (code monétaire et financier).

    During the year ended December 31, 2024, based solely on the draft unaudited revenue of IC’ALPS provided to SEALSQ using French GAAP was EUR9,756,000 with a net loss of EUR2,016,000. In the previous year, the audited revenue of IC’ALPS, based solely on the audited revenue of IC’ALPS provided to SEALSQ, using French GAAP was EUR 8,465,000 with a net income of EUR318,000. As further detailed below, upon completion of the Acquisition, it is anticipated that SEALSQ would prepare full audited financial statements using US GAAP for both years ended December 31, 2024 and 2023, and that this might lead to material adjustment to these numbers.

    We note that the net loss of IC’ALPS under French GAAP for the twelve months ended December 31, 2024 included sales to SEALSQ in an amount of approximately EUR 615,000. Excluding the sales to SEALSQ, the net loss of IC’ALPS under French GAAP for the twelve months ended December 31, 2024 would amount to a net loss in the amount of EUR (2,631,000), based on the draft unaudited revenue of IC’ALPS provided to SEALSQ. We note that the net income of IC’ALPS under French GAAP for the twelve months ended December 31, 2023 included sales to SEALSQ in an amount of approximately EUR 1,168,000. Excluding the sales to SEALSQ, the net income of IC’ALPS under French GAAP for the twelve months ended December 31, 2024 would amount to a net loss in the amount of EUR (850,000) based on the audited revenue of IC’ALPS provided to SEALSQ.

    Although the conversion of the financial information of IC’ALPS from French GAAP to US GAAP has not been initiated, we expect that material adjustments may arise upon conversion to US GAAP in relation to French GAAP based net sales, operating expenses and income tax income reflected in the IC’ALPS income statement for twelve months ended December 31, 2024 and 2023, and in relation to French GAAP based intangible assets, current liabilities, and pension and debt liabilities reflected in the balance sheet as at December 31, 2024 and 2023, as reflected in the numbers provided by IC’ALPS to SEALSQ and disclosed in the preceding paragraphs.

    About IC’ALPS:
    IC’ALPS is your one-stop-shop ASIC partner. Based in France (HQ in Grenoble, two design centers in Grenoble and Toulouse), the company provides customers with a complete offering for Application Specific Integrated Circuits (ASIC) and Systems on Chip (SoC) development from circuit specification, mastering design in-house, up to the management of the entire production supply chain. Its 100+ engineers’ areas of expertise include analog, digital and mixed-signal circuits (sensor/MEMS interfaces, ultra-low power consumption, power management, high-resolution converters, high voltage, signal processing, ARM and RISC-V based multiprocessors architectures, hardware accelerators) on technologies from 0.18 µm down to 1.8 nm, and from multiple foundries (TSMC, Global Foundries, Tower Semiconductor, X-FAB, STMicroelectronics, Intel Foundry, etc.). The company is active worldwide in medical, industrial, automotive, IoT, IA, mil-aero, and digital identity & security sectors. IC’ALPS is ISO 9001:2015, ISO 13485:2016, EN 9100:2018, Common Criteria certified, IATF16949-ready, member of TSMC Design Center Alliance (DCA), Intel Foundry Accelerator Design Services Alliance and Value Chain Alliance (DSA & VCA), ams Osram Preferred Partner and X-FAB’s partner network.
    More information: www.icalps.com and  https://www.linkedin.com/company/ic-alps

    About SEALSQ:
    SEALSQ is a leading innovator in Post-Quantum Technology hardware and software solutions. Our technology seamlessly integrates Semiconductors, PKI (Public Key Infrastructure), and Provisioning Services, with a strategic emphasis on developing state-of-the-art Quantum Resistant Cryptography and Semiconductors designed to address the urgent security challenges posed by quantum computing. As quantum computers advance, traditional cryptographic methods like RSA and Elliptic Curve Cryptography (ECC) are increasingly vulnerable.

