Category: Justice

  • MIL-OSI Global: Academic freedom and democracy under siege: how a Nobel peace prize could help defend them

    Source: The Conversation – France – By Stéphanie Balme, Director, CERI (Centre de recherches internationales), Sciences Po

    A rally for science drew a big crowd during the American Geophysical Union’s meeting in San Francisco. MarcioJoseSanchez/AP, CC BY

    March 7 has been recognized as the “Day of the Stand Up for Science Movement”, launched in 2017 in response to the anti-science actions of the first Trump administration. Under the second, attacks on scientists and scientific inquiry have escalated into a systematic assault–tantamount to a coup d’Etat against science itself.

    While Donald Trump is often portrayed as erratic, his policies in this area have followed a consistent trajectory. His new administration has once again declared ‘war’ on evidence-based national policymaking and science diplomacy in foreign affairs as evidenced by several early actions. Immediately after taking office, Donald Trump issued executive orders freezing or canceling tens of billions in research funding. All National Science Foundation projects have been halted pending review, while the National Institutes of Health faces suspensions under Health and Human Services directives. The US has withdrawn from the Paris Agreement and the World Health Organization, alongside a sweeping review of 90% of USAID-funded projects, signaling a major retreat from climate and global health diplomacy. Federal agencies and universities are in turmoil, leaving thousands of research-professors in limbo amid a politically driven funding freeze. The 2025 March simply calls for the restoration of federal research funding and an end to government censorship and political interference in science.

    Du lundi au vendredi + le dimanche, recevez gratuitement les analyses et décryptages de nos experts pour un autre regard sur l’actualité. Abonnez-vous dès aujourd’hui !

    The US is the world’s undisputed scientific superpower–for now

    While the Trump administration is not the sole force undermining academia worldwide, its actions are particularly striking coming from the world’s leading scientific superpower. Moreover, the situation is especially concerning because developments in the United States often have a ripple effect, shaping policies in other regions in the years that follow.

    Neither of the world’s top two scientific superpowers–Washington and Beijing–is positioned to champion academic freedom. China, having failed a liberal constitutional tradition and academic independence since the 1920s, restricts academic freedom to the confines of one-party rule. Caught between these rival scientific giants–both partners and competitors–the “old” Europe and like-minded coutries remain the only actors capable of setting new standards for academic freedom.

    A Nobel prize for academic freedom

    A decisive step toward its legal protection would be formal recognition by the Nobel Committees for Peace and Science of academic freedom’s fundamental role–both in ensuring scientific excellence and as a pillar of free, democratic societies.

    For the past decade, the Scholars at Risk association (SAR) has documented a broader global decline in academic freedom in its annual Free to Think Report. The 2024 edition highlights particularly alarming situations in 18 countries and territories (including the United States), which recorded 391 attacks on scholars, students, or institutions across 51 regions in a year. Data from the Academic Freedom Index in Berlin confirm that more than half of the world’s population lives in regions where academic freedom is either entirely or severely restricted. Some of the most concerning conditions are in emerging scientific ecosystems such as Turkey, Brazil, Egypt, South Africa, or Saudi Arabia. The overall trend is deteriorating: only 10 out of 179 countries have improved, while many democratic regimes are increasingly affected.

    Academic freedom in the European Union remains relatively high compared to the rest of the world. However, nine EU member states fall below the regional average, and in eight of them, it has declined over the past decade–signaling a gradual erosion of this fundamental value. Hungary ranks the lowest among EU countries, placing in the bottom 20–30% worldwide. Recent laws have further weakened university autonomy across the EU: financial autonomy in Austria, Italy, Luxembourg, the Netherlands, and Slovakia; organizational autonomy in Slovenia, Estonia, and Denmark; staffing autonomy in Croatia and Slovakia; and academic autonomy in Denmark and Estonia. Moreover, the European Parliament’s first report on academic freedom (2023) highlights emerging threats in France–political, educational, and societal–that impact the freedom of research, teaching, and study.

    Academic freedom, a professional right granted to a few for the benefit of all

    Freedom of expression, a fundamental pillar of academic freedom, has long been established as a human right, overcoming centuries of censorship and authoritarian control. In contrast, academic freedom is a more recent principle, granting scholars–recognized by their peers–the right and responsibility to research and teach freely in pursuit of knowledge. Like press freedom for journalists, it is a right granted to a few for the benefit of all.

    Rooted in medieval Europe, academic freedom has evolved from a privilege granted to students in the Quartier Latin to a recognized principle in international rights frameworks. It gained a collective and concrete dimension in the late 18th and early 19th centuries with the rise of the modern university. Wilhelm von Humboldt, founder of the modern public university in Berlin (1810), articulated the concept of ‘freedom of science’ (Wissenschaftsfreiheit), later enshrined in the Weimar Constitution of 1919, which declared that “art, science, and education are free.” The rise of American universities around the same time reshaped the concept, giving rise to “professional academic freedom.” This was formalized in the American Association of University Professors’ 1915 Declaration of Principles on Academic Freedom and Tenure, which affirmed the scholar’s primary duty to seek and establish truth. Though its roots lie in Germany, academic freedom ultimately became a cornerstone of American academic discourse.

    In the United States, academic freedom draws from multiple sources, with its protection varying by state laws, customs, institutional practices, and the status of higher education institutions. However, U.S. Supreme Court rulings have gradually reinforced its constitutional foundation, particularly after the McCarthy era, by invoking the First Amendment. Landmark cases such as Adler v. Board of Education (1952), Wieman v. Updegraff (1952), and Sweezy v. New Hampshire (1957) helped establish a constitutional doctrine on academic freedom. Finally, Keyishian v. Board of Regents (1967) extended First Amendment protections to academia, ruling that mandatory loyalty oaths violated both academic freedom and freedom of association.

    Interestingly, the American interpretation of academic freedom is currently more restrictive than the German model in certain respects. Article 5(3) of the 1989 Basic Law affirms the “right to adopt public organizational measures essential to protect a space of freedom, fostering independent scientific activity”. In contrast, the U.S. places greater emphasis on prohibitions and prioritizing individual rights over institutional autonomy.

    The ‘right to be wrong’

    Despite local variations, academic freedom is fundamentally tied to a shared vision of the university that upholds freedom of thought, with rationality and pluralism at its core. It includes the genuine “right to be wrong”–the understanding that a scientific opinion may be incorrect or even proven so does not diminish its protection. This stands in stark contrast to the anti-science, scientistic, or techno-nationalist approach, which views knowledge as a tool of power to serve a predetermined truth and objective of dominance. Authoritarian science, driven by power interests, seeks to diminish critical humanities and social sciences while elevating religion. It tends to reject interdisciplinary work, is exclusively mathematized, and is oriented toward a centralized yet deregulated autocratic tech-utopian state model.

    Since 1945, we have operated under the illusion that academic freedom is an indispensable condition for scientific excellence. However, we have recently learned that no systematic link exists between academic freedom and breakthrough scientific innovation in our era of new technologies. Given these circumstances, this proposal advocates for a nomination for the Nobel Peace Prize, for the first time in its history, in recognition of academic freedom.

    The Nobel Prize Committees for Science and Peace share the responsibility of using their prestigious platforms to uphold fundamental scientific and democratic values. They are uniquely positioned to champion humanist science, reinforcing its importance for scholars, students, and civil societies worldwide. Since the 1950s, around 90% of Nobel Prize laureates in scientific fields have either been US citizens or have studied and worked at Ivy League research institutions.

    While some US scientists are contesting actions of the Trump administration in court, academics worldwide should stand in solidarity with their American colleagues in resisting the erosion of science. To strengthen their efforts, they require the support of the Nobel Prize Committees.

    Stéphanie Balme ne travaille pas, ne conseille pas, ne possède pas de parts, ne reçoit pas de fonds d’une organisation qui pourrait tirer profit de cet article, et n’a déclaré aucune autre affiliation que son organisme de recherche.

    ref. Academic freedom and democracy under siege: how a Nobel peace prize could help defend them – https://theconversation.com/academic-freedom-and-democracy-under-siege-how-a-nobel-peace-prize-could-help-defend-them-251494

    MIL OSI – Global Reports

  • MIL-OSI USA: 12 men sentenced for conspiring to distribute fentanyl, methamphetamine, marijuana in Tennessee, California

    Source: US Immigration and Customs Enforcement

    NASHVILLE, Tenn. – Twelve members of a drug trafficking conspiracy were sentenced to more than 70 years combined for their roles in conspiring to distribute and possess with intent to distribute controlled substances in middle Tennessee and elsewhere following a joint investigation with U.S. Immigrations and Customs Enforcement Nashville.

    According to court documents, around 2022, agents with ICE Nashville, FBI, and Drug Enforcement Administration began investigating large shipments of counterfeit fentanyl-laced pills that were inscribed “M30,” methamphetamine, and marijuana that someone was shipping to Tennessee and approximately 16 other states from California.

    Agents reviewed shipping materials, monitored social media accounts, and conducted surveillance before identifying Matthew Cox as the individual who was shipping these packages to members of the drug trafficking conspiracy. In their messages on social media applications and phones, the defendants discussed drug prices, drug shipments, and quality of the drugs. One defendant, Quortez Duncan, told Cox that he wanted stronger pills to get customers hooked on the pills to increase profits. Cox complied and attempted to send Duncan these pills, but agents seized them. Agents also learned that another defendant, Khyre McClain, attempted to establish and launder money through a limited liability corporation.

    In addition to this evidence of shipments to other states, agents seized packages of drugs that were being shipped to Tennessee. Specifically, on July 25, 2022, ICE agents seized a package from a UPS Store in Sebastopol, Calif., which was destined for Nashville. This package contained thousands of counterfeit fentanyl-laced pills weighing over two kilograms. The package also contained more than eight pounds of methamphetamine. On Aug. 9, 2022, ICE agents intercepted two additional packages from the Santa Rosa, Calif., area which were destined for residences in Nashville. One package contained 472 grams of counterfeit fentanyl-laced pills, and the other package contained approximately four pounds of methamphetamine.

    After collecting an overwhelming amount of evidence, law enforcement officers executed search warrants at multiple residences in California and Tennessee. They recovered handguns, assault rifles, bulk cash, expensive cars, marijuana, and large amounts of counterfeit fentanyl-laced pills.

    Each defendant was convicted of conspiring to distribute controlled substances. Three defendants were also convicted of unlawfully possessing firearms after previously being convicted of felony offenses.

    The defendants were sentenced as follows:

    • Quortez Duncan, age 37, was sentenced to 15 years in federal prison.
    • Mathew Cox, age 28, was sentenced to 11 years and 8 months in federal prison.
    • Jonny Rodriguez-Gonzalez, age 26, was sentenced to 11 years and 2 months in federal prison.
    • Ricardo Molinero-Alcarez, age 29, was sentenced to 10 years in federal prison.
    • Khyre McClain, age 23, was sentenced to 10 years in federal prison.
    • Davontay Holt, age 30, was sentenced to 10 years in federal prison.
    • Marcus Johnson, age 27, was sentenced to 5 years in federal prison.
    • Tristain Orr, age 25, was sentenced to 5 years in federal prison.
    • Ethan Kimes, age 22, was sentenced to 2 years in federal prison.
    • Marquitues Sawyers, age 24, was sentenced to 1 year and 8 months in federal prison.
    • Jahari Armstrong, age 22, was sentenced to 3 years of probation.
    • Jaydan Armstrong, age 22, was sentenced to 3 years of probation.

    This case was investigated by ICE in Tennessee and California, the Drug Enforcement Administration, the U.S. Postal Inspection Service, the FBI Nashville Field Office, the Tennessee Bureau of Investigation, and the Columbia Police Department.  Assistant U.S. Attorneys Ahmed Safeeullah and Rachel Stephens prosecuted this case.

    MIL OSI USA News

  • MIL-OSI USA: Justice Department Charges 12 Chinese Contract Hackers and Law Enforcement Officers in Global Computer Intrusion Campaigns

    Source: US State of California

    Chinese Law Enforcement and Intelligence Services Leveraged China’s Reckless and Indiscriminate Hacker-for-Hire Ecosystem, Including the ‘APT 27’ Group, to Suppress Free Speech and Dissent Globally and to Steal Data from Numerous Organizations Worldwide,

    Note: View the indictments in U.S. v. Wu Haibo et al., U.S. v. Yin Kecheng, U.S. v. Zhou Shuai et al. here.

    The Justice Department, FBI, Naval Criminal Investigative Service, and Departments of State and the Treasury announced today their coordinated efforts to disrupt and deter the malicious cyber activities of 12 Chinese nationals, including two officers of the People’s Republic of China’s (PRC) Ministry of Public Security (MPS), employees of an ostensibly private PRC company, Anxun Information Technology Co. Ltd. (安洵信息技术有限公司) also known as “i-Soon,” and members of Advanced Persistent Threat 27 (APT27).

    These malicious cyber actors, acting as freelancers or as employees of i-Soon, conducted computer intrusions at the direction of the PRC’s MPS and Ministry of State Security (MSS) and on their own initiative. The MPS and MSS paid handsomely for stolen data. Victims include U.S.-based critics and dissidents of the PRC, a large religious organization in the United States, the foreign ministries of multiple governments in Asia, and U.S. federal and state government agencies, including the U.S. Department of the Treasury (Treasury) in late 2024.

    “The Department of Justice will relentlessly pursue those who threaten our cybersecurity by stealing from our government and our people,” said Sue J. Bai, head of the Justice Department’s National Security Division. “Today, we are exposing the Chinese government agents directing and fostering indiscriminate and reckless attacks against computers and networks worldwide, as well as the enabling companies and individual hackers that they have unleashed. We will continue to fight to dismantle this ecosystem of cyber mercenaries and protect our national security.”

    “The FBI is committed to protecting Americans from foreign cyber-attacks,” said Assistant Director Bryan Vorndran of the FBI’s Cyber Division. “Today’s announcements reveal that the Chinese Ministry of Public Security has been paying hackers-for-hire to inflict digital harm on Americans who criticize the Chinese Communist Party (CCP). To those victims who bravely came forward with evidence of intrusions, we thank you for standing tall and defending our democracy. And to those who choose to aid the CCP in its unlawful cyber activities, these charges should demonstrate that we will use all available tools to identify you, indict you, and expose your malicious activity for all the world to see.”

    According to court documents, the MPS and MSS employed an extensive network of private companies and contractors in China to hack and steal information in a manner that obscured the PRC government’s involvement. In some cases, the MPS and MSS paid private hackers in China to exploit specific victims. In many other cases, the hackers targeted victims speculatively. Operating from their safe haven and motivated by profit, this network of private companies and contractors in China cast a wide net to identify vulnerable computers, exploit those computers, and then identify information that it could sell directly or indirectly to the PRC government. The result of this largely indiscriminate approach was more worldwide computer intrusion victims, more systems worldwide left vulnerable to future exploitation by third parties, and more stolen information, often of no interest to the PRC government and, therefore, sold to other third-parties. Additional information regarding the indictments and the PRC’s hacker-for-hire ecosystem is available in Public Service Announcements published by the FBI today.

    U.S. v. Wu Haibo et al., Southern District of New York

    Today, a federal court in Manhattan unsealed an indictment charging eight i-Soon employees and two MPS officers for their involvement, from at least in or around 2016 through in or around 2023, in the numerous and widespread hacking of email accounts, cell phones, servers, and websites. The Department also announced today the court-authorized seizure of the primary internet domain used by i-Soon to advertise its business.

