Category: KB

  • MIL-OSI USA: SPC MD 1453

    Source: US National Oceanic and Atmospheric Administration

    Mesoscale Discussion 1453

    Mesoscale Discussion 1453
    NWS Storm Prediction Center Norman OK
    1148 AM CDT Thu Jun 26 2025

    Areas affected…southern Appalachians into northern Georgia

    Concerning…Severe potential…Watch possible

    Valid 261648Z – 261845Z

    Probability of Watch Issuance…40 percent

    SUMMARY…Scattered thunderstorms capable of damaging wind and some
    instances of severe hail possible this afternoon.

    DISCUSSION…Thunderstorm activity is ongoing this morning across
    portions of eastern Tennessee and western South Carolina, with
    occasional severe pulses. Temperatures have warmed into the mid 80s
    to 90s across the Carolinas into Georgia and eastern Tennessee, with
    dew points in the upper 60s to 70s. Continued heating under sunny
    skies (outside of the areas with convection) should yield further
    destabilization and MLCAPE around 2000-3000 J/kg by the afternoon.
    Morning 12z sounding analysis indicates cool mid-levels, with modest
    mid-level lapse rates. Though flow aloft is weak, moderate
    instability and steepening low-level lapse with heating will allow
    for potential for wet downbursts and damaging outflow winds. A few
    isolated instances of severe hail will also be possible, owing to
    steep lapse rates. This area will be monitored for watch potential
    through the afternoon.

    ..Thornton/Hart.. 06/26/2025

    …Please see www.spc.noaa.gov for graphic product…

    ATTN…WFO…AKQ…LWX…RAH…RNK…RLX…GSP…MRX…FFC…
    BMX…

    LAT…LON 33658324 33348429 33308482 33518519 33818538 34228526
    34838478 36218303 36878212 37368145 37758054 38077982
    38177941 38177877 38017842 37827816 37577801 37377792
    37037815 36757885 36417954 36178008 36028034 35498090
    34778186 34208257 33658324

    MOST PROBABLE PEAK WIND GUST…55-70 MPH
    MOST PROBABLE PEAK HAIL SIZE…UP TO 1.25 IN

    Top/All Mesoscale Discussions/Forecast Products/Home

    MIL OSI USA News

  • MIL-OSI USA: SPC MD 1454

    Source: US National Oceanic and Atmospheric Administration

    Mesoscale Discussion 1454

    Mesoscale Discussion 1454
    NWS Storm Prediction Center Norman OK
    1236 PM CDT Thu Jun 26 2025

    Areas affected…Extreme southeast NE/northeast KS into northwest MO
    and southwest into central/northeast IA

    Concerning…Severe potential…Watch likely

    Valid 261736Z – 261930Z

    Probability of Watch Issuance…80 percent

    SUMMARY…The threat for damaging wind and possibly a tornado will
    increase with time this afternoon.

    DISCUSSION…A cold front is moving east across parts of eastern NE
    and northeast KS this afternoon, as a surface low moves from
    southeast SD into southern MN. While cloudiness has limited heating
    to some extent, rich low-level moisture is supporting MLCAPE of
    2000-3000 J/kg along/ahead of the front. Storms are already
    developing near a differential heating zone across central IA, with
    other development possible later this afternoon in closer proximity
    to the front.

    Both low-level and deep-layer shear increase with northward extent
    across the MCD area. Some threat for supercells with a threat for
    locally damaging wind and a tornado may develop into parts of
    central/northeast IA (see MCD 1452 for more information). Farther
    south, despite weaker shear, a broken line of storms with a threat
    of damaging wind may eventually develop along/ahead of the front
    from extreme southeast NE/northeast KS into southwest/south-central
    IA and northwest MO. Watch issuance is likely in order to address
    these threats.

    ..Dean/Hart.. 06/26/2025

    …Please see www.spc.noaa.gov for graphic product…

    ATTN…WFO…DVN…ARX…DMX…EAX…OAX…TOP…

    LAT…LON 41129582 42199475 42789269 42849192 42779176 42189177
    41519249 41139284 40719325 40239384 39859460 39909560
    40439599 41129582

    MOST PROBABLE PEAK TORNADO INTENSITY…85-115 MPH
    MOST PROBABLE PEAK WIND GUST…55-70 MPH

    Top/All Mesoscale Discussions/Forecast Products/Home

    MIL OSI USA News

  • MIL-OSI USA: SPC Tornado Watch 463 Status Reports

    Source: US National Oceanic and Atmospheric Administration

    Search by city or zip code. Press enter or select the go button to submit request
    Local forecast by”City, St” or “ZIP” 

    SPC on Facebook

    @NWSSPC

    NCEP Quarterly Newsletter

    Home (Classic)SPC Products   All SPC Forecasts   Current Watches   Meso. Discussions   Conv. Outlooks   Tstm. Outlooks   Fire Wx Outlooks     RSS Feeds   E-Mail AlertsWeather Information   Storm Reports   Storm Reports Dev.   NWS Hazards Map   National RADAR   Product Archive   NOAA Weather RadioResearch   Non-op. Products   Forecast Tools   Svr. Tstm. Events   SPC Publications   SPC-NSSL HWTEducation & Outreach   About the SPC   SPC FAQ   About Tornadoes   About Derechos   Video Lecture Series   WCM Page   Enh. Fujita Page   Our History   Public ToursMisc.   StaffContact Us   SPC Feedback

    Watch 463 Status Reports

    Watch 463 Status Message has not been issued yet.