    SEALSQ is pioneering the development of Post-Quantum Semiconductors that provide robust, future-proof protection for sensitive data across a wide range of applications, including Multi-Factor Authentication tokens, Smart Energy, Medical and Healthcare Systems, Defense, IT Network Infrastructure, Automotive, and Industrial Automation and Control Systems. By embedding Post-Quantum Cryptography into our semiconductor solutions, SEALSQ ensures that organizations stay protected against quantum threats. Our products are engineered to safeguard critical systems, enhancing resilience and security across diverse industries.

    For more information on our Post-Quantum Semiconductors and security solutions, please visit www.sealsq.com.

    About WISeKey
    WISeKey International Holding Ltd (“WISeKey”, SIX: WIHN; Nasdaq: WKEY) is a global leader in cybersecurity, digital identity, and IoT solutions platform. It operates as a Swiss-based holding company through several operational subsidiaries, each dedicated to specific aspects of its technology portfolio. The subsidiaries include (i) SEALSQ Corp (Nasdaq: LAES), which focuses on semiconductors, PKI, and post-quantum technology products, (ii) WISeKey SA which specializes in RoT and PKI solutions for secure authentication and identification in IoT, Blockchain, and AI, (iii) WISeSat AG which focuses on space technology for secure satellite communication, specifically for IoT applications, (iv) WISe.ART Corp which focuses on trusted blockchain NFTs and operates the WISe.ART marketplace for secure NFT transactions, and (v) SEALCOIN AG which focuses on decentralized physical internet with DePIN technology and house the development of the SEALCOIN platform.

    Each subsidiary contributes to WISeKey’s mission of securing the internet while focusing on their respective areas of research and expertise. Their technologies seamlessly integrate into the comprehensive WISeKey platform. WISeKey secures digital identity ecosystems for individuals and objects using Blockchain, AI, and IoT technologies. With over 1.6 billion microchips deployed across various IoT sectors, WISeKey plays a vital role in securing the Internet of Everything. The company’s semiconductors generate valuable Big Data that, when analyzed with AI, enable predictive equipment failure prevention. Trusted by the OISTE/WISeKey cryptographic Root of Trust, WISeKey provides secure authentication and identification for IoT, Blockchain, and AI applications. The WISeKey Root of Trust ensures the integrity of online transactions between objects and people. For more information on WISeKey’s strategic direction and its subsidiary companies, please visit www.wisekey.com.

    Disclaimer

    Forward-Looking Statements

    This communication expressly or implicitly contains certain forward-looking statements concerning WISeKey International Holding Ltd and its business. Forward-looking statements include statements regarding our business strategy, financial performance, results of operations, market data, events or developments that we expect or anticipate will occur in the future, as well as any other statements which are not historical facts and can be identified by forward-looking words such as “anticipate,” “believe,” “could,” “continue,” “estimate,” “expect,” “intend,” “may,” “should,” “will” and “would” or similar words. Although we believe that the expectations reflected in such forward-looking statements are reasonable, no assurance can be given that such expectations will prove to have been correct. These statements involve known and unknown risks and are based upon a number of assumptions and estimates which are inherently subject to significant uncertainties and contingencies, many of which are beyond our control. Actual results may differ materially from those expressed or implied by such forward-looking statements. Important factors that, in our view, could cause actual results to differ materially from those discussed in the forward-looking statements include the actual adjustments that arise upon conversion of the financial information of IC’ALPS to US GAAP in relation to net sales, operating expenses and income tax income in the income statement for twelve months ended December 31, 2024 and 2023, and in relation to intangible assets, current liabilities, and pension and debt liabilities in the balance sheet as at December 31, 2024 and 2023, in comparison with the French GAAP ; the entering into of definitive documents, the authorization by French regulatory authorities and the successful closing of the Acquisition; ; and the risks discussed in WISeKey’s filings with the SEC. Risks and uncertainties are further described in reports filed by WISeKey with the SEC.