    “State-sponsored hacking is an acute threat to our community and national security,” said Acting U.S. Attorney Matthew Podolsky for the Southern District of New York. “For years, these 10 defendants — two of whom we allege are PRC officials — used sophisticated hacking techniques to target religious organizations, journalists, and government agencies, all to gather sensitive information for the use of the PRC. These charges will help stop these state-sponsored hackers and protect our national security. The career prosecutors of this office and our law enforcement partners will continue to uncover alleged state-sponsored hacking schemes, disrupt them, and bring those responsible to justice.”

    The defendants remain at large and wanted by the FBI. Concurrent with today’s announcement,  the U.S. Department of State’s Rewards for Justice (RFJ) program, administered by the Diplomatic Security Service, announced a reward of up to $10 million for information leading to the identification or location of any person who, while acting at the direction or under the control of a foreign government, engages in certain malicious cyber activities against U.S. critical infrastructure in violation of the Computer Fraud and Abuse Act. The reward is offered for the following individuals who are alleged to have worked in various capacities to direct or carry out i-Soon’s malicious cyber activity:

    • Wu Haibo (吴海波), Chief Executive Officer
    • Chen Cheng (陈诚), Chief Operating Officer
    • Wang Zhe (王哲), Sales Director
    • Liang Guodong (梁国栋), Technical Staff
    • Ma Li (马丽), Technical Staff
    • Wang Yan (王堰), Technical Staff
    • Xu Liang (徐梁), Technical Staff
    • Zhou Weiwei (周伟伟), Technical Staff
    • Wang Liyu (王立宇), MPS Officer
    • Sheng Jing (盛晶), MPS Officer

    i-Soon and its employees, to include the defendants, generated tens of millions of dollars in revenue as a key player in the PRC’s hacker-for-hire ecosystem. In some instances, i-Soon conducted computer intrusions at the request of the MSS or MPS, including cyber-enabled transnational repression at the direction of the MPS officer defendants. In other instances, i-Soon conducted computer intrusions on its own initiative and then sold, or attempted to sell, the stolen data to at least 43 different bureaus of the MSS or MPS in at least 31 separate provinces and municipalities in China. i-Soon charged the MSS and MPS between approximately $10,000 and $75,000 for each email inbox it successfully exploited. i-Soon also trained MPS employees how to hack independently of i-Soon and offered a variety of hacking methods for sale to its customers.

    The defendants’ U.S.-located targets included a large religious organization that previously sent missionaries to China and was openly critical of the PRC government and an organization focused on promoting human rights and religious freedom in China. In addition, the defendants targeted multiple news organizations in the United States, including those that have opposed the CCP or delivered uncensored news to audiences in Asia, including China and the New York State Assembly, one of whose representatives had communicated with members of a religious organization banned in China.

    The defendants’ foreign-located targets included a religious leader and his office, and a Hong Kong newspaper that i-Soon considered as being opposed to the PRC government. The defendants also targeted the foreign ministries of Taiwan, India, South Korea, and Indonesia.

    Assistant U.S. Attorneys Ryan B. Finkel, Steven J. Kochevar, and Kevin Mead for the Southern District of New York and Trial Attorney Gregory J. Nicosia Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case.

    U.S. v. Yin Kecheng and U.S. v. Zhou Shuai et al., District of Columbia

    Today, a federal court unsealed two indictments charging APT27 actors Yin Kecheng (尹可成) and Zhou Shuai (周帅) also known as “Coldface” for their involvement in the multi-year, for-profit computer intrusion campaigns dating back, in the case of Yin, to 2013. The Department also announced today court-authorized seizures of internet domains and computer server accounts used by Yin and Zhou to facilitate their hacking activity.

    The defendants remain at large. View the FBI’s Wanted posters for Shuai and Kecheng here.

    Concurrent with today’s announcement, the Department of States State’s Bureau of International Narcotics and Law Enforcement Affairs is announcing two reward offers under the Transnational Organized Crime Rewards Program (TOCRP) of up to $2 million each for information leading to the arrests and convictions, in any country, of malicious cyber actors Yin Kecheng and Zhou Shuai, both Chinese nationals residing in China.

    “These indictments and actions show this office’s long-standing commitment to vigorously investigate and hold accountable Chinese hackers and data brokers who endanger U.S. national security and other victims across the globe,” said Interim U.S. Attorney Edward R. Martin Jr. for the District of Columbia. “The defendants in these cases have been hacking for the Chinese government for years, and these indictments lay out the strong evidence showing their criminal wrongdoing. We again demand that the Chinese government to put a stop to these brazen cyber criminals who are targeting victims across the globe and then monetizing the data they have stolen by selling it across China.”

    The APT27 group to which Yin and Zhou belong is also known to private sector security researchers as “Threat Group 3390,” “Bronze Union,” “Emissary Panda,” “Lucky Mouse,” “Iron Tiger,” “UTA0178,” “UNC 5221,” and “Silk Typhoon.” As alleged in court documents, between August 2013 and December 2024, Yin, Zhou, and their co-conspirators exploited vulnerabilities in victim networks, conducted reconnaissance once inside those networks, and installed malware, such as PlugX malware, that provided persistent access. The defendants and their co-conspirators then identified and stole data from the compromised networks by exfiltrating it to servers under their control. Next, they brokered stolen data for sale and provided it to various customers, only some of whom had connections to the PRC government and military. For example, Zhou sold data stolen by Yin through i-Soon, whose primary customers, as noted above, were PRC government agencies, including the MSS and the MPS.

    The defendants’ motivations were financial and, because they were profit-driven, they targeted broadly, rendering victim systems vulnerable well beyond their pilfering of data and other information that they could sell. Between them, Yin and Zhou sought to profit from the hacking of numerous U.S.-based technology companies, think tanks, law firms, defense contractors, local governments, health care systems, and universities, leaving behind them a wake of millions of dollars in damages.

    The documents related to the seizure warrants, also unsealed today, further allege that Yin and Zhou continued to engage in hacking activity, including Yin’s involvement in the recently announced hack of Treasury between approximately September and December 2024. Virtual private servers used to conduct the Treasury intrusion belonged to, and were controlled by, an account that Yin and his co-conspirators established. Yin and his co-conspirators used that same account and other linked accounts they controlled to lease servers used for additional malicious cyber activity. The seizure warrant unsealed today allowed the FBI to seize the virtual private servers and other infrastructure used by the defendants to perpetrate these crimes.

    On Jan. 17, Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions against Yin for his role in hacking that agency between September and December 2024. Concurrent with today’s indictments, OFAC also announced sanctions on Zhou and Shanghai Heiying Information Technology Company Ltd., a company operated by Zhou for purposes of his hacking activity.

    Private sector partners are also taking voluntary actions to raise awareness and strengthen defenses against the PRC’s malicious cyber activity. Today, Microsoft published research that highlights its unique, updated insights into Silk Typhoon tactics, techniques, and procedures specifically its targeting of the IT supply chain.

    Assistant U.S. Attorneys Jack F. Korba and Tejpal S. Chawla for the District of Columbia and Trial Attorney Tanner Kroeger of the National Security Division’s National Security Cyber Section are prosecuting the case.

    ***

    The above disruptive actions targeting PRC malicious cyber activities were the result of investigations conducted by FBI New York and Washington Field Offices, FBI Cyber Division, the Naval Criminal Investigative Service. The U.S. Attorney’s Offices for the Southern District of New York and District of Columbia and the National Security Division’s National Security Cyber Section are prosecuting the case.

    The Department acknowledges the value of public-private partnerships in combating advanced cyber threats and recognizes Microsoft, Volexity, PwC, and Mandiant for their valuable assistance in these investigations.

    The details in the above-described indictments and warrants are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: Chinese Nationals with Ties to the PRC Government and “APT27” Charged in a Computer Hacking Campaign for Profit, Targeting Numerous U.S. Companies, Institutions, and Municipalities

    Source: Office of United States Attorneys

    Department Seizes Virtual Private Server Account and Domains Tied to Malicious Activity to include the U.S. Department of Treasury Hack

                WASHINGTON – A federal judge in Washington, D.C., today, unsealed two separate indictments that allege Chinese nationals Yin Kecheng, 38, (尹 可成) a/k/a “YKC” (“YIN”) and Zhou Shuai, 45, (周帅) a/k/a “Coldface” (“ZHOU”) violated various federal statutes by participating in years-long, sophisticated computer hacking conspiracies that successfully targeted a wide variety of U.S.-based victims from 2011 to the present-day. According to the documents unsealed today, the defendants targeted a multitude of U.S. victim companies, municipalities, and organizations for profit, causing millions of dollars’ worth of damages. YIN and ZHOU, who have ties to the government of the People’s Republic of China (“PRC”), are alleged to have stolen and exfiltrated data from numerous U.S.-based technology companies, think tanks, defense contractors, government municipalities, and universities that they later brokered for sale. Arrest warrants have been issued for YIN and ZHOU, who both remain fugitives.

                The unsealing by the U.S. Attorney’s Office for the District of Columbia is part of the coordinated effort by Department of Justice (the “Department”), other U.S. Attorney’s Offices, the U.S. Department of Treasury (“Treasury”), and private sector partners that highlights the Chinese government’s unique role in intentionally promoting and protecting the wide-scale computer hacking activity by its citizens. According to court documents unsealed today, the PRC Ministry of Public Security (“MPS”) and Ministry of State Security (“MSS”) directed or financed Chinese hackers, such as the defendants, to conduct computer intrusions against high-value targets in the United States and elsewhere. Victims include U.S.-based critics and dissidents of the PRC, a large religious organization in the United States, the foreign ministries of multiple governments in Asia, and U.S. federal and state government agencies, including most recently in 2024.

                According to court documents, the MPS and MSS employed an extensive network of private companies and contractors in China to hack and steal information in a manner that obscured the PRC government’s direct involvement. By employing these hackers-for-hire, the PRC government further allowed these same hackers to profit by committing additional computer intrusions around the world with impunity, and then to sell stolen data through Chinese data brokers. The PRC government’s state-sponsorship and protection of these hackers resulted in the loss of sensitive, valuable and personal identification information that was a direct harm to U.S. entities and other foreign governments and victims.

                In conjunction with the unsealing, the Department announced the judicially authorized seizure of internet domains linked to YIN that he used in facilitating the conspiracy’s network intrusion activity. In addition, the Department announced the judicially authorized seizure of a Virtual Private Server (“VPS”) account linked to ZHOU that he used to facilitate network intrusion activity. In conjunction with these actions, the Treasury announced sanctions against ZHOU and his company Shanghai Heiying Information Technology company, Limited (“Shanghai Heiying”).  YIN was previously sanctioned for his role in the recent Treasury network compromise in January 2025.

    “These indictments and actions show this Office’s long-standing commitment to vigorously investigate and hold accountable Chinese hackers and data brokers who endanger U.S. national security and other victims across the globe,” said U.S. Attorney Edward R. Martin, Jr. “The defendants in these cases have been hacking for the Chinese government for years, and these indictments lay out the strong evidence showing their criminal wrongdoing. We, again, demand that the Chinese government put a stop to these brazen cyber criminals who are targeting victims across the globe and then monetizing the data they have stolen by selling it across China.”

                “The defendants allegedly waged a yearslong hacking campaign against U.S.-based organizations to steal their data and sell it to various customers, some of whom had connections to the Chinese government,” said FBI Acting Assistant Director in Charge Roman Rozhavsky of the FBI Washington Field Office. “Today’s indictment is the first step toward bringing these perpetrators to justice for endangering U.S. national security and causing significant financial losses for both U.S. and foreign companies. The FBI and our partners will continue to pursue these hostile cyber actors to the full extent of the law.”

                “The defendants’ years-long hacking conspiracy to steal data from Cleared Defense Contractors that support the U.S. military—among many other U.S.-based victims—and sell it to customers with ties to the Chinese government poses a significant threat to our national security,” said NCIS Cyber Operations Field Office Special Agent in Charge Josh Stanley. “NCIS remains committed to working with the FBI and our law enforcement partners around the world to expose malicious actors who seek to undermine the cybersecurity of the Department of the Navy.”

                “The Department of State appreciates the opportunity to collaborate with the Department of Treasury, FBI, and the U.S. Attorney’s Office for the District of Columbia in announcing today’s actions,” said Senior Bureau Official F. Cartwright Weiland of the Department of State’s Bureau of International Narcotics and Law Enforcement Affairs (INL). “With reward offers up to $2 million each for malicious cyber actors Zhou Shuai and Yin KeCheng under the Transnational Organized Crime Rewards Program, we ask the public to contact the FBI with tips to help bring these cybercriminals to justice.”

    Overview

                Today’s announcement reflects nearly a decade-long effort by the Department and the FBI.   The action targets actors that various security researchers have historically referred to as “APT27,” “Threat Group 3390,” “Bronze Union,” “Emissary Panda,” “Lucky Mouse,” and “Iron Tiger,” and more recently referred to as “UTA0178,” “UNC 5221,” and “Silk Typhoon.” 

                The Department obtained a 19-count indictment against YIN on May 2, 2018 (the “2018 Indictment”) from a grand jury sitting in the United States District Court for the District of Columbia. The 2018 Indictment, which alleges conduct between August 2013 and December 2015, charges wire fraud, aggravated identity theft, and violations of the Computer Fraud and Abuse Act (“CFAA”).

                Another federal grand jury in the District of Columbia indicted both YIN and ZHOU on March 28, 2023 (the “2023 Indictment”), with similar offenses.  Specifically, the 2023 Indictment, which alleges conduct between June 2018 and November 2020, charges conspiracy, wire fraud, various violations of the CFAA, aggravated identity theft, and money laundering. 

                On March 4, 2025, a federal magistrate judge sitting in the District of Columbia authorized FBI to seize a VPS account and multiple internet domains involved in the criminal activity.  According to the unsealed affidavits in support of those warrants, ZHOU utilized the VPS account to create additional accounts used to facilitate computer intrusion activity and to discuss the sale of access to compromised computer networks. Separately, YIN utilized his own servers and stood up the seized domains to exploit victim computer networks to include networks at Treasury.

    Computer Hacking Scheme

                As alleged in the documents unsealed today, at various points between August 2013 and December 2024, YIN, ZHOU, and their unindicted co-conspirators used sophisticated hacking tools and techniques in their efforts to overcome network defenses and avoid detection of numerous hardened targets in the United States and around the world. The defendants and their co-conspirators would routinely scan victim networks for vulnerabilities, exploit those vulnerabilities with sophisticated hacking techniques, and conduct reconnaissance once inside a victim’s network. The defendants and their co-conspirators and would install malware that would allow them to maintain persistent access and enable them to communicate with malicious external servers and other hacking infrastructure. The defendants and their co-conspirators would identify and steal data from the compromised networks by exfiltrating the data to servers under their control. The stolen data was then brokered for sale and provided to various customers, some of whom had connections to the PRC government and military.

    Targeting of U.S. Victims

                According to the 2018 Indictment, YIN targeted U.S.-based defense contractors, technology firms, and think tanks, among other victims. The 2018 Indictment alleges YIN openly discussed his preference for targeting American victims. For example, on one occasion in September 2013, YIN told an associate he wanted to “mess with the American military” and “break into a big target” so that he could earn enough money to buy a car. YIN used mapping software to identify network vulnerabilities for the purpose of gaining unlawful access to victim computer and installing malware. YIN used stolen network credentials to maintain persistent access to victim networks and utilized intermediary servers or “hop points” and malicious domains to remotely access and exfiltrate victim computer data.