    This press release does not constitute an offer to sell, or a solicitation of an offer to buy, any securities, and it does not constitute an offering prospectus within the meaning of the Swiss Financial Services Act (“FinSA”), the FinSa’s predecessor legislation or advertising within the meaning of the FinSA. Investors must rely on their own evaluation of WISeKey and its securities, including the merits and risks involved. Nothing contained herein is, or shall be relied on as, a promise or representation as to the future performance of WISeKey.

    Press and Investor Contacts

    WISeKey International Holding Ltd
    Company Contact:  Carlos Moreira
    Chairman & CEO
    Tel: +41 22 594 3000
    info@wisekey.com
    WISeKey Investor Relations (US) 
    The Equity Group Inc.
    Lena Cati
    Tel: +1 212 836-9611
    lcati@theequitygroup.com

    The MIL Network

  • MIL-OSI Global: Working women are too often left to deal with endometriosis alone. But big changes could be coming

    Source: The Conversation – UK – By Victoria Williams, Research Fellow, University of Surrey

    PeopleImages.com – Yuri A/Shutterstock

    Endometriosis is a long-term and invisible gynaecological condition that affects around 1.5 million women in the UK alone. It’s known for its unpredictable and debilitating symptoms, like chronic pelvic pain, heavy periods and fatigue. But many women face outdated practices in the workplace that just don’t accommodate the reality of the condition.

    Women with endometriosis can be unfairly thought of as unreliable or weak for not being able to adhere to conventional ideas of productivity or working hours. Times could be changing, though, with the UK’s employment rights bill, which is making its way through parliament.

    The bill could mark a significant turning point by framing menstruation and related health conditions as legitimate workplace issues. What this could mean, in practice, is a move towards employers taking measures such as offering flexible hours as the norm rather than the burden falling on individual women to make the case for what they need.

    But as a researcher on women’s health and wellbeing at work, I believe the bill must go further. If this legislation is to represent a new era for women, it should explicitly include provisions to support all reproductive health as part of its gender equality plans. After all, it has been estimated that menstrual health issues, including endometriosis, cost the UK economy £11 billion per year due to worker absences.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    Workers deserve a framework that supports the entire lifecycle of women’s health at work – from menstruation to miscarriage to menopause and beyond. Incorporating menstruation action plans alongside the bill’s proposed menopause action plans could include measures to destigmatise menstrual health. This could help workers feel safe sharing their symptoms or condition.

    It could also involve training for managers so conversations focus on support as opposed to the burden of medical proof. And clearly, sick leave policies should not penalise women for symptoms that can frequently be irregular.

    Historically, endometriosis was labelled the “career woman’s disease”. The suggestion was that it was a consequence of women delaying motherhood for paid work, and the stressful professional lives of women.

    These outdated theories framed endometriosis as the result of ambition. But the echoes persist, reinforcing the idea that women must silently manage their condition at work. This framing, rather than recognising that endometriosis can in some cases be considered a disability, diverts attention from failures in workplace policies and healthcare systems.

    Women with endometriosis can lose between 1.9 and 15.8 work hours per week managing painful and fluctuating symptoms within rigid work schedules and unaccommodating workplaces.

    However, having the permission to adjust where and how you work can help with managing symptoms and can also help to prevent them. For example, having the flexibility to start work later in the day for pain that presents in the morning, or to work from home on bad pain days, can make it easier to manage symptoms, and actually increases productivity. On the other hand, rigid working days can cause stress that exacerbates symptoms.

    Issues like stigma, disbelief of the level of pain and other symptoms, and the inability to deal with symptoms when they come on (by taking frequent breaks or using a hot water bottle, for example), as well as unfriendly absence policies, make work more difficult than it needs to be.

    This time lost can also place women in a precarious position, forcing them to choose between concealing their pain or risking career setbacks by disclosing their condition. Workplaces are typically designed for those who can maintain uninterrupted schedules, leaving workers with symptoms that come and go at a disadvantage.

    My research on “endo time”, which will be published later this year, reflects this. It highlights how women with endometriosis must constantly adjust their routines to manage symptoms. This is a reality at odds with rigid workplace expectations. It can mean having to think about every day in advance like “strategising a war”.

    Emotional and economic costs

    The cost of managing endometriosis extends beyond physical pain. Women with endometriosis in the UK can experience reduced earnings alongside lost promotions, bonuses and clients. A major constraint can be the need to take frequent sick days. This is often treated as a performance issue rather than a medical issue.

    As such, women can be left ducking and diving, and trying to work out little systems and workarounds for fear of losing their jobs. Women with endometriosis may also be pushed into part-time or insecure work, or feel compelled to become self-employed, trading stability for flexibility.

    Ultimately, left unsupported, endometriosis can make it extremely difficult for women to work within standard schedules and timetables. Yet, despite its prevalence, endometriosis research remains underfunded, contributing to continued misunderstandings and inadequate support.

    Unsupported menstrual health issues are thought to cost the UK economy £11 billion per year in lost work days.
    tuaindeed/Shutterstock

    The employment rights bill could be a significant step forward. It will require organisations with more than 250 employees to develop gender equality plans, including menopause support. The bill also aims to promote transparency around gender pay gaps and strengthen flexible working rights. These provisions would undoubtedly support the economic and emotional costs of working with endometriosis.

    Endometriosis is more than a health challenge. It is a lens through which we can understand broader issues around gender, health and work. By pushing for more comprehensive policies, the UK can shift the narrative from one of individual struggle to one of collective responsibility. This could create a workplace culture where women can thrive without being penalised for their health.

    The bill presents an opportunity to do just that – but only if it goes far enough to address the full spectrum of reproductive health challenges that women face throughout their careers.

    Victoria Williams is affiliated with The Menstruation Friendly Accreditation.

    ref. Working women are too often left to deal with endometriosis alone. But big changes could be coming – https://theconversation.com/working-women-are-too-often-left-to-deal-with-endometriosis-alone-but-big-changes-could-be-coming-256537

    MIL OSI – Global Reports

  • MIL-OSI Security: Fairfield County man arrested on federal child pornography charges

    Source: Office of United States Attorneys

    COLUMBUS, Ohio – A Lancaster man was arrested yesterday afternoon on federal child pornography charges and appeared in federal court in Columbus today.

    It is alleged that Carson A. Bigham, 23, possessed, distributed or received child pornography.

    According to charging documents, law enforcement received two separate Cybertips from the National Center of Missing and Exploited Children (NCMEC) related to a Columbus man who was charged with federal child pornography crimes in March, including exploitation of a minor.  One report was from Kik messenger regarding the distribution of 13 child pornography files. The second report was from Sniffies LLC, a map-based hookup application for gay, bisexual and bicurious men.

    As part of their investigation, devices were seized from the Columbus man. Law enforcement’s forensic review of the devices revealed conversations between the Columbus man and Bigham. In the conversations, Bigham allegedly uses the screenname “daddy.” The conversations between the two men were sexual in nature and included discussions about engaging in sex with minors. Bigham also allegedly received child pornography during these discussions, including files which depicted prepubescent minors engaged in sex acts with adults.

    Law enforcement officers learned that Bigham is employed as a Columbus firefighter and photographs of Bigham match those sent to the Columbus man during their conversations.

    Kelly A. Norris, Acting United States Attorney for the Southern District of Ohio; Jared Murphey, acting Special Agent in Charge, U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI) Detroit; Franklin County Sheriff Dallas Baldwin; other members of the Franklin County Sheriff’s Office’s Internet Crimes Against Children (ICAC) Task Force; and officials from the Drug Enforcement Administration (DEA) Columbus Airport Group and Fairfield County Sheriff’s Office announced the charges. Assistant United States Attorney Emily Czerniejewski is representing the United States in this case.

    A criminal complaint merely contains allegations, and defendants are presumed innocent unless proven guilty in a court of law.