                According to the 2023 Indictment, YIN, ZHOU, and others targeted U.S.-based companies like technology and defense contractors, law firms, communication service providers, local governments, health care systems, and think tanks. The 2023 Indictment charges YIN and ZHOU with scanning victim networks for access points and also exploiting zero-day vulnerabilities. Once inside the networks, YIN other conspirators would then install malware such as web shells to maintain persistent access. YIN and other conspirators would then use hop point servers to exfiltrate stolen data to servers under YIN’s control. ZHOU then brokered access to such stolen data to interested third parties for a financial profit. The indictment further alleged that YIN, ZHOU, and other conspirators laundered cryptocurrency payments for their operational infrastructure from locations outside of the United States through the U.S. financial system.

                The affidavit in support of the seizure warrant for the VPS account alleges that ZHOU used servers created by the account in order to establish a virtual private network (“VPN”) that would encrypt network traffic such that the true location and IP address of the actor or actors would be obfuscated. ZHOU also used the VPS accounts to create other accounts through which he communicated with buyers who were interested in obtaining access to computer networks compromised by YIN. ZHOU also used the accounts for victim reconnaissance purposes.

                The affidavit in support of the seizure of the domains alleges that funds used to purchase computer network infrastructure used in numerous victim network breaches ultimately connected to an account registered in YIN’s name, from China, using an email address and phone number belonging to YIN. Of particular note, a virtual private server account controlled by YIN was associated with the compromise at Treasury.

                This case is being investigated by the FBI’s Washington Field Office and the Naval Criminal Investigative Service (NCIS) who continue to investigate malicious cyber activity associated with these defendants and threat actors and continue to notify affected victims immediately once any networks intrusions are discovered. The FBI’s Cyber Division and Department of Defense’s Cyber Crimes Center provided valuable assistance to the investigation.  Private partners from Microsoft, Volexity, Palo Alto Networks Unit 42, and Mandiant also provided valuable assistance with this investigation. The case is being prosecuted by Assistant U.S. Attorneys Jack F. Korba, and Tejpal S. Chawla, and National Security Division’s National Security Cyber Section Trial Attorney Tanner Kroeger. Paralegal Specialist Michael Watts and former Assistant U.S. Attorneys Demian Ahn and Opher Shweiki for the United States Attorney’s Office in the District of Columbia provided assistance on this case.

                An indictment is merely an allegation and a defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.  

    MIL Security OSI

  • MIL-OSI Security: Texas Man Sentenced to 200 Months in Prison

    Source: Office of United States Attorneys

    FORT WAYNE – Elijah Shores, 30 years old, of Irving, Texas, was sentenced by United States District Court Chief Judge Holly A. Brady, after pleading guilty to distributing fentanyl, possessing fentanyl with intent to distribute, and possessing a firearm in furtherance of a drug trafficking crime, announced Acting United States Attorney Tina L. Nommay.

    Shores was sentenced to 200 months in prison followed by 4 years of supervised release.

    This case was investigated by the Federal Bureau of Investigation with assistance from the Indiana State Police and the Fort Wayne Police Department. The case was prosecuted by Assistant United States Attorney Lesley J. Miller Lowery.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    MIL Security OSI

  • MIL-OSI Security: Former Clovis CPA Pleads Guilty to Stealing Over $800,000 From a Bank

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    FRESNO, Calif. — Kenneth Gould, 68, formerly of Clovis, pleaded guilty to bank larceny for stealing more than $800,000 from a bank, Acting U.S. Attorney Michele Beckwith announced today.

    According to court records, Gould was a Certified Public Accountant (CPA) and operated a payroll services company in Clovis. From October 2017 through March 2018, he initiated several fraudulent electronic payments from one of his clients’ accounts to his payroll company’s account at the bank. Gould then withdrew the money in cashier’s checks while the payments were pending. After the bank had credited the fraudulent payments to the payroll company’s account for a short period of time, it realized there were insufficient funds to cover the payments, denied the payments, and attempted to recover its money, but it was too late. Approximately $830,000 of the credited funds was already gone. Gould gave the funds to the client from whose account he initiated the fraudulent payments because he had loaned that individual money and was hopeful that the individual would pay him back. Instead, the client gambled the money away.

    This case is the product of an investigation by the Federal Bureau of Investigation. Assistant U.S. Attorney Joseph Barton is prosecuting the case.

    Gould is scheduled to be sentenced by U.S. District Judge Jennifer L. Thurston on June 2, 2025. Gould faces maximum statutory penalties of 10 years in prison and a $250,000 fine. The actual sentence, however, will be determined at the discretion of the court after consideration of any applicable statutory factors and the Federal Sentencing Guidelines, which take into account a number of variables.

    MIL Security OSI

  • MIL-OSI Security: Stockton Man Pleads Guilty for His Role in Large-Scale Methamphetamine Distribution Conspiracy

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    SACRAMENTO, Calif. — Jose Manuel Ontiveros Verdugo, 39, of Stockton, pleaded guilty today to conspiring to possess and distribute methamphetamine, Acting U.S. Attorney Michele Beckwith announced.

    According to court documents, between July 2019 and December 2019, Verdugo conspired with his co-defendants and others to distribute methamphetamine both in Stockton and throughout the country. During the investigation, an undercover source bought a total of 11 pounds of methamphetamine and a half pound of heroin from this drug trafficking organization. Law enforcement interdicted the group’s shipments of 50 pounds of methamphetamine destined for Nebraska, as well as a 21‑pound shipment destined for Pennsylvania.

    This case is the product of an investigation by the Federal Bureau of Investigation with assistance from the California Department of Corrections and Rehabilitation, Customs and Border Protection, the Drug Enforcement Administration, Homeland Security Investigations, San Joaquin County Probation, the Stockton Police Department, and the Tracy Police Department. Assistant U.S. Attorney Adrian T. Kinsella is prosecuting the case.

    Charges are pending against co-defendants Jorge Omar Arredondo Garcia, 46, of Lodi; Gregorio Ontiveros Verdugo, 41, of Morada; Alberto Navarro Zapata, 50, of Stockton; and Wilfredo Reyes, 48, of Manteca. The charges against them are only allegations; they are presumed innocent until and unless proven guilty beyond a reasonable doubt.

    Verdugo is scheduled to be sentenced by U.S. District Judge Dale A. Drozd on June 16, 2025. Verdugo faces a maximum statutory penalty of life in prison and a $10 million fine. The actual sentence, however, will be determined at the discretion of the court after consideration of any applicable statutory factors and the Federal Sentencing Guidelines, which take into account a number of variables.

    The case was investigated under the Organized Crime Drug Enforcement Task Forces (OCDETF). OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. For more information, please visit Justice.gov/OCDETF

    MIL Security OSI

  • MIL-OSI Security: Cocaine Trafficker Sentenced to 210 Months for Drug Distribution Conspiracy

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    SAN DIEGO – Rodolfo Benjamin Silva, a prolific cocaine, methamphetamine, and fentanyl trafficker who called himself the “King of Coke,” was sentenced in federal court today to 17.5 years in prison for distributing large quantities of illicit drugs in the U.S. and for facilitating the movement of cartel hitmen into the United States.

    At today’s hearing, prosecutors described Silva as a long-time San Diego-based drug distributor who worked directly with Mexican counterparts to receive narcotic shipments from Mexico. According to his plea agreement, in October 2022, Silva provided a drug courier with 114 pounds of methamphetamine and a kilogram of fentanyl for transport to Indianapolis, but it was interdicted in Oklahoma.

    Silva also admitted in his plea agreement to threatening, directing or using violence as part of his drug trafficking activities. Prosecutors told the court today that Silva assisted in bringing assassins known as “sicarios” from Mexico into the San Diego area for cartel enforcement operations. On one occasion, Silva hired a sicario from Mexico to come to San Diego where that individual attempted to fatally shoot one of Silva’s rivals, prosecutors said.

    This investigation was led by FBI and DEA in San Diego with integral assistance from the U.S. Attorney’s Office in the Southern District of Indiana and FBI’s Indianapolis Field Office.

    This case is being prosecuted by Assistant U.S. Attorney Ashley Goff.

    This prosecution is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) Strike Force Initiative, which provides for the establishment of permanent multi-agency task force teams that work side-by-side in the same location. This co-located model enables agents from different agencies to collaborate on intelligence-driven, multi-jurisdictional operations to disrupt and dismantle the most significant drug traffickers, money launderers, gangs, and transnational criminal organizations.

    DEFENDANT                                               Case Number 23CR02513-WQH                            

    Rodolfo Benjamin Silva, aka “Rudy”            Age: 44                       San Diego, CA

    SUMMARY OF CHARGES

    Conspiracy to Distribute Cocaine – Title 21, U.S.C., Sections 841(a)(1) and 846

    Maximum penalty: Mandatory minimum 10 years and up to life in prison, $10 million fine

    INVESTIGATING AGENCIES

    Federal Bureau of Investigation

    Drug Enforcement Administration

    MIL Security OSI

  • MIL-OSI Security: New York Man Who Ran Multimillion-Dollar Cryptocurrency Investment Scheme Found Guilty of Wire Fraud and Money Laundering

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    SAN FRANCISCO – A federal jury convicted Douglas Jae Woo Kim, 32, of New York, New York, on 14 counts of wire fraud, international money laundering, and money laundering.  The jury reached its verdict yesterday afternoon, following a three-week trial before Senior U.S. District Judge Charles R. Breyer.  

    According to court documents and evidence presented at trial, between October 2017 and June 2020, after moving to San Francisco, Kim engaged in a scheme to defraud investors, many of whom were friends and acquaintances, of over $7 million in money and cryptocurrency by holding himself out as a legitimate trader of cryptocurrency, a form of virtual currency.  Kim falsely represented that he was seeking short-term liquidity in the form of loans or investments for cryptocurrency trading or other legitimate business purposes and promised to trade or invest the cryptocurrency provided by investors and lenders to make a profit.  He also told victims that the loans carried no or very low risk, promised high rates of return on their loans, and claimed that he had sufficient funds to personally guarantee the loans.  

    “This case may involve the new world of virtual currency, but there’s nothing new about the defendant’s scheme to defraud,” said Acting United States Attorney Patrick D. Robbins.  “Douglas Kim made bogus promise after promise to investors and lenders, only to cheat them and send their money to offshore gambling sites.  Today’s verdict sends a clear message to anyone who engages in fraud in the Northern District of California: you will be prosecuted, and you will face serious consequences.”

    “Mr. Kim deceived those who trusted him, exploiting their confidence to fund his personal gambling activities rather than the legitimate investments he offered his victims. The FBI remains committed to identifying and bringing to justice individuals who manipulate and defraud others for financial gain,” said FBI Acting Special Agent in Charge Dan Costin.

    In October 2017, Kim contacted a victim by text message and said he was looking for investors interested in making what he called a short-term loan for a “fairly modest operation.”  Kim represented that he was investing in a cryptocurrency operation in which he would make a profit from fees charged to a peer-to-peer network and from exchange transactions, and informed the victim that the operation “isn’t very risky to me.”  Within days of receiving cryptocurrency from the victim to finance the investment, Kim transferred almost all of it to bitcoin sports betting sites located outside the United States.  Kim went on to obtain over a million dollars’ worth of funds from this victim over the course of the scheme, the majority of which went to offshore sports betting sites.

    In November 2017, Kim contacted another victim by email and said he was looking for cryptocurrency for a trading strategy.  Kim assured that the victim that “my activities are fairly low risk.”  On Dec. 1, 2017, Kim obtained a cryptocurrency loan from this victim worth approximately $186,000 at the time. Once the cryptocurrency was obtained, Kim immediately sent all of it to offshore sports betting sites. In total, Kim obtained over $500,000 in funds from this victim.

    In an agreement dated Jan. 1, 2018, Kim set out the terms of a similar investment with a third victim.  The agreement called for the victim to provide cryptocurrency valued at approximately $200,000 at the time.  The same day, Kim converted more than half of the funds to bitcoin and, in the following days, transferred substantially all the converted cryptocurrency to his account with an offshore casino.  Kim went on to obtain over $4 million in funds from this victim.

    Kim defrauded numerous other victims, including nine who testified at trial, until at least July 2020, when he was charged by federal complaint.  In 2023, while he was out on pretrial release, Kim allegedly renewed his scheme to defraud.  One count related to this renewed period of fraud remains pending.  

    The jury acquitted Kim of one count of international money laundering.

    Kim is scheduled to appear on June 25, 2025, to set a date for sentencing.  He faces a maximum penalty of 20 years in prison for each count of wire fraud and international money laundering, and 10 years in prison for each count of money laundering.  Any sentence will be imposed by the Court after consideration of the U.S. Sentencing Guidelines and the federal statute governing the imposition of a sentence, 18 U.S.C. § 3553.  

    Assistant U.S. Attorneys Noah Stern and Maya Karwande are prosecuting the case with the assistance of Veronica Hernandez, Maryam Beros, Andy Ding, Lynette Dixon, and Christine Tian. The prosecution is the result of an investigation by the FBI and IRS Criminal Investigation. 
     

    MIL Security OSI

  • MIL-OSI Security: Justice Department Charges 12 Chinese Contract Hackers and Law Enforcement Officers in Global Computer Intrusion Campaigns

    Source: United States Attorneys General

    Chinese Law Enforcement and Intelligence Services Leveraged China’s Reckless and Indiscriminate Hacker-for-Hire Ecosystem, Including the ‘APT 27’ Group, to Suppress Free Speech and Dissent Globally and to Steal Data from Numerous Organizations Worldwide,

    Note: View the indictments in U.S. v. Wu Haibo et al., U.S. v. Yin Kecheng, U.S. v. Zhou Shuai et al. here.

    The Justice Department, FBI, Naval Criminal Investigative Service, and Departments of State and the Treasury announced today their coordinated efforts to disrupt and deter the malicious cyber activities of 12 Chinese nationals, including two officers of the People’s Republic of China’s (PRC) Ministry of Public Security (MPS), employees of an ostensibly private PRC company, Anxun Information Technology Co. Ltd. (安洵信息技术有限公司) also known as “i-Soon,” and members of Advanced Persistent Threat 27 (APT27).

    These malicious cyber actors, acting as freelancers or as employees of i-Soon, conducted computer intrusions at the direction of the PRC’s MPS and Ministry of State Security (MSS) and on their own initiative. The MPS and MSS paid handsomely for stolen data. Victims include U.S.-based critics and dissidents of the PRC, a large religious organization in the United States, the foreign ministries of multiple governments in Asia, and U.S. federal and state government agencies, including the U.S. Department of the Treasury (Treasury) in late 2024.

    “The Department of Justice will relentlessly pursue those who threaten our cybersecurity by stealing from our government and our people,” said Sue J. Bai, head of the Justice Department’s National Security Division. “Today, we are exposing the Chinese government agents directing and fostering indiscriminate and reckless attacks against computers and networks worldwide, as well as the enabling companies and individual hackers that they have unleashed. We will continue to fight to dismantle this ecosystem of cyber mercenaries and protect our national security.”

    “The FBI is committed to protecting Americans from foreign cyber-attacks,” said Assistant Director Bryan Vorndran of the FBI’s Cyber Division. “Today’s announcements reveal that the Chinese Ministry of Public Security has been paying hackers-for-hire to inflict digital harm on Americans who criticize the Chinese Communist Party (CCP). To those victims who bravely came forward with evidence of intrusions, we thank you for standing tall and defending our democracy. And to those who choose to aid the CCP in its unlawful cyber activities, these charges should demonstrate that we will use all available tools to identify you, indict you, and expose your malicious activity for all the world to see.”

    According to court documents, the MPS and MSS employed an extensive network of private companies and contractors in China to hack and steal information in a manner that obscured the PRC government’s involvement. In some cases, the MPS and MSS paid private hackers in China to exploit specific victims. In many other cases, the hackers targeted victims speculatively. Operating from their safe haven and motivated by profit, this network of private companies and contractors in China cast a wide net to identify vulnerable computers, exploit those computers, and then identify information that it could sell directly or indirectly to the PRC government. The result of this largely indiscriminate approach was more worldwide computer intrusion victims, more systems worldwide left vulnerable to future exploitation by third parties, and more stolen information, often of no interest to the PRC government and, therefore, sold to other third-parties. Additional information regarding the indictments and the PRC’s hacker-for-hire ecosystem is available in Public Service Announcements published by the FBI today.

    U.S. v. Wu Haibo et al., Southern District of New York

    Today, a federal court in Manhattan unsealed an indictment charging eight i-Soon employees and two MPS officers for their involvement, from at least in or around 2016 through in or around 2023, in the numerous and widespread hacking of email accounts, cell phones, servers, and websites. The Department also announced today the court-authorized seizure of the primary internet domain used by i-Soon to advertise its business.

    “State-sponsored hacking is an acute threat to our community and national security,” said Acting U.S. Attorney Matthew Podolsky for the Southern District of New York. “For years, these 10 defendants — two of whom we allege are PRC officials — used sophisticated hacking techniques to target religious organizations, journalists, and government agencies, all to gather sensitive information for the use of the PRC. These charges will help stop these state-sponsored hackers and protect our national security. The career prosecutors of this office and our law enforcement partners will continue to uncover alleged state-sponsored hacking schemes, disrupt them, and bring those responsible to justice.”

    The defendants remain at large and wanted by the FBI. Concurrent with today’s announcement,  the U.S. Department of State’s Rewards for Justice (RFJ) program, administered by the Diplomatic Security Service, announced a reward of up to $10 million for information leading to the identification or location of any person who, while acting at the direction or under the control of a foreign government, engages in certain malicious cyber activities against U.S. critical infrastructure in violation of the Computer Fraud and Abuse Act. The reward is offered for the following individuals who are alleged to have worked in various capacities to direct or carry out i-Soon’s malicious cyber activity:

    • Wu Haibo (吴海波), Chief Executive Officer
    • Chen Cheng (陈诚), Chief Operating Officer
    • Wang Zhe (王哲), Sales Director
    • Liang Guodong (梁国栋), Technical Staff
    • Ma Li (马丽), Technical Staff
    • Wang Yan (王堰), Technical Staff
    • Xu Liang (徐梁), Technical Staff
    • Zhou Weiwei (周伟伟), Technical Staff
    • Wang Liyu (王立宇), MPS Officer
    • Sheng Jing (盛晶), MPS Officer

    i-Soon and its employees, to include the defendants, generated tens of millions of dollars in revenue as a key player in the PRC’s hacker-for-hire ecosystem. In some instances, i-Soon conducted computer intrusions at the request of the MSS or MPS, including cyber-enabled transnational repression at the direction of the MPS officer defendants. In other instances, i-Soon conducted computer intrusions on its own initiative and then sold, or attempted to sell, the stolen data to at least 43 different bureaus of the MSS or MPS in at least 31 separate provinces and municipalities in China. i-Soon charged the MSS and MPS between approximately $10,000 and $75,000 for each email inbox it successfully exploited. i-Soon also trained MPS employees how to hack independently of i-Soon and offered a variety of hacking methods for sale to its customers.

    The defendants’ U.S.-located targets included a large religious organization that previously sent missionaries to China and was openly critical of the PRC government and an organization focused on promoting human rights and religious freedom in China. In addition, the defendants targeted multiple news organizations in the United States, including those that have opposed the CCP or delivered uncensored news to audiences in Asia, including China and the New York State Assembly, one of whose representatives had communicated with members of a religious organization banned in China.

    The defendants’ foreign-located targets included a religious leader and his office, and a Hong Kong newspaper that i-Soon considered as being opposed to the PRC government. The defendants also targeted the foreign ministries of Taiwan, India, South Korea, and Indonesia.

    Assistant U.S. Attorneys Ryan B. Finkel, Steven J. Kochevar, and Kevin Mead for the Southern District of New York and Trial Attorney Gregory J. Nicosia Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case.

    U.S. v. Yin Kecheng and U.S. v. Zhou Shuai et al., District of Columbia

    Today, a federal court unsealed two indictments charging APT27 actors Yin Kecheng (尹可成) and Zhou Shuai (周帅) also known as “Coldface” for their involvement in the multi-year, for-profit computer intrusion campaigns dating back, in the case of Yin, to 2013. The Department also announced today court-authorized seizures of internet domains and computer server accounts used by Yin and Zhou to facilitate their hacking activity.

    The defendants remain at large. View the FBI’s Wanted posters for Shuai and Kecheng here.

    Concurrent with today’s announcement, the Department of States State’s Bureau of International Narcotics and Law Enforcement Affairs is announcing two reward offers under the Transnational Organized Crime Rewards Program (TOCRP) of up to $2 million each for information leading to the arrests and convictions, in any country, of malicious cyber actors Yin Kecheng and Zhou Shuai, both Chinese nationals residing in China.

    “These indictments and actions show this office’s long-standing commitment to vigorously investigate and hold accountable Chinese hackers and data brokers who endanger U.S. national security and other victims across the globe,” said Interim U.S. Attorney Edward R. Martin Jr. for the District of Columbia. “The defendants in these cases have been hacking for the Chinese government for years, and these indictments lay out the strong evidence showing their criminal wrongdoing. We again demand that the Chinese government to put a stop to these brazen cyber criminals who are targeting victims across the globe and then monetizing the data they have stolen by selling it across China.”

    The APT27 group to which Yin and Zhou belong is also known to private sector security researchers as “Threat Group 3390,” “Bronze Union,” “Emissary Panda,” “Lucky Mouse,” “Iron Tiger,” “UTA0178,” “UNC 5221,” and “Silk Typhoon.” As alleged in court documents, between August 2013 and December 2024, Yin, Zhou, and their co-conspirators exploited vulnerabilities in victim networks, conducted reconnaissance once inside those networks, and installed malware, such as PlugX malware, that provided persistent access. The defendants and their co-conspirators then identified and stole data from the compromised networks by exfiltrating it to servers under their control. Next, they brokered stolen data for sale and provided it to various customers, only some of whom had connections to the PRC government and military. For example, Zhou sold data stolen by Yin through i-Soon, whose primary customers, as noted above, were PRC government agencies, including the MSS and the MPS.

    The defendants’ motivations were financial and, because they were profit-driven, they targeted broadly, rendering victim systems vulnerable well beyond their pilfering of data and other information that they could sell. Between them, Yin and Zhou sought to profit from the hacking of numerous U.S.-based technology companies, think tanks, law firms, defense contractors, local governments, health care systems, and universities, leaving behind them a wake of millions of dollars in damages.

    The documents related to the seizure warrants, also unsealed today, further allege that Yin and Zhou continued to engage in hacking activity, including Yin’s involvement in the recently announced hack of Treasury between approximately September and December 2024. Virtual private servers used to conduct the Treasury intrusion belonged to, and were controlled by, an account that Yin and his co-conspirators established. Yin and his co-conspirators used that same account and other linked accounts they controlled to lease servers used for additional malicious cyber activity. The seizure warrant unsealed today allowed the FBI to seize the virtual private servers and other infrastructure used by the defendants to perpetrate these crimes.

    On Jan. 17, Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions against Yin for his role in hacking that agency between September and December 2024. Concurrent with today’s indictments, OFAC also announced sanctions on Zhou and Shanghai Heiying Information Technology Company Ltd., a company operated by Zhou for purposes of his hacking activity.

    Private sector partners are also taking voluntary actions to raise awareness and strengthen defenses against the PRC’s malicious cyber activity. Today, Microsoft published research that highlights its unique, updated insights into Silk Typhoon tactics, techniques, and procedures specifically its targeting of the IT supply chain.

    Assistant U.S. Attorneys Jack F. Korba and Tejpal S. Chawla for the District of Columbia and Trial Attorney Tanner Kroeger of the National Security Division’s National Security Cyber Section are prosecuting the case.

    ***

    The above disruptive actions targeting PRC malicious cyber activities were the result of investigations conducted by FBI New York and Washington Field Offices, FBI Cyber Division, the Naval Criminal Investigative Service. The U.S. Attorney’s Offices for the Southern District of New York and District of Columbia and the National Security Division’s National Security Cyber Section are prosecuting the case.

    The Department acknowledges the value of public-private partnerships in combating advanced cyber threats and recognizes Microsoft, Volexity, PwC, and Mandiant for their valuable assistance in these investigations.

    The details in the above-described indictments and warrants are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI United Kingdom: More rights for victims of crime

    Source: Scottish Government

    Notification scheme to be expanded.

    More crime victims will get access to a range of information about the perpetrator and have a say on decisions about their prison release under newly unveiled justice reforms.

    Currently victims can register with the Victim Notification Scheme (VNS) if the offender in their case has been sentenced to 18 months or more in prison, or with the Victim Information Scheme if the sentence was less than 18 months. Under Scottish Government proposals to be considered by the Scottish Parliament, all victims will be able to register under one programme with the same right rights and same access to information, regardless of the length of the offender’s prison sentence.

    A further proposal, if approved by MSPs, would give all victims the right to make representations where an offender is being considered for release on licence – and on the licence conditions they would like to see imposed. Currently this entitlement only applies where an offender was sentenced to four years or more in custody.

    Improvements are also proposed to the range of information available through the VNS for victims of offenders in the forensic mental health system who are subject to a compulsion order and restriction order.

    The plans build on previously announced proposed reforms to the Victim Notification Scheme that will create a new Victim Contact Team to give personalised support based on a victim’s individual needs.

    The latest plans are being introduced as proposed amendments to the Victims, Witnesses, and Justice Reform (Scotland) Bill, the next stage of which begins in the Scottish Parliament next week.

    Victims Minister Siobhian Brown said:

    “These reforms will put victims’ rights at the heart of the justice system. Victims of crime will be able to sign up to one simplified notification scheme that allows them to receive information about the offenders and, if they wish, to have a say in decisions being made about the offenders, including their release. These changes recognise that a victim’s rights should not hinge on the length of sentence that the perpetrator is serving.

    “One system will be easier for victims to navigate and this change will add to a raft of proposed reforms to the VNS, including the creation of a new Victim Contact Team.  We want victims to know their rights to receive information and to be supported to make informed choices on whether they wish to do so. We will continue to work closely with victims’ representatives as we take forward these reforms.”

     Background

    The Victim Notification Scheme (VNS) entitles victims of offenders sentenced to 18 months of more (or close relatives of those victims) to certain information about the person responsible for the crime, such as the date of the offender’s release or if they are eligible for temporary release, such as for training, work or home leave.

    For those who register, Part 2 of the VNS gives victims, or in certain cases the victim’s representative, the right to contribute to decisions taken whilst the offender is in prison or detained in hospital. This includes the right to make representations about the release of the offender.

    The Victim Information Scheme (VIS) is available for victims of offenders who are sentenced to less than 18 months’ imprisonment. Victims who sign up to the VIS are currently entitled to know only the date of the release or escape of the offender.

    The planned reforms to the VNS form part of the Scottish Government’s response to the Independent Review of the Victim Notification Scheme, which heard directly from victims about their experiences of the justice system and the VNS.

    Victim Notification Scheme: guidance for victims of crime

    A separate notification scheme exists for victims of offenders with a mental disorder.

    Scottish Government response to the Independent Review of the Victim Notification Scheme

    Victim Notification Scheme: Independent Review

    MIL OSI United Kingdom

  • MIL-OSI USA: Former Alabama Police Officer Pleads Guilty to Federal Civil Rights Violation and Child Sexual Exploitation

    Source: US State Government of Utah

    A former Killen, Alabama, Police Department officer pleaded guilty yesterday for sexually assaulting a woman while on duty and for receiving sexually explicit photos of a minor.

    As part of the plea agreement, Jarrod Gailen Webster admitted that, on Nov. 12, 2023, he violated the civil rights of a woman after initiating a traffic stop on the woman’s vehicle. Webster asked the woman to step out of her vehicle and he asked her what she wanted to do to “get out of this.” When the woman told Webster that she was not going to do anything for him, Webster handcuffed the woman and sexually assaulted her.

    Further, Webster admitted that, between June 2016 and October 2018, he communicated with a minor by phone. Webster asked the minor to produce and send him sexually explicit images of herself. The minor victim sent multiple photos to Webster at his request, at least one of which constituted child sexual abuse material (CSAM).

    “Jarrod Webster took an oath to protect and serve citizens of his community. He violated that oath when he sexually assaulted a woman and exploited a minor to produce and send sexually explicit images,” said U.S. Attorney Prim F. Escalona for the Northern District of Alabama. “We will continue to work with our law enforcement partners to ensure that those who violate positions of public trust are held accountable for their actions.”

    “Police officers are given immense trust and responsibility to serve and protect, and are therefore held to a higher standard, so there are serious consequences when one tarnishes the badge by breaking the law,” said Special Agent in Charge Carlton Peeples of the FBI Birmingham Field Office. “Jarrod Gailen Webster disgraced the uniform when he abused his authority, his sentencing affirms that the FBI has zero tolerance for officials who prey on the citizens they have sworn to protect.”

    Webster pleaded guilty to one count of deprivation of rights under color of law and one count of sexual exploitation of children. He is scheduled to be sentenced on May 20.

    Webster faces a maximum penalty of life in prison, five years of supervised release, and a fine of up to $250,000 for the count of deprivation of rights under color of law. He faces a mandatory minimum penalty of 15 years and maximum penalty of 30 years in prison, supervised release for life, and a fine of up to $250,000 for the count of sexual exploitation of children. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI Birmingham Field Office investigated the case.

    Assistant U.S. Attorney Michael Royster for the Northern District of Alabama and Senior Sex Crimes Counsel Maura White and Trial Attorney Sarah Howard of the Civil Rights Division’s Criminal Section are prosecuting the case. 

    MIL OSI USA News

  • MIL-OSI Security: Former Alabama Police Officer Pleads Guilty to Federal Civil Rights Violation and Child Sexual Exploitation

    Source: Office of United States Attorneys

    A former Killen, Alabama, Police Department officer pleaded guilty yesterday for sexually assaulting a woman while on duty and for receiving sexually explicit photos of a minor.

    As part of the plea agreement, Jarrod Gailen Webster admitted that, on Nov. 12, 2023, he violated the civil rights of a woman after initiating a traffic stop on the woman’s vehicle. Webster asked the woman to step out of her vehicle and he asked her what she wanted to do to “get out of this.” When the woman told Webster that she was not going to do anything for him, Webster handcuffed the woman and sexually assaulted her.

    Further, Webster admitted that, between June 2016 and October 2018, he communicated with a minor by phone. Webster asked the minor to produce and send him sexually explicit images of herself. The minor victim sent multiple photos to Webster at his request, at least one of which constituted child sexual abuse material (CSAM).

    “Jarrod Webster took an oath to protect and serve citizens of his community. He violated that oath when he sexually assaulted a woman and exploited a minor to produce and send sexually explicit images,” said U.S. Attorney Prim F. Escalona for the Northern District of Alabama. “We will continue to work with our law enforcement partners to ensure that those who violate positions of public trust are held accountable for their actions.”