    # # #

    MIL Security OSI

  • MIL-OSI Security: 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

    Source: Office of United States Attorneys

    LOS ANGELES – A federal grand jury indictment and criminal complaint unsealed today charge 16 defendants who allegedly developed and deployed the DanaBot malware which a Russia-based cybercrime organization controlled and deployed, infecting more than 300,000 victim computers around the world, facilitated fraud and ransomware, and caused at least $50 million in damage.

    The defendants include Aleksandr Stepanov, 39, a.k.a. “JimmBee,” and Artem Aleksandrovich Kalinkin, 34, a.k.a. “Onix”, both of Novosibirsk, Russia. Stepanov was charged with conspiracy, conspiracy to commit wire fraud and bank fraud, aggravated identity theft, unauthorized access to a protected computer to obtain information, unauthorized impairment of a protected computer, wiretapping, and use of an intercepted communication.

    Kalinkin was charged with conspiracy to gain unauthorized access to a computer to obtain information, to gain unauthorized access to a computer to defraud, and to commit unauthorized impairment of a protected computer. Both defendants are believed to be in Russia and are not in custody.

    According to the indictment and complaint, DanaBot malware used a variety of methods to infect victim computers, including spam email messages containing malicious attachments or hyperlinks. Victim computers infected with DanaBot malware became part of a botnet (a network of compromised computers), enabling the operators and users of the botnet to remotely control the infected computers in a coordinated manner. The owners and operators of the victim computers are typically unaware of the infection.

    The DanaBot malware allegedly operated on a malware-as-a-service model, with the administrators leasing access to the botnet and support tools to client coconspirators for a fee that was typically several thousand dollars a month. The DanaBot malware was multi-featured and had extensive capabilities to exploit victim computers. It could be used to steal data from victim computers, and to hijack banking sessions, steal device information, user browsing histories, stored account credentials, and virtual currency wallet information.

    DanaBot also had the capability to provide full remote access to victim computers, to record keystrokes, and record videos showing the activity of users on victim computers. DanaBot has further been used as an initial means of infection for other forms of malware, including ransomware. The DanaBot malware has infected over 300,000 computers around the world, and caused damage estimated to exceed $50 million.

    DanaBot administrators operated a second version of the botnet that was used to target victim computers in military, diplomatic, government, and related entities. This version of the botnet recorded all interactions with the computer and sent stolen data to a different server than the fraud-oriented version of DanaBot. This variant was allegedly used to target diplomats, law enforcement personnel, and members of the military in North America, and Europe.

    “Pervasive malware like DanaBot harms hundreds of thousands of victims around the world, including sensitive military, diplomatic, and government entities, and causes many millions of dollars in losses,” said United States Attorney Bill Essayli for the Central District of California. “The charges and actions announced today demonstrate our commitment to eradicating the largest threats to global cybersecurity and pursuing the most malicious cyber actors, wherever they are located.”   

    “The enforcement actions announced today, made possible by enduring law enforcement and industry partnerships across the globe, disrupted a significant cyber threat group, who were profiting from the theft of victim data and the targeting of sensitive networks,” said Special Agent in Charge Kenneth DeChellis of the Department of Defense Office of Inspector General, Defense Criminal Investigative Service (DCIS), Cyber Field Office. “The DanaBot malware was a clear threat to the Department of Defense and our partners. DCIS will vigorously defend our infrastructure, personnel, and intellectual property.”

    “Today’s announcement represents a significant step forward in the FBI’s ongoing efforts to disrupt and dismantle the cyber-criminal ecosystem that wreaks havoc on global digital security,” said Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office. “We are grateful for the coordinated efforts of our domestic and international law enforcement partners in holding cyber criminals accountable, no matter where they operate.”

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    If convicted, Kalinkin would face a statutory maximum sentence of 72 years in federal prison, and Stepanov would face a statutory maximum sentence of five years in federal prison.

    As part of today’s operation, Defense Criminal Investigative Service (DCIS) agents effected seizures and takedowns of DanaBot command and control servers, including dozens of virtual servers hosted in the United States. The U.S. government is now working with partners including the Shadowserver Foundation to notify DanaBot victims and help remediate infections.