    “Police officers are given immense trust and responsibility to serve and protect, and are therefore held to a higher standard, so there are serious consequences when one tarnishes the badge by breaking the law,” said Special Agent in Charge Carlton Peeples of the FBI Birmingham Field Office. “Jarrod Gailen Webster disgraced the uniform when he abused his authority, his sentencing affirms that the FBI has zero tolerance for officials who prey on the citizens they have sworn to protect.”

    Webster pleaded guilty to one count of deprivation of rights under color of law and one count of sexual exploitation of children. He is scheduled to be sentenced on May 20.

    Webster faces a maximum penalty of life in prison, five years of supervised release, and a fine of up to $250,000 for the count of deprivation of rights under color of law. He faces a mandatory minimum penalty of 15 years and maximum penalty of 30 years in prison, supervised release for life, and a fine of up to $250,000 for the count of sexual exploitation of children. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI Birmingham Field Office investigated the case.

    Assistant U.S. Attorney Michael Royster for the Northern District of Alabama and Senior Sex Crimes Counsel Maura White and Trial Attorney Sarah Howard of the Civil Rights Division’s Criminal Section are prosecuting the case. 

    MIL Security OSI

  • MIL-OSI: OBSI announces new board members

    Source: GlobeNewswire (MIL-OSI)

    TORONTO, March 05, 2025 (GLOBE NEWSWIRE) — The Board of Directors for the Ombudsman for Banking Services and Investments (OBSI) is pleased to announce three appointments to the board:

    • Maureen L. Buckley CPA, CA has joined the board as a Community Director. Ms. Buckley has held several leadership positions within the Ontario Public Service, most recently as the Provincial Controller where she led the preparation and release of the Ontario Public Accounts. Previously, she was the Chief Administrative Officer at multiple ministries within the Ontario Public Service. Before joining the Ontario Public Service, Ms. Buckley held several roles at Price Waterhouse where she earned her Chartered Accountant designation. She holds an undergraduate degree from York University.
    • Jason Enouy B.A., JD has joined the board as an Industry Director. He is the Senior Vice President and Chief Compliance Officer at Raymond James Ltd., leading all compliance functions for the firm. Before joining the firm, he led compliance and risk management functions at two large Canadian wealth management and securities firms, as well as a schedule II chartered bank. Mr. Enouy is a member of the Law Society of Ontario and holds a Juris Doctor from the University of Toronto and a Bachelor of Arts from Carleton University in Ottawa. He sits on the Board of the Raymond James Canada Foundation.
    • Professor Marina Pavlović LL.B, LL.M has joined the board as a Consumer Interest Director. She is an Associate Professor at the University of Ottawa, Faculty of Law, Common Law Section. A leading Canadian expert on consumer rights and technology policy, she brings extensive experience in research, advocacy, and law reform focused on consumer rights and access to justice. Ms. Pavlović has strong ties with consumer and public interest organizations and has represented them as counsel before the Supreme Court of Canada in landmark cases, including Douez v. Facebook, Uber v. Heller, and International Air Transport Association v. Canada. She has also appeared before the CRTC, the Canadian Transportation Agency, and parliamentary committees, influencing key policy and regulatory decisions affecting consumer rights. An award-winning educator, Ms. Pavlović is recognized for redefining legal education through her innovative and immersive teaching. She holds a law degree from the University of Belgrade, an LL.M. in Law & Technology from the University of Ottawa and is a member of the Law Society of Ontario.

    OBSI is overseen by an independent Board of Directors. OBSI’s bylaws require that a majority of directors, including the Board Chair, be independent, meaning they have not been affiliated with industry for at least two years. These independent directors are referred to as community directors. Three of the community directors are also designated as consumer interest directors, who have a particular interest in, access to, and competency with the interests and perspectives of the consumers that OBSI serves. The board also includes three designated industry directors who are directly affiliated with a participating firm.

    Industry directors and consumer interest directors are expected to bring their unique perspectives and expertise to board deliberations to ensure that OBSI governance is undertaken with an understanding and appreciation of the interests and concerns of all the stakeholders served by the organization. All directors have a fiduciary duty to OBSI and do not advocate for or represent any outside interest while engaged in OBSI governance.

    More information about the Board of Directors is available here.

    Canada’s Ombudsman for Banking Services and Investments (OBSI) is a national, independent, not-for-profit organization that helps resolve and reduce disputes between consumers and financial services firms in both official languages. OBSI is responsive to consumer inquiries, conducts fair and accessible investigations of unresolved disputes, and shares its knowledge and expertise with all stakeholders and the public. If a consumer has a complaint against an OBSI participating bank or investment firm that they are not able to resolve with the bank or firm, OBSI will investigate at no cost to the consumer. Where a complaint has merit, OBSI may recommend compensation up to a maximum of $350,000.

    For more information, contact:

    Mark Wright, Director, Communications and Stakeholder Relations

    416-287-2877 ext.2225

    publicaffairs@obsi.ca

    The MIL Network

  • MIL-OSI Security: Eielson Airman Sentenced to Five Years for Possessing Child Pornography

    Source: Federal Bureau of Investigation (FBI) State Crime News

    FAIRBANKS, Alaska – An Eielson Airman was sentenced today to five years in prison and will serve 15 years on supervised release for paying to receive child pornography.

    According to court documents, on Nov. 7, 2023, Kyle Cozens, 32, who was stationed on Eielson Air Force Base, was interviewed by the FBI in a related case from Illinois involving child sexual abuse material (CSAM). Cozens allowed agents to review messages on his phone and they observed CSAM images of a known victim. Agents obtained a search warrant for Cozens’ phone and discovered he was communicating with individuals on messaging apps and buying CSAM images from them. Agents discovered multiple CSAM images and videos on his phone, with some visuals depicting prepubescent females.

    On March 1, 2024, law enforcement searched Cozens’ residence and seized over 30 electronic devices. To date, law enforcement has identified over 80 videos and over 680 images depicting child sexual abuse on Cozens’ devices.

    On Nov. 15, 2024, Cozens pleaded guilty to one count of receipt of child pornography. In addition to prison time and supervised release, Cozens is required to register as a sex offender upon release from prison as part of his sentence.

    “The widespread dissemination of images of children forced to endure sexual abuse is a horrific crime that law enforcement fights every day. Mr. Cozens contributed to the revictimization of those children by paying for visuals of child sexual abuse,” said First Assistant U.S. Attorney Kathryn R. Vogel for the District of Alaska. “My office will continue to protect our most vulnerable by partnering with law enforcement to find and prosecute anyone who targets children for nefarious purposes.”

    “The defendant purchased and possessed large amounts of CSAM, directly contributing to online child exploitation and the re-victimization of young children,” said Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office. “This sentencing underscores the FBI’s commitment to ensuring child predators are identified and held accountable for their crimes against children.”

    “Interagency partnerships, like the ones utilized in this case, are vital to fighting child exploitation,” said Special Agent Tyler Pierson, Air Force Office of Special Investigations Detachment 632.  “AFOSI is committed to these partnerships and our mission of protecting the Department of the Air Force from criminal behavior that threatens the mission, equipment and people of the Department.”

    The FBI Anchorage Field Office, Fairbanks Resident Agency, and U.S. Air Force Office of Special Investigations investigated the case, with assistance from the FBI Springfield Field Office.

    Assistant U.S. Attorney Carly Vosacek prosecuted the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

    ###

    MIL Security OSI

  • MIL-OSI Security: Large-scale cocaine importers sentenced to federal prison

    Source: Office of United States Attorneys

    STATESBORO, GA:  Two men who supplied kilograms of cocaine for a major drug trafficking conspiracy have been sentenced to federal prison.

    Pedro Castro-Vasquez, a/k/a “Chipo,” 53, of Puerto Rico, and Sonic Torres-Garcia, 27, of Kissimmee, Florida,  were each sentenced after pleading guilty to Conspiracy to Possess with Intent to Distribute, and to Distribute, Cocaine, said Tara M. Lyons, Acting U.S. Attorney for the Southern District of Georgia. U.S. District Court Judge J. Randal Hall sentenced Castro-Vasquez to 180 months in prison and a fine of $1,500, followed by three years of supervised release, and sentenced Torres-Garcia to 180 months in prison, consecutive to other pending state and federal cases, and a fine of $2,500, followed by three years of supervised release.

    There is no parole in the federal system.

    “The conspiracy identified in this multi-year investigation was responsible for importing and distributing large quantities of drugs in the Southern District,” said Acting U.S. Attorney Lyons. “Multiple law enforcement agencies persisted through this lengthy investigation in identifying the key players in this drug trafficking operation, holding them accountable for spreading misery in the Southern District.”

    As described in the 49-count indictment unsealed in November 2022, Operation Carpet Ride identified a drug trafficking conspiracy operating in Bulloch, Burke, Candler, Effingham, Evans, Liberty, Richmond, and Tattnall counties, and elsewhere, from as early as January 2016. Led by Daniel Morales-Jimenez, a/k/a “Danny Hill,” 48, of Puerto Rico, the conspiracy imported large quantities of cocaine, methamphetamine and other drugs from and through Puerto Rico, into Florida and the Southern District. Morales-Jimenez pled guilty to federal conspiracy charges in both the Southern District and in Puerto Rico and awaits sentencing.

    Castro-Vasquez was identified as a kilo-quantity distributor who obtained cocaine from Morales-Jimenez, arranging importation into the continental United States for distribution in the Southern District. Torres-Garcia supplied kilos of cocaine to Demarr Clayton Lee, 55, of Miami, Florida, while also arranging to deliver cocaine to the Southern District using members of his family. Lee, who pled guilty in the conspiracy, is serving a sentence of 98 months in federal prison, while 26 other defendants in Operation Carpet Ride are serving sentences of up to 240 months in prison after pleading guilty. 

    “This case represents the continued commitment of the Drug Enforcement Administration to identify and hold accountable those who engage in the distribution of dangerous drugs,” said Jae W. Chung, the Acting Special Agent in Charge of the DEA Atlanta Division.

    “The U.S. Postal Inspection Service employs a whole-of-government approach to combatting illicit drugs in the mail,” said Steven Hodges, Acting Inspector in Charge of the U.S. Postal Inspection Service Miami Division. “This case, and our partnerships, illustrate our strategy in action. Protecting the American public through criminal investigations like this is a top priority of the U.S. Postal Inspection Service.”

    The case was investigated under the Organized Crime Drug Enforcement Task Forces (OCDETF). OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach.

    The case was investigated by the U.S. Drug Enforcement Administration; the Bureau of Alcohol, Tobacco, Firearms and Explosives; the U.S. Postal Inspection Service; Homeland Security Investigations; the Georgia Bureau of Investigation; the Puerto Rico State Police; the Georgia State Board of Pardons and Paroles; the Georgia Department of Community Supervision; the Tattnall County Sheriff’s Office; the Bulloch County Sheriff’s Office; the Evans County Sheriff’s Office; the Barceloneta Police Department; the Claxton Police Department; and the Glennville Police Department; and prosecuted for the United States by Southern District of Georgia Assistant U.S. Attorneys Frank M. Pennington II and OCDETF Coordinator Marcela C. Mateo. 

    MIL Security OSI

  • MIL-OSI: Baltic Horizon Fund General Meeting – notice to investors

    Source: GlobeNewswire (MIL-OSI)

    At the request of a unitholder whose units represent more than 1/10 of all the votes, Northern Horizon Capital AS invites Baltic Horizon Fund unit-holders and Swedish Depositary Receipt (hereinafter the “SDR”) holders (hereinafter together the “Investors”) to attend an extraordinary General Meeting (hereinafter the “General Meeting”) of Baltic Horizon Fund on 27 March 2025 at 14:00 (local Estonian time) at the office of Northern Horizon Capital AS at Roseni 7 (A tower), 6th floor, 10111 Tallinn, Estonia. Registration for the meeting will begin at 13:00. The General Meeting will be held in English.

    The meeting is convened in accordance with sections 10.3.3., 10.5, 10.6 and 11.2 of the Rules of Baltic Horizon Fund and section 47-1 of the Investment Funds Act of Estonia.

    The total number of units and votes in Baltic Horizon Fund amounts to 143,562,514 .

    Investors may also join the webinar to view the General Meeting online on 27 March 2025 at 14:00.

    To join the webinar, please register via the following link: https://nasdaq.zoom.us/webinar/register/WN_Cd4HF9QwQpaCuPaPa5etOA.

    You will be provided with the webinar link and instructions how to join successfully. The webinar will be recorded and available online for everyone at the company’s website on www.baltichorizon.com.

    Agenda, as proposed by the unitholder:

    1. Decision to elect Andrius Smaliukas as a new member of the supervisory board of Baltic Horizon Fund as of 1 May 2025 for a period of two years.
    2. Decision to elect Milda Dargužaitė as a new member of the supervisory board of Baltic Horizon Fund as of 1 May 2025 for a period of two years.
    3. Decision to elect Antanas Anskaitis as a new member of the supervisory board of Baltic Horizon Fund as of 1 May 2025 for a period of two years.
    4. Decision to pay remuneration to the chairman of the supervisory board for fulfilling obligations of the member of the supervisory board in the amount of EUR 36,000 per calendar year.
    5. Decision to pay remuneration to supervisory board members, other than  the chairman, for fulfilling obligations of the member of the supervisory board in the amount of EUR 11,000 per calendar year.
    6. Decision to recall Reimo Hammerberg, Monica Hammer and David Bergendahl from the position of the supervisory board member of Baltic Horizon Fund with the last date of the office being 30 April 2025.

    Investors are invited to send questions and comments on the agenda to the Baltic Horizon fund manager at Tarmo.Karotam@nh-cap.com by 20 March 2025. Northern Horizon Capital AS will respond to the questions and comments at the meeting itself.

    Participation – requirements and notice

    Investors who are entered in the Baltic Horizon Fund registry of unit-holders maintained by Nasdaq CSD SE and holders of SDRs registered in the Euroclear Sweden AB system ten days before the date of the General Meeting, i.e. at the end of business of Nasdaq CSD SE on 17 March 2025, are entitled to participate in the meeting.

    In order to facilitate the registration process, investors whose units are registered in their own name are invited to provide notice of their attendance by 24 March 2025 to bhfmeeting@nh-cap.com. Notice should include name, personal identification number (or the registration number of the legal person), address, number of units represented and, if applicable attendance of any representatives, along with the name and personal identification number of the representatives. The attendance of a representative does not deprive the unit-holder of the right to participate at the meeting.

    Instructions to holders of Baltic Horizon Fund SDRs registered with Euroclear Sweden AB in Sweden

    IMPORTANT REQUIREMENT: SDR holders whose SDR-s are registered with Euroclear Sweden AB via a bank or other nominee are required to notify their bank or nominee account provider by 17 March 2025 to temporarily add their name on the Euroclear Sweden AB owner register.

    Notice of participation should also be sent by 16:00 EET on 24 March 2025 to bhfmeeting@nh-cap.com. Notice should include name, personal identification number (or the registration number of the legal person), address, number of units represented and, if applicable, attendance of any representatives, along with the name and personal identification number of the representatives. The attendance of a representative does not deprive the Investor of the right to participate at the meeting.

    Representation under a power of attorney

    Investors whose representatives are acting under a power of attorney are requested to prepare a written power of attorney for the representative in Estonian or English (templates can be found at Annex 1).

    A copy of the executed power of attorney should be sent to bhfmeeting@nh-cap.com together with the notice of participation. In case the power of attorney is issued by a legal person, a certified copy of the registration certificate (or equivalent certificate of authority) shall also be submitted together with, as applicable, the documents certifying the authority of the representative in case the power of attorney is signed by a person under a power of attorney.

    Baltic Horizon Fund is registered in Estonia, which means that any power of attorney (or any certified copy of the registration certificate of a legal person) issued in a foreign country should be notarised and accompanied by an apostille. The apostille requirement applies, for example, to powers of attorney issued and notarised in Sweden or Finland. 

    Instructions for the day of the General Meeting

    We kindly ask Investors to bring a personal identification document, and for their representatives also to present the original written power of attorney in English or Estonian. In case the Investor is a legal person, documentation in Estonian or English certifying the authority of the Investor’s representative or the signatory of the power of attorney will also be requested.

    Data collected by Northern Horizon Capital AS from powers of attorney, the unitholders registry maintained by Nasdaq CSD SE, and the list of holders of SDRs registered in the Euroclear Sweden AB system will be used for the purpose of registration for the meeting.

    1. Decision to elect Andrius Smaliukas as a new member of the supervisory board of the Baltic Horizon Fund

    According to section 11.2 of the Rules of Baltic Horizon Fund the members of the supervisory board shall be appointed at the general meeting for a period of at least two years. The  proposal is to elect Andrius Smaliukas as a new member of the supervisory board.

    Dr. Smaliukas is the Managing Partner at MMSP, a Lithuanian law firm focused on strategic corporate advisory and dispute resolution. He previously partnered at one of the leading Pan-Baltic firm, Valiunas Ellex, and holds nearly 20 years of experience as an arbitrator and international arbitration lead counsel. Dr. Smaliukas earned his Ph.D. and Master of Laws from Vilnius University, conducted postgraduate research at Oxford, and completed executive programs at Cambridge Judge Business School and Harvard Law School. Dr.Smaliukas serves on the boards of Staticus Group, Kesko Senukai, has extensive advisory experience in commercial real estate M&A and investment management across the Baltic countries.

    Andrius Smaliukas does not hold any units of the Baltic Horizon Fund.

    1. Decision to elect Milda Dargužaitė as a new member of the supervisory board of the Baltic Horizon Fund

    According to section 11.2 of the Rules of Baltic Horizon Fund the members of the supervisory board shall be appointed at the general meeting for a period of at least two years. The proposal is to elect Milda Dargužaitė as a new member of the supervisory board.

    Milda Dargužaitė is the former CEO of Northern Horizon Capital A/S, the shareholder of Northern Horizon Capital AS. She was responsible for managing the company’s operations and strategic direction, including the development of new funds and investment vehicles. Milda has significant experience in both the public and private sectors, locally and internationally. She joined the company in 2018 after roles as the Chancellor at the Lithuanian Prime Minister’s Office, Managing Director of Invest Lithuania, and advisor to the Lithuanian Minister of Economy. Milda has a wealth of experience in finance and portfolio management from her time at Goldman Sachs in New York and Barclays in London. Milda Dargužaitė was the supervisory board member of Northern Horizon Capital AS from July 2018 until September 2023.

    Milda holds a bachelor’s degree in Mathematics and Economics from Middlebury College and a master’s degree in Operations Research and Financial Engineering from Princeton University. She has served on the boards of several Northern Horizon Group entities.

    Milda Dargužaitė does not hold any units of the Baltic Horizon Fund.

    1. Decision to elect Antanas Anskaitis as a new member of the supervisory board of the Baltic Horizon Fund

    According to section 11.2 of the Rules of Baltic Horizon Fund the members of the supervisory board shall be appointed at the general meeting for a period of at least two years. The proposal is to elect Antanas Anskaitis as a new member of the supervisory board.

    Antanas Anskaitis is a partner at Grinvest which is a private investment company with interests in real estate and transportation. Antanas has over 20 years of real estate investment management experience (out of which 16 within Northern Horizon Capital group). Since 2015 until 2020 Antanas managed a successful Baltic-Polish investment portfolio on behalf of Partners Group and lead over 30 commercial property transactions in the Baltics and Poland having experience both on sell and buy side. Antanas has MSc in Management and Economics.

    Grinvest through its subsidiary in Estonia Gene Investments OÜ is the largest unitholder in Baltic Horizon Fund (>25%) at the time of this notice.

    1. Decision to pay remuneration to the chairman of the supervisory board

    According to section 11.11 of the Rules of Baltic Horizon Fund, supervisory board members are entitled to remuneration for their service. The amount of remuneration payable to the chairman and members of the supervisory board shall be decided at the general meeting. According to section 11.4 of the Rules of Baltic Horizon Fund, supervisory board members elect a chairman from among themselves in the first meeting after election of any new member(s).

    The supervisory board in this composition intends working in close liaison with Northern Horizon Capital AS in the subcommittees and meet at least once a month while Baltic Horizon Fund is in the turnaround phase. The proposal is therefore to pay remuneration to the chairman of the supervisory board in the amount of EUR 36,000 per calendar year.

    1. Decision to pay remuneration to supervisory board members

    According to section 11.11 of the Rules of Baltic Horizon Fund, supervisory board members are entitled to remuneration for their service. The amount of remuneration payable to the chairman and members of the supervisory board shall be decided at the general meeting. 

    The proposed remuneration is the same as for the current members of the supervisory board. The unitholder proposes to remunerate each supervisory board member (except the chairman, who shall be remunerated in accordance with point 4 above) in the amount of EUR 11,000 per calendar year.

    1. Decision to recall Reimo Hammerberg, Monica Hammer and David Bergendahl from the position of the supervisory board member of Baltic Horizon Fund

    According to section 10.3.3 of the Rules of Baltic Horizon Fund the members of the supervisory board shall be recalled at the general meeting.

    Annex 1:

    Form of power of attorney to appoint a representative for the general meeting (in Estonian)

    Form of power of attorney to appoint a representative for the general meeting (in English)

    For additional information, please contact:

    Tarmo Karotam
    Baltic Horizon Fund manager
    E-mail tarmo.karotam@nh-cap.com
    www.baltichorizon.com

    The Fund is a registered contractual public closed-end real estate fund that is managed by Alternative Investment Fund Manager license holder Northern Horizon Capital AS. 

    Distribution: GlobeNewswire, Nasdaq Tallinn, Nasdaq Stockholm, www.baltichorizon.com

    To receive Nasdaq announcements and news from Baltic Horizon Fund about its projects, plans and more, register on www.baltichorizon.com. You can also follow Baltic Horizon Fund on www.baltichorizon.com and on LinkedIn, FacebookX and YouTube.

    Attachments

    The MIL Network

  • MIL-OSI United Kingdom: E3 Foreign Ministers’ statement on humanitarian access in Gaza

    Source: United Kingdom – Executive Government & Departments 3

    Press release

    E3 Foreign Ministers’ statement on humanitarian access in Gaza

    Statement from the Foreign Ministers of the UK, France and Germany on humanitarian access in Gaza

    Joint Statement on behalf of the Foreign Ministers of France, Germany and the UK (E3)

    We, the Foreign Ministers of France, Germany and the United Kingdom recall our continued support for the ceasefire between Israel and Hamas.

    It is vital that the ceasefire is sustained, all the hostages are released, and continued flows of humanitarian aid to Gaza are ensured. We urge all parties to engage constructively in negotiating the subsequent phases of the deal to help ensure its full implementation and a permanent end to hostilities. We welcome Egyptian, Qatari and US efforts in mediating and seeking to agree an extension to the ceasefire.

    The humanitarian situation in Gaza is catastrophic. We express our deep concern at the Government of Israel’s announcement on 2 March to halt all entry of goods and supplies into Gaza. We call on the Government of Israel to abide by its international obligations to ensure full, rapid, safe and unhindered provision of humanitarian assistance to the population in Gaza.  This includes supply of items such as medical equipment, shelter items, and water and sanitation equipment, essential to meet humanitarian and early recovery needs in Gaza, but which face restrictions under Israel’s “dual use” list. A halt on goods and supplies entering Gaza, such as that announced by the Government of Israel would risk violating International Humanitarian Law. Humanitarian aid should never be contingent on a ceasefire or used as a political tool. We reiterate that the civilians of Gaza who have suffered so much must be allowed to return to their homes and rebuild their lives.

    All hostages must be unconditionally released and Hamas must end their degrading and humiliating treatment. We reiterate our unwavering solidarity with their families and with the Israeli people in the face of the terrorist attacks committed by Hamas on 7 October 2023.

    We need all parties to uphold the ceasefire and ensure it leads to a sustainable peace, the reconstruction of Gaza, and to allow for a credible pathway towards a two-state solution in which Israelis and Palestinians can live side by side in peace.

    Updates to this page

    Published 5 March 2025

    MIL OSI United Kingdom

  • MIL-OSI USA: 4 sentenced to federal prison for cocaine conspiracy involving 89 kilograms

    Source: US Immigration and Customs Enforcement

    ORLANDO, Fla. – Four individuals from Central Florida were sentenced March 4 to a combined 32 years and three months in federal prison for their roles in conspiring to distribute more than 89 kilograms of cocaine in the Orlando region following a joint Organized Crime Drug Enforcement Task Force investigation with the Drug Enforcement Administration and U.S. Immigration and Customs Enforcement.

    Each previously pleaded guilty. The conspirators also forfeited $464,031 in cash seizures in the case:

    • Israel Miranda, 36, of Kissimmee, was sentenced to 10 years in federal prison.
    • Abiezer Laboy Lozada, 36, of Orlando, was sentenced to 10 years in federal prison.
    • Jorge Antonio Gonzalez de la Fuente, 31, of St. Cloud, was sentenced to seven years and three months in federal prison.
    • Carlos Antonio Garcia Garcia, 35, of Kissimmee, was sentenced to five years in federal prison.

    According to the plea agreements, the Drug Enforcement Administration identified a group of individuals working to distribute kilogram quantities of cocaine and the proceeds of those sales during 2022. On May 1, 2023, the DEA surveilled Miranda as he distributed drugs to Laboy Lozada in a parking lot. In this and similar meetings during the conspiracy, Laboy Lozada admitted to obtaining 20-30 kilograms of cocaine from Miranda. On Oct. 4, 2023, Miranda delivered a shoe box to Gonzalez de la Fuente, who delivered it to Garcia Garcia. When law enforcement stopped Garcia Garcia’s vehicle, he was found to be carrying that same box containing a kilogram of cocaine.

    Over the course of the conspiracy, Gonzalez de la Fuente met with his conspirators two or three times a month and was involved in distribution of 15-50 kilograms of cocaine. Gonzalez de la Fuente continued to engage in drug distribution after being charged federally and was detained when this was discovered.

    On Oct. 13, 2023, Miranda delivered drug proceeds to an individual who was found to be transporting $262,257 in a brown paper bag. At the same time, Miranda texted a conspirator an image of the stacks of bills he was distributing with the message “should be 110k.” Similar enforcement actions resulted in the seizure of $51,989 from Miranda on Nov. 7, 2023, and $149,785 from Miranda on March 6, 2024. Over the course of the conspiracy, Miranda distributed drugs or drug proceeds reflecting distribution of more than 89 kilograms of cocaine.

    This case was investigated by the Drug Enforcement Administration, with assistance from the Florida Highway Patrol, ICE Orlando, U.S. Secret Service, and the Orange County Sheriff’s Office. It was prosecuted by Assistant U.S. Attorney Dana E. Hill. This case was part of an OCDETF investigation. OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach.

    MIL OSI USA News

  • MIL-OSI Security: Detectives name teenager shot in Stockwell

    Source: United Kingdom London Metropolitan Police

    Detectives investigating the murder of a boy shot in Stockwell have named him, while they continue appeals for witnesses and information.

    Lathaniel Burrell from Stockwell sadly died at the scene following yesterday’s shooting. He was 16-years-old.

    Officers are now asking for the public’s help to track down those responsible.

    Police were alerted at 15:21hrs on Tuesday, 4 March to reports of a shooting at Paradise Road, SW4, and attended with emergency services colleagues.

    London’s Air Ambulance and London Ambulance Service treated Lathaniel at the scene but despite their best efforts, he died. His family are being supported by specialist officers.

    The investigation is being led by a homicide team.

    Detective Chief Inspector Sarah Lee said: “This is a horrendous crime, which has shocked the local community and beyond. Our thoughts are with Lathaniel’s family and friends at this devastating time.

    “Our investigation is continuing at pace, examining CCTV and collecting witness statements.

    “We have deployed officers to the area on reassurance patrol, and have officers on the ground engaging with the local schools.

    “We need the help of the public too – if you were in the local area please think remember back to yesterday afternoon and come forward with any information, no matter how small.

    “We are particularly keen to speak to anyone who has any mobile phone or dash cam footage from the area surrounding Paradise Road.”

    No arrests have been made at this stage, and detectives are keeping an open mind about the possible motive for the attack.

    If you were a witness or have any information, please call police on 101 with the reference 4116/4MAR.

    You can also contact the independent charity Crimestoppers on 0800 555 if you want to remain anonymous.

    MIL Security OSI

  • MIL-OSI Security: Deer Lake — Deer Lake RCMP investigates fatal snowmobile incident near Angus Lake

    Source: Royal Canadian Mounted Police

    Deer Lake RCMP is investigating a fatal snowmobile incident that occurred on March 4, 2025. A 55-year-old man is deceased.

    At approximately 1:45 p.m. on Tuesday, police received the report. A group of snowmobilers were traveling together in a remote area near Angus Lake. One of the riders ended up in a brook, trapped underneath his snowmobile. The unresponsive man was removed from the water by his friends who administered countless rounds of CPR. Efforts to revive the man were unsuccessful.

    Deer Lake Search and Rescue was engaged, along with the Joint Rescue Coordination Centre (JRCC). The man’s body was removed from the area by JRCC and was transported to Western Memorial Regional Hospital in Corner Brook. The man was pronounced deceased during his transport to the hospital by a medical professional onboard the aircraft.

    The Office of the Chief Medical Examiner is engaged and the investigation is continuing.

    MIL Security OSI

  • MIL-OSI Global: Farm certification could make Canada’s farms fairer for migrant workers

    Source: The Conversation – Canada – By Erika Borrelli, PhD Candidate in Sociology and Social Justice, University of Windsor

    Amnesty International recently released a report criticizing Canada for labour migration policies and farm inspections that enable migrant farm worker exploitation. The report urges the Canadian government to abolish closed-work permits that tie migrant workers to a single employer.

    These concerns echo long-standing demands from Canadian researchers and migrant rights advocates. In 2024, a United Nations special rapporteur called Canada’s Temporary Foreign Worker Program a “breeding ground for contemporary forms of slavery.” Yet, calls for the government to address these flaws have gone unanswered.

    While we await much-needed policy reforms, farm certification could fill this gap. Farm certification offers a potential strategy to improve labour standards, uphold rights and amplify migrants’ voices.




    Read more:
    How we treat migrant workers who put food on our tables


    Essential but unprotected

    Though essential for the agriculture industry, migrant farm workers live in Canada on temporary, employer-tied work permits. These permits create fear of employer retaliation, discouraging workers from speaking up. This leaves them vulnerable to unsafe working conditions, abuse, exploitation and harassment, with few opportunities for recourse.

    Agricultural workers, whether migrants or citizens, are excluded from employment laws that protect workers in other industries. For example, overtime provisions, collective bargaining rights and sick pay vary by province. This leaves migrant workers — who are restricted to agricultural jobs — with fewer rights to claim. Compounding these challenges are ineffective farm inspections, which are mostly reactive and triggered by worker complaints.