    These law enforcement actions were taken in conjunction with Operation Endgame, an ongoing, coordinated effort among international law enforcement agencies aimed at dismantling and prosecuting cybercriminal organizations around the world.

    Amazon, Crowdstrike, ESET, Flashpoint, Google, Intel 471, Lumen, PayPal, Proofpoint, Team CYMRU, and ZScaler provided valuable assistance.

    The investigation into DanaBot was led by the FBI’s Anchorage Field Office and the Defense Criminal Investigative Service, working closely with Germany’s Bundeskriminalamt (BKA), the Netherlands National Police, and the Australian Federal Police. The Justice Department’s Office of International Affairs provided significant assistance.

    Assistant United States Attorney Aaron Frumkin of the Cyber and Intellectual Property Crimes Section is prosecuting these cases. Assistant United States Attorney James E. Dochterman of the Asset Forfeiture and Recovery Section is handling the forfeiture case.

    MIL Security OSI

  • MIL-OSI Economics: OEUK news OEUK Conference 2025: Leaders meet to define the North Sea’s energy future 22 May 2025

    Source: Offshore Energy UK

    Headline: OEUK news

    OEUK Conference 2025: Leaders meet to define the North Sea’s energy future

    22 May 2025

    Accessibility Statement

    • oeuk.org.uk
    • 22 May 2025

    Compliance status

    We firmly believe that the internet should be available and accessible to anyone, and are committed to providing a website that is accessible to the widest possible audience, regardless of circumstance and ability.

    To fulfill this, we aim to adhere as strictly as possible to the World Wide Web Consortium’s (W3C) Web Content Accessibility Guidelines 2.1 (WCAG 2.1) at the AA level. These guidelines explain how to make web content accessible to people with a wide array of disabilities. Complying with those guidelines helps us ensure that the website is accessible to all people: blind people, people with motor impairments, visual impairment, cognitive disabilities, and more.

    This website utilizes various technologies that are meant to make it as accessible as possible at all times. We utilize an accessibility interface that allows persons with specific disabilities to adjust the website’s UI (user interface) and design it to their personal needs.

    Additionally, the website utilizes an AI-based application that runs in the background and optimizes its accessibility level constantly. This application remediates the website’s HTML, adapts Its functionality and behavior for screen-readers used by the blind users, and for keyboard functions used by individuals with motor impairments.

    If you’ve found a malfunction or have ideas for improvement, we’ll be happy to hear from you. You can reach out to the website’s operators by using the following email [email protected]

    Screen-reader and keyboard navigation

    Our website implements the ARIA attributes (Accessible Rich Internet Applications) technique, alongside various different behavioral changes, to ensure blind users visiting with screen-readers are able to read, comprehend, and enjoy the website’s functions. As soon as a user with a screen-reader enters your site, they immediately receive a prompt to enter the Screen-Reader Profile so they can browse and operate your site effectively. Here’s how our website covers some of the most important screen-reader requirements, alongside console screenshots of code examples:

    1. Screen-reader optimization: we run a background process that learns the website’s components from top to bottom, to ensure ongoing compliance even when updating the website. In this process, we provide screen-readers with meaningful data using the ARIA set of attributes. For example, we provide accurate form labels; descriptions for actionable icons (social media icons, search icons, cart icons, etc.); validation guidance for form inputs; element roles such as buttons, menus, modal dialogues (popups), and others. Additionally, the background process scans all the website’s images and provides an accurate and meaningful image-object-recognition-based description as an ALT (alternate text) tag for images that are not described. It will also extract texts that are embedded within the image, using an OCR (optical character recognition) technology. To turn on screen-reader adjustments at any time, users need only to press the Alt+1 keyboard combination. Screen-reader users also get automatic announcements to turn the Screen-reader mode on as soon as they enter the website.

      These adjustments are compatible with all popular screen readers, including JAWS and NVDA.

    2. Keyboard navigation optimization: The background process also adjusts the website’s HTML, and adds various behaviors using JavaScript code to make the website operable by the keyboard. This includes the ability to navigate the website using the Tab and Shift+Tab keys, operate dropdowns with the arrow keys, close them with Esc, trigger buttons and links using the Enter key, navigate between radio and checkbox elements using the arrow keys, and fill them in with the Spacebar or Enter key.Additionally, keyboard users will find quick-navigation and content-skip menus, available at any time by clicking Alt+1, or as the first elements of the site while navigating with the keyboard. The background process also handles triggered popups by moving the keyboard focus towards them as soon as they appear, and not allow the focus drift outside it.

      Users can also use shortcuts such as “M” (menus), “H” (headings), “F” (forms), “B” (buttons), and “G” (graphics) to jump to specific elements.

    Disability profiles supported in our website

    • Epilepsy Safe Mode: this profile enables people with epilepsy to use the website safely by eliminating the risk of seizures that result from flashing or blinking animations and risky color combinations.
    • Visually Impaired Mode: this mode adjusts the website for the convenience of users with visual impairments such as Degrading Eyesight, Tunnel Vision, Cataract, Glaucoma, and others.
    • Cognitive Disability Mode: this mode provides different assistive options to help users with cognitive impairments such as Dyslexia, Autism, CVA, and others, to focus on the essential elements of the website more easily.
    • ADHD Friendly Mode: this mode helps users with ADHD and Neurodevelopmental disorders to read, browse, and focus on the main website elements more easily while significantly reducing distractions.
    • Blindness Mode: this mode configures the website to be compatible with screen-readers such as JAWS, NVDA, VoiceOver, and TalkBack. A screen-reader is software for blind users that is installed on a computer and smartphone, and websites must be compatible with it.
    • Keyboard Navigation Profile (Motor-Impaired): this profile enables motor-impaired persons to operate the website using the keyboard Tab, Shift+Tab, and the Enter keys. Users can also use shortcuts such as “M” (menus), “H” (headings), “F” (forms), “B” (buttons), and “G” (graphics) to jump to specific elements.

    Additional UI, design, and readability adjustments

    1. Font adjustments – users, can increase and decrease its size, change its family (type), adjust the spacing, alignment, line height, and more.
    2. Color adjustments – users can select various color contrast profiles such as light, dark, inverted, and monochrome. Additionally, users can swap color schemes of titles, texts, and backgrounds, with over seven different coloring options.
    3. Animations – person with epilepsy can stop all running animations with the click of a button. Animations controlled by the interface include videos, GIFs, and CSS flashing transitions.
    4. Content highlighting – users can choose to emphasize important elements such as links and titles. They can also choose to highlight focused or hovered elements only.
    5. Audio muting – users with hearing devices may experience headaches or other issues due to automatic audio playing. This option lets users mute the entire website instantly.
    6. Cognitive disorders – we utilize a search engine that is linked to Wikipedia and Wiktionary, allowing people with cognitive disorders to decipher meanings of phrases, initials, slang, and others.
    7. Additional functions – we provide users the option to change cursor color and size, use a printing mode, enable a virtual keyboard, and many other functions.

    Browser and assistive technology compatibility

    We aim to support the widest array of browsers and assistive technologies as possible, so our users can choose the best fitting tools for them, with as few limitations as possible. Therefore, we have worked very hard to be able to support all major systems that comprise over 95% of the user market share including Google Chrome, Mozilla Firefox, Apple Safari, Opera and Microsoft Edge, JAWS and NVDA (screen readers).

    Notes, comments, and feedback

    Despite our very best efforts to allow anybody to adjust the website to their needs. There may still be pages or sections that are not fully accessible, are in the process of becoming accessible, or are lacking an adequate technological solution to make them accessible. Still, we are continually improving our accessibility, adding, updating and improving its options and features, and developing and adopting new technologies. All this is meant to reach the optimal level of accessibility, following technological advancements. For any assistance, please reach out to [email protected]

    MIL OSI Economics