    Studies show that fear of job loss and subsequent deportation or being blacklisted from immigration programs discourages migrants from filing complaints. Additionally, deterrents like fines for employers are rarely enforced, leaving violations unchecked.

    Farm certification as a creative strategy

    Farm certification recognizes farms with fair working conditions and enforces higher standards. This approach encourages retailers to prioritize certified producers, with compliance driven by market and consumer demand.

    However, some argue that relying solely on consumer choice — where people “vote with their dollar” by purchasing ethically certified products — is not enough. They’re right.

    In a recent project, colleagues and I examined the potential for introducing a farm certification scheme in Ontario.

    We focused on two U.S.-based strategies, the Equitable Food Initiative and the Fair Food Program, which emphasize collaboration among diverse stakeholders. These models offer insights into how they may be replicated in Canada while avoiding the commodification of migrants.

    U.S. farm certification models

    The Fair Food Program, initiated by the Coalition of Immokalee Workers (CIW), ensures fair wages and improved working conditions in Florida’s tomato fields.

    Compliance is enforced through contractual agreements between fast-food chains, retailers, growers and the CIW, all of whom commit to higher standards and responsible purchasing practices. Migrant workers played a central role in developing the program’s standards and remain involved in compliance and worker education.

    The Fair Food Program grew from grassroots campaigns that included hunger strikes and protests against low wages and extremely poor work conditions on farms. Campaigns later targeted major food corporations, arguing that if these companies could drive down farm wages, they could also demand better conditions from growers.

    The CIW organized a successful five-year boycott of Taco Bell, which ultimately joined the Fair Food Program, committing to source tomatoes only from growers who met the program’s standards. The boycott was successful due to sustained farm worker-student alliances. Other companies have since followed suit.

    The Equitable Food Initiative (EFI) is a certification model that integrates social and food safety standards. A selected group of workers at a certified farm, known as the Leadership Team, receive training on EFI’s standards and skills, such as communication and conflict resolution.

    The team functions as an internal grievance mechanism, allowing all workers to report concerns to designated members. Retailers participating in this initiative require growers to obtain EFI certification, replacing individual retailer audits.

    EFI emerged in California following the 2008 E. coli crisis. While industry leaders and retailers prioritized improving food safety standards on farms, migrant rights groups saw an opportunity to address poor working conditions for farm workers. Costco, Oxfam America and the United Farm Workers devised a strategy that ensures all stakeholders — retailers, growers and workers — to have an “equal seat at the table.”

    Some Canadian growers have become EFI-certified, primarily to meet demands of American retailers importing their produce. However, tariffs and the trade war between the U.S. and Canada could complicate the expansion of EFI in Canada.

    Replicating farm certification in Canada

    For farm certification to succeed in Canada, cross-movement collaboration is essential. The success of the Fair Food Program was driven by strong alliances between migrant rights and consumer movements. A similar coalition of food justice, migrant rights and consumer groups could pressure Canadian retailers to commit to ethical sourcing practices.

    EFI’s cross-sector collaboration model offers valuable lessons for Canada. Though it demands concessions, this approach fosters broad support from all stakeholders.

    For growers, it may help retain labour, particularly if sector-wide work permits are introduced that allow workers to change employers. As calls for self-reliance and food sovereignty grow in response to Trump’s tariffs, building a national food system that upholds workers’ rights will require collective efforts.

    Farm certification cannot replace essential policy reforms. Migrant workers need more secure legal status and greater labour rights, and non-compliant employers must face sanctions. However, certification can support education, empowerment and participation for workers, serving as an important complement to policy. If shaped and enforced by the workers it aims to protect, farm certification can be a meaningful tool for change.

    Erika Borrelli receives funding from the Mariam Assefa Fund and Canada Excellence Research Chair in Migration and Integration at Toronto Metropolitan University.

    ref. Farm certification could make Canada’s farms fairer for migrant workers – https://theconversation.com/farm-certification-could-make-canadas-farms-fairer-for-migrant-workers-249560

    MIL OSI – Global Reports

  • MIL-OSI United Kingdom: Government partners with young people to help develop new national youth strategy

    Source: United Kingdom – Executive Government & Departments

    Press release

    Government partners with young people to help develop new national youth strategy

    Young voices to be at the heart of policymaking as government breaks down barriers to opportunity through Plan for Change

    • Government launches national listening exercise to let young people have their say on support services, facilities and opportunities they need outside the school gates
    • Through youth engagement charity My Life My Say and the #iwill Movement young people will be able to engage with Government both in-person and online. 

    Young people across the country will be able to have their say on decisions that affect their lives as the Government launches one of the most ambitious listening exercises in a generation today.

    Ahead of the landmark National Youth Strategy, those aged 10-21 years old, and up to 25 years old for those with special educational needs and disabilities (SEND), will be asked to take part in a survey to hear what support services, facilities and opportunities they need outside the school gates to benefit their lives and futures.

    Young people will be able to submit their views on a range of topics including what issues matter to them in their local area, what services they think should be available to young people, and how money should be spent in their area – delivering on the government’s Plan for Change to spread opportunity across the country.

    Input will be collected by the Government in a range of ways including via an online survey, plus physical events including peer led focus groups known as ‘Democracy Cafes’, and workshop sessions so young people can offer views in their own words. The survey is now open here, and will close on 16 April. 

    This period of consultation will inform the Government’s new National Youth Strategy, previously announced by the Culture Secretary, designed to prioritise delivering better coordinated youth services and policy at a local, regional and national level. It will make sure decision-making moves away from a one-size-fits all approach, handing power back to young people and their communities, and rebuilding a thriving and sustainable sector. This will help deliver on the government’s missions, spreading opportunities, making our streets safer and taking pressure off health services.

    Culture Secretary, Lisa Nandy said: 

    We are handing power back to young people and their communities, giving them a genuine opportunity to help make the policies that affect their lives. 

    We want to hear from young people directly through one of the most ambitious listening exercises for a generation – Today’s Youth, Tomorrow’s Nation. 

    We are providing young people with a genuine voice, delivering on our Plan for Change and creating opportunities in every part of the country.

    Minister for Civil Society, Stephanie Peacock said:

    We are breaking down the barriers to opportunity that young people face and giving them the chance to have their say – on what they want from the Government and how public policies can work for them.

    I encourage all young people to fill in the survey and tell us what you think so you can help shape a brighter future for you and your generation.” 

    To ensure that young people’s voices are at the heart of the process throughout, the Government has appointed 13 young people to form a Youth Advisory Group (YAG). Members span multiple sectors and have experience across key areas including advocacy, violence prevention, social mobility and mental health. They include Jhemar Jones (member of London’s Violence Reduction Unit Young People’s Action Group), Yahye Abdi (Youth Development Coordinator with the Hope Collective) and Zafeera Akarim (Member of Youth Parliament).

    An Expert Advisory Group (EAG) will sit alongside the YAG to help guide the national conversation with young people, providing expertise and challenging thinking throughout the National Youth’s Strategy development. The group is made up of 14 experts from a variety of sectors including Isa Guha (sports presenter and founder of Cricket charity championing women and girls, Take Her Lead), Alex Holmes OBE (Deputy CEO at The Diana Award), and Paul Lindley OBE (founder of Ella’s Kitchen), among other highly experienced voices. 

    Young people will also be able to take part in ‘Hackathon’ events, collaborating with others alongside youth engagement experts and professional researchers to try and solve some of the most pressing issues they’re facing. Over the past few weeks, young people have been meeting at peer-led focus groups called ‘Democracy Cafés’ across the country, discussing the issues they want to see addressed.

    An expert consortium of partners will facilitate the widespread engagement with young people, comprising market research consultancy Savanta; key leader in youth-led engagement in the UK, My Life My Say (MLMS); and the #iwill Movement, a social movement supporting Youth Social Action with coordination from leading civil society and social action charity Volunteering Matters and UK Youth. They will be working with ten Youth Collaborators, young people recruited to ensure all activities are genuinely co-produced. 

    ENDS

    Additional quotes: 

    YAG member and Volunteer with Sea Cadet Corp Munachiso Thornton said:

    It is encouraging to see that outstanding individuals from a wide range of backgrounds have been recruited for the Youth Advisory Group, and we shall endeavour to authentically represent and amplify youth experiences. It is my earnest hope that the result of our input will contribute to a strategy that truly services young people of the UK.

    EAG member and Head of Artist Management at Off the Rells, Mickey Perkins said:

    Young people are the future of this country, and it’s crucial that they have a direct voice in shaping the policies that impact their lives. Through the Expert Advisory Group, we are ensuring that youth engagement goes beyond a mere tick-box exercise; it’s about fostering real conversations, creating real influence, and driving real change. The survey provides a platform for young people to express their views, helping bridge the gap between the government and the next generation. This will ensure that their ideas and experiences are no longer overlooked and can play a role in shaping the national agenda.

    Co-chair of #iWill Movement, Sami Gichki said:

    The National Youth Strategy isn’t something that has been decided, it is open – it will be shaped by young people so that it will be fit for purpose. It is hope; hope for creating a Britain where young people don’t just survive but thrive!

    Chair of Back Youth Alliance (BYA) & OnSide Chief Executive, Jamie Masraff said: 

    I am delighted that the Government is developing a new National Youth Strategy, something the BYA has been calling for over the last few years. This is a real opportunity to set out an overarching vision for young people that brings together priorities and recognises the importance of youth work and enrichment up and down the country.

    Associate Director of Policy at Centre for Mental Health, Kadra Abdinasir said: 

    The forthcoming youth strategy offers a crucial opportunity to enhance support for the nation’s children and young people.Hearing from young people is essential to ground the process in their views and experiences. I’m hopeful that the strategy will be a step toward creating a more confident and supported generation that feels heard, regardless of their background, and I’m pleased to be a member of the expert advisory group helping to shape its direction

    Bradley Riches autistic actor and author, Calls for Youth Voices to Shape the Future said:

    As a young person who has faced challenges growing up neurodivergent, I know how important it is to feel heard and understood. This initiative is an incredible opportunity for young people to have a say in shaping the support and services that will directly impact their futures. By listening to real experiences, the Government can make meaningful changes that empower young people from all backgrounds. I encourage everyone to get involved—your voice matters, and together, we can help shape a brighter, more inclusive future.

    Notes to editors: 

    Deliver You is the name of this national campaign across England, which will seek views directly from young people to inform the National Youth Strategy. The campaign, co-created with young people, is an ambitious and exciting opportunity for young people to share their views, experiences, and ideas- and to tell the Government what really matters to them.   – The Deliver You campaign is powered by DCMS, #iWill Movement, My Life My Say and Savanta – a partnership driven by a commitment to equipping and enabling young people to shape and lead change.

    Youth Advisory Group:

    • Yahye Abdi, Youth Development Coordinator, The Hope Collective
    • Zafeera Akarim, Member of Youth Parliament for Gloucester and Forest of Dean
    • Reuben Byfield, Youth Advisory Board member, NCS Trust
    • Jhemar Jones, youth worker and consultant
    • Charlotte Atherton, Girlguiding Advocacy Panel
    • Hilary Balogan, Girlguiding Advocacy Panel
    • Sophie Pender, founder, The 93% Club and Foundation
    • Serene Weibe, campaigner, boxing coach and mentor at Empire Fighting Chance
    • Dan Lawes, Co-CEO of My Life My Say and an #iwill ambassador
    • Sami Gichki, Co-Chair, #iwill Movement
    • Joe Seddon, Founder and CEO, Zero Gravity
    • Koby Davis, Youth Justice Case Manager, Leicestershire County Council
    • Lauren Roberts-Turner, researcher and campaigner
    • Munachiso Thornton, Volunteer with Sea Cadet Corp

    Expert Advisory Group:

    • Kadra Abdinasir, Associate Director of Policy at the Centre for Mental Health
    • Paul Lindley OBE, entrepreneur, campaigner and author
    • Professor Joht Singh Chandan, Clinical Professor of Public Health, University of Birmingham
    • Alex Holmes OBE, Deputy CEO, Diana Award
    • Alex Goat, CEO, Livity 
    • Jason Arthur, CEO, Mission 44
    • Mickey Perkins, Head of Artist Management, Off the Rells
    • Harris Bokhari OBE, Chair, National Citizen Service Trust
    • Jonathan Hopkins, public affairs consultant
    • Ciaran Thapar, Director of Public Affairs and Communications, Youth Endowment Fund
    • Jamie Masraff, CEO, OnSide
    • Leigh Middleton OBE, CEO, National Youth Agency
    • David Knott, CEO, The National Lottery Community Fund
    • Isa Guha, founder/chair of Take Her Lead and Presenter/Commentator for BBC and Fox

    Updates to this page

    Published 5 March 2025

    MIL OSI United Kingdom

  • MIL-OSI USA: Florida Dentist Sentenced for Threatening Public Figures and an Election Official

    Source: US State of Vermont

    A Florida dentist was sentenced yesterday to two years in prison for threatening public figures, an election official, and others between 2019 and 2024.

    According to court documents, from September 2019 to July 2020, Richard Glenn Kantwill, 61, of Tampa, sent over 100 threats via Facebook and Instagram messages, email, and text to various public figures based on their political commentary. As charged in the superseding information, those communications included threats to an author, a religious figure, and a television personality. Kantwill also sent at least seven additional threats to four public figures via Facebook from April 2022 to April 2024, including a threat to an election official in another state in February 2024.

    Kantwill pleaded guilty in November 2024 to four counts of interstate transmission of a threat.

    Supervisory Official Antoinette T. Bacon of the Justice Department’s Criminal Division, Acting U.S. Attorney Sara C. Sweeney for the Middle District of Florida, and Special Agent in Charge Matthew Fodor of the FBI Tampa Field Office made the announcement.

    The FBI investigated the case.

    Trial Attorney Aaron L. Jennen of the Criminal Division’s Public Integrity Section and Assistant U.S. Attorney Abigail K. King for the Middle District of Florida prosecuted the case, with assistance from the U.S. Attorney’s Office for the District of Colorado.

    MIL OSI USA News

  • MIL-OSI Security: St. John’s — RCMP NL arrests five drivers for recent impaired operation offences

    Source: Royal Canadian Mounted Police

    RCMP NL recently arrested five drivers, three on March 1, 2025 and two others on March 2, 2025, in various areas of the province for impaired driving offences.

    At approximately 4:45 a.m. on March 1, Burin Peninsula RCMP conducted a traffic stop with a vehicle that was parked on the Creston Causeway in Marystown. The driver, a 28-year-old man, showed signs of alcohol impairment and was arrested for impaired operation. Back at the detachment, the man provided further breath samples that were nearly twice the legal limit.

    Later in that morning, at approximately 7:15 a.m., Happy Valley-Goose Bay RCMP received a report of a vehicle off the road in a residential area of the town. Police attended the scene and checked on the driver, a 44-year-old, man who was seated in the driver’s seat of the idling vehicle. The man showed signs of alcohol impairment and failed a roadside breath test. He was arrested for impaired operation and, back at the detachment, provided breath samples that were above the legal limit.

    Later that afternoon, at approximately 1:45 p.m., Grand Falls-Windsor RCMP were called to a residential disturbance in Buchans. While officers were responding, information received stated that one of the individuals involved in the disturbance departed the residence in a vehicle while impaired. Officers located the 45-year-old man a short time later at another residence. He showed signs of impairment and was arrested. At the detachment, the man provided breath samples that were more than twice the legal limit.

    At approximately 3:00 p.m. on March 2, Harbour Grace RCMP stopped a vehicle traveling in front of the detachment after the driver passed a vehicle on a solid line. The driver, a 74-year-old man, showed signs of alcohol impairment and had open alcohol in the vehicle. Police administered a roadside breath test and the driver failed to provide a breath sample. He was arrested for refusal of a breath demand.

    Later that same evening, at approximately 8:45 p.m., Gander RCMP received a report of a suspected impaired driver on the Trans-Canada Highway, west of Gander. The vehicle was reportedly stopped on the highway without any headlights or tail lights activated. Police located the vehicle and conducted a traffic stop. The driver, a 65-year-old man, showed signs of impairment consistent with alcohol and drugs. He was arrested, was provided a demand for a blood sample and was transported to James Paton Memorial Regional Health Centre in Gander. Officers await the results of the testing to determine if charges of impaired operation are appropriate.

    Each driver was released from custody with a future court date to face charges, a licence suspension and a vehicle impound and seizure, where appropriate.

    Impaired drivers place themselves and all others who share the roadway at increased risk of serious injury or death. RCMP NL is dedicated to keeping roadways safe and free from those who choose to drive while impaired. If you suspect a driver is operating a vehicle while impaired, please immediately contact your local police to make a report.

    MIL Security OSI

  • MIL-OSI Security: Two Venezuelan Gang Members Arrested, Charged with Bank Theft and Conspiracy

    Source: Federal Bureau of Investigation (FBI) State Crime News

    BUFFALO, N.Y. –U.S. Attorney Michael DiGiacomo announced today that David Jose Gomez Cegarra, 24, and Jesus Segundo Hernandez-Gil, 19, both of Venezuela, were arrested and charged by criminal complaint with bank theft and conspiracy to commit bank theft. The charges carry a maximum penalty of ten years in prison.

    Assistant U.S. Attorneys Jeffrey E. Intravatola and Douglas A.C. Penrose, who are handling the case, stated that the defendants are members of the Tren de Aragua Gang, which has been designated by the White House as a Global Terrorist Organization. They are accused of participating in an ATM Jackpotting scheme. ATM Jackpotting involves removing an ATM’s cover and infecting the ATMs hard drive with malware or removing the hard drive and replacing it with an infected hard drive, which allows the operator to assume control of the ATM and cause it to dispense currency.

    According to the complaint, Gomez-Cegarra, Hernandez-Gil, and other co-conspirators successfully completed an ATM Jackpotting scheme at a Radius Federal Credit Union in Kenmore, NY, on October 5, 2024. Video surveillance shows that at approximately 4:05 p.m., a vehicle, driven by Gomez-Cegarra,  approached the drive-up ATM, a co-conspirator exited the vehicle and opened the ATM utilizing a key, appeared to install something in the ATM, pressed buttons, and closed the ATM. The vehicle then left the area. Over the next several hours, the vehicle re-appeared multiple times at the ATM and conducted illegal withdrawals. Radius Federal Credit Union reported that $110,440.00 was stolen from the ATM during this ATM Jackpotting event.

    Gomez-Cegarra, Hernandez-Gil, and other co-conspirators are also believed to be responsible for ATM Jackpotting events St. Maly’s Federal Credit Union in Framingham, Massachusetts, on October 6, 2024, at First National Bank of Dryden in Dryden, NY, on October 17, 2024, and at two Community First Bank locations in Mount Vernon, Illinois, on November 11, 2024. During these events, approximately $187,000 was reported stolen.

    On November 11, 2024, the Mahomet, Illinois Police Department stopped Gomez-Cegarra and Hernandez-Gil in a vehicle together for suspicious activity. Both men presented Venezuelan identifications. They were arrested by the Mahomet Police Department, and ultimately charged by the Mount Vernon Police Department in relation to the incidents that occurred at the Community First Bank locations in Mount Vernon, IL.

    The complaint is the result of an investigation by the Federal Bureau of Investigation, under the direction of Special Agent-in-Charge Matthew Miraglia, the Kenmore Police Department, under the direction of Chief Thomas Phillips, the Homer, NY, Police Department, under the direction of Chief Robert Pitman, the Framingham, MA, Police Department, under the direction of Chief Lester Baker, and the Mahomet, Illinois, Police Department.

    The fact that a defendant has been charged with a crime is merely an accusation and the defendant is presumed innocent until and unless proven guilty.

    # # # # 

     

    MIL Security OSI

  • MIL-OSI Security: Chinese student convicted of drugging and raping 10 women

    Source: United Kingdom London Metropolitan Police

    Met detectives appeal for victim-survivors to come forward after serial rapist convicted

    A serial rapist – who drugged and raped a number of women both in the UK and China – has been convicted, following one of the most complex investigations carried out by detectives in the Met.

    Zhenhao Zou, 28 (20.02.97), of Churchyard Row, Elephant and Castle, was today (Wednesday, 5 March) found guilty of a total of 28 offences, including 11 counts of rape against 10 different women.

    A jury found Zou guilty after a five-and-a-half-week trial at Inner London Crown Court. He will be sentenced at the same court on Thursday, 19 June.

    Following the conclusion of today’s court proceedings, detectives can now share they believe the scale of Zou’s offending may be much wider and are making a direct appeal for any victim-survivors who have not yet been identified to come forward and seek specialist support.

    While detectives have identified two victim-survivors, eight of the women who Zou was convicted of raping remain unidentified. Beyond this, detectives believe there may be more than 50 other women who may have been a victim and have not yet been identified by police.

    The investigation

    Zou is originally from Dongguan in the Guangdong Province of China and is believed to have lived in the UK since 2017.

    Before his arrest in January 2024, Zou was a student at University College London (UCL) since 2019 and prior to that studied at Queen’s University Belfast.

    Zou met women using online platforms and dating apps, inviting them to his home under the guise of studying or to have drinks. Officers have established that he invited women back to his address – one in central London and another in Elephant and Castle.

    Once inside he would offer them a drink which contained a substance – believed to be butanediol, which converts to GHB once in the human body.

    This would leave the victim-survivors drifting in and out of consciousness. While unconscious, he filmed himself as he raped and sexually assaulted them.

    Zou also kept items from victim-survivors, such as jewellery and clothing.

    After a woman came forward to report Zou, police searched his home and found the drugs butanediol and ketamine, as well as a number of hidden cameras. They also seized a number of laptops and mobile phones, which later uncovered the true scale of Zou’s offending.

    Officers downloaded the digital devices amounting to six and a half trillion bytes of data, which included around nine million WeChat messages.

    Met investigators spent months trawling through messages to understand Zou’s pattern of offending, painstakingly translating them into English from Simplified Chinese.

    They also watched hundreds of videos stored on his devices, which appear to show Zou filming himself raping and sexually assaulting women. It was after analysis of this graphic and disturbing material that it became apparent that he had not only committed offences in London, but also in his home country of China too.

    During the trial, officers were assisted by the Chinese Ministry of Public Security, who helped to facilitate one of the brave victim-survivors giving evidence against Zou.

    As part of the investigation, the Met has also been supported by the Crown Prosecution Service, National Crime Agency and Foreign, Commonwealth and Development Office.

    The appeal

    To protect the integrity of ongoing legal proceedings after Zou was first charged with offences, detectives have not been able to publicly appeal for further potential victim-survivors until this time.

    The Metropolitan Police is now asking anyone who thinks they may have been a victim to come forward and speak with police.

    Specialist officers work closely with victim-survivors to seek justice and are available to offer support and signpost to external partners, so they can get help.

    Officers are keeping an open mind about the identities of unidentified victim-survivors, but are particularly keen to hear from women from the Chinese student community who may have met Zou and were living in and around London between 2019-2024. They also would like to speak to potential victims-survivors who may have met Zou while he was living in China.

    Women may have met Zou via online platforms, including student forums on the Chinese social media apps WeChat or Little Red Book, or may have spoken to him on dating apps, such as Bumble.

    Victim-survivors may have visited Zou at his accommodation in Woburn Place in central London or his address in Churchyard Row in Elephant and Castle in London. Others may have met Zou when he was living in China.

    Due to the nature of Zou’s offending, detectives believe that some women may not know they have been a victim-survivor and do not underestimate how distressing and difficult it may be to read or hear about his crimes following this verdict. They are reassuring potential victim-survivors that any reports will be fully investigated and dealt with the utmost sensitivity, care and compassion.

    Officers also understand that not every victim-survivor may wish to speak with the police to get support. Therefore, the charity Rape Crisis is also offering support for women to seek help and guidance from advisors who are independent to the police.

    As part of their appeal, detectives are also keen to speak to any witnesses who might have helpful information, in particular anyone who might have met Zou at parties or spoke to him on social media apps and has any concerns.

    Commander Kevin Southworth, lead for public protection at the Metropolitan Police, said: “Zhenhao Zou is a dangerous and prolific sexual predator, who manipulated and drugged women in order to prey on them in the most cowardly way.

    “I’d like to acknowledge the two women who bravely gave evidence against Zou in court – their courage and resilience has been unwavering.

    “We are determined to support all victim-survivors and are now asking women who believe they may have concerns about Zou to please come forward. I want to reassure anyone impacted that you are not alone and can seek specialist support and guidance, not only from the police, but also from independent charities and services.

    “I would also like to take this opportunity to thank the investigation team, who have shown professionalism, compassion and determination in their pursuit for justice.”

    The Met recognises the impact that this horrific case will have on Londoners, in particular Chinese students who may have lived in and around Southwark and Lambeth. Officers continue to liaise with partners to ensure anyone with concerns can access advice and specialist support from local police teams.

    How to contact the police and independent support agencies:

    Reports relating to Zhenhao Zou can be made online via the Major Incident Public Portal (MIPP): https://mipp.police.uk/operation/01MPS25X38-PO1. The MIPP is also available in Simplified Chinese (https://mipp.police.uk/operation/01MPS25X38-PO2 ), so it is as accessible as possible for potential victims and survivors.

    If you wish to speak to Met detectives or make a report relating to Zou, you can also contact police via email on survivors@met.police.uk

    You can also make a report to police by calling 101 from within the UK, quoting reference 2904/04FEB25.

    If you live in England or Wales and have been affected by this case and would like to seek support from specialist agencies, please contact the independent charity Rape Crisis via their 24/7 Rape and Sexual Abuse Support Line or call them on 0808 500 2222. Specially trained staff are there to listen, answer questions and offer emotional support.

    Background

    • Please consult ‘Document 1’ for a full breakdown of offences, including information relating to locations of offences
    • Please consult ‘Document 2’ for a timeline of offences

    Tackling Violence against Women and Girls

    • In 2023, the Met launched its new Violence against Women and Girls (VAWG) Action Plan, working with women and girls across London to shape a new approach to keep them safe.
    • The Met has transformed the way it investigates rape and serious sexual offences. Under Operation Soteria, the Met is doing more to put victim-survivors at the heart of its response to these crimes.
    • As part of its commitment to tackling violence against women and girls, caused largely at the hands of predatory men, officers are placing more focus on suspects and offering support to those impacted alongside specialist partners.
    • Since 2021, the Met has more than doubled its charge rate for rape.

    MIL Security OSI

  • MIL-OSI Security: Florida Dentist Sentenced for Threatening Public Figures and an Election Official

    Source: United States Attorneys General 1

    A Florida dentist was sentenced yesterday to two years in prison for threatening public figures, an election official, and others between 2019 and 2024.

    According to court documents, from September 2019 to July 2020, Richard Glenn Kantwill, 61, of Tampa, sent over 100 threats via Facebook and Instagram messages, email, and text to various public figures based on their political commentary. As charged in the superseding information, those communications included threats to an author, a religious figure, and a television personality. Kantwill also sent at least seven additional threats to four public figures via Facebook from April 2022 to April 2024, including a threat to an election official in another state in February 2024.

    Kantwill pleaded guilty in November 2024 to four counts of interstate transmission of a threat.

    Supervisory Official Antoinette T. Bacon of the Justice Department’s Criminal Division, Acting U.S. Attorney Sara C. Sweeney for the Middle District of Florida, and Special Agent in Charge Matthew Fodor of the FBI Tampa Field Office made the announcement.

    The FBI investigated the case.

    Trial Attorney Aaron L. Jennen of the Criminal Division’s Public Integrity Section and Assistant U.S. Attorney Abigail K. King for the Middle District of Florida prosecuted the case, with assistance from the U.S. Attorney’s Office for the District of Colorado.

    MIL Security OSI

  • MIL-OSI Security: Detectives name teenager shot in Stockwell with continued appeal for witnesses

    Source: United Kingdom London Metropolitan Police

    Detectives investigating the murder of a boy shot in Stockwell have named him, while they continue appeals for witnesses and information.

    Lathaniel Burrell from Stockwell sadly died at the scene following yesterday’s shooting. He was 16-years-old.

    Officers are now asking for the public’s help to track down those responsible.

    Police were alerted at 15:21hrs on Tuesday, 4 March to reports of a shooting at Paradise Road, SW4, and attended with emergency services colleagues.

    London’s Air Ambulance and London Ambulance Service treated Lathaniel at the scene but despite their best efforts, he died. His family are being supported by specialist officers.

    The investigation is being led by a homicide team.

    Detective Chief Inspector Sarah Lee said: “This is a horrendous crime, which has shocked the local community and beyond. Our thoughts are with Lathaniel’s family and friends at this devastating time.

    “Our investigation is continuing at pace, examining CCTV and collecting witness statements.

    “We have deployed officers to the area on reassurance patrol, and have officers on the ground engaging with the local schools.

    “We need the help of the public too – if you were in the local area please think remember back to yesterday afternoon and come forward with any information, no matter how small.

    “We are particularly keen to speak to anyone who has any mobile phone or dash cam footage from the area surrounding Paradise Road.”

    No arrests have been made at this stage, and detectives are keeping an open mind about the possible motive for the attack.

    If you were a witness or have any information, please call police on 101 with the reference 4116/4MAR.

    You can also contact the independent charity Crimestoppers on 0800 555 if you want to remain anonymous.

    MIL Security OSI

  • MIL-OSI United Kingdom: Sniffer dogs help to seize illegal vapes and cigarettes

    Source: City of Coventry

    Sniffer dogs, have been helping Coventry Police and Council Trading Standards Officers to hunt down thousands of illegal vapes and cigarettes, during city raids.

    The Council and Police’s local neighbourhood teams have joined forces with four-legged working cocker spaniels Sky and Louis – both are trained to sniff out hidden compartments of tobacco, vapes and money.

    The tobacco detection dogs have been offering a helping paw as part of a crackdown at shops across Coventry.

    The dogs helped sniff out illicit goods at five city centre premises and even indicated that there was tobacco behind false walls, inside furniture and inside vehicles, which officers eventually accessed to find the goods inside.

    At one location a substantial amount of N2O, better known as Nox or Noz, was also seized and will now be investigated by the Police.

    Each incident where illicit goods were recovered will be now investigated.  

    Councillor Abdul Salam Khan, Cabinet member for Police and Deputy Leader at Coventry City Council, said:

    “Our Trading Standards team go above and beyond in their pursuit of illegal vapes and cigarettes, as is shown with this very successful operation.

    “Hiring Sky and Louis, who did an excellent job, was a fantastic way of protecting the health of our residents and keeping local children safe from underage sales.

    “With the ongoing help of partners, West Midlands Police we are very effective in dealing with this problem.

    “Anyone who knows of retailers selling illegal goods, or selling age restricted goods to children, can tell our Trading Standards team about it via our online reporting form found by searching ‘Coventry Trading Standards’.”

    Published: Wednesday, 5th March 2025

    MIL OSI United Kingdom