    Top/Watch Issuance Text for Watch 463/All Current Watches/Forecast Products/Home

    Weather Topics:Watches, Mesoscale Discussions, Outlooks, Fire Weather, All Products, Contact Us

    NOAA / National Weather ServiceNational Centers for Environmental PredictionStorm Prediction Center120 David L. Boren Blvd.Norman, OK 73072 U.S.A.spc.feedback@noaa.govPage last modified: June 26, 2025
    DisclaimerInformation QualityHelpGlossary
    Privacy PolicyFreedom of Information Act (FOIA)About UsCareer Opportunities

    MIL OSI USA News

  • MIL-OSI USA: SPC Tornado Watch 463

    Source: US National Oceanic and Atmospheric Administration

    Note:  The expiration time in the watch graphic is amended if the watch is replaced, cancelled or extended.Note: Click for Watch Status Reports.
    SEL3

    URGENT – IMMEDIATE BROADCAST REQUESTED
    Tornado Watch Number 463
    NWS Storm Prediction Center Norman OK
    1255 PM CDT Thu Jun 26 2025

    The NWS Storm Prediction Center has issued a

    * Tornado Watch for portions of
    Northeast Iowa
    Southeast Minnesota
    Southwest Wisconsin

    * Effective this Thursday afternoon and evening from 1255 PM
    until 800 PM CDT.

    * Primary threats include…
    A few tornadoes possible
    Scattered damaging wind gusts to 70 mph likely

    SUMMARY…An emerging cluster of thunderstorms ahead of a surface
    low and along a warm front will pose some risk of tornadoes and
    damaging wind gusts through the afternoon.

    The tornado watch area is approximately along and 55 statute miles
    north and south of a line from 50 miles north northwest of Mason
    City IA to 10 miles southeast of Camp Douglas WI. For a complete
    depiction of the watch see the associated watch outline update
    (WOUS64 KWNS WOU3).

    PRECAUTIONARY/PREPAREDNESS ACTIONS…

    REMEMBER…A Tornado Watch means conditions are favorable for
    tornadoes and severe thunderstorms in and close to the watch
    area. Persons in these areas should be on the lookout for
    threatening weather conditions and listen for later statements
    and possible warnings.

    &&

    AVIATION…Tornadoes and a few severe thunderstorms with hail
    surface and aloft to 1 inch. Extreme turbulence and surface wind
    gusts to 60 knots. A few cumulonimbi with maximum tops to 500. Mean
    storm motion vector 27030.

    …Hart

    Note: The Aviation Watch (SAW) product is an approximation to the watch area. The actual watch is depicted by the shaded areas.
    SAW3
    WW 463 TORNADO IA MN WI 261755Z – 270100Z
    AXIS..55 STATUTE MILES NORTH AND SOUTH OF LINE..
    50NNW MCW/MASON CITY IA/ – 10SE VOK/CAMP DOUGLAS WI/
    ..AVIATION COORDS.. 50NM N/S /47NNW MCW – 23NW DLL/
    HAIL SURFACE AND ALOFT..1 INCH. WIND GUSTS..60 KNOTS.
    MAX TOPS TO 500. MEAN STORM MOTION VECTOR 27030.

    LAT…LON 44619371 44629013 43039013 43029371

    THIS IS AN APPROXIMATION TO THE WATCH AREA. FOR A
    COMPLETE DEPICTION OF THE WATCH SEE WOUS64 KWNS
    FOR WOU3.

    Watch 463 Status Report Message has not been issued yet.

    Note:  Click for Complete Product Text.Tornadoes

    Probability of 2 or more tornadoes

    Mod (50%)

    Probability of 1 or more strong (EF2-EF5) tornadoes

    Low (20%)

    Wind

    Probability of 10 or more severe wind events

    Mod (60%)

    Probability of 1 or more wind events > 65 knots

    Low (20%)

    Hail

    Probability of 10 or more severe hail events

    Low ( 2 inches

    Low (

    MIL OSI USA News

  • MIL-OSI USA: Secretary of Defense General Officer Announcements for June 26, 2025

    Source: United States Department of Defense

    Defense Secretary Pete Hegseth announced that President Donald J. Trump has nominated Army Lt. Gen. Thomas M. Carden, Jr. for appointment to the grade of general, with assignment as vice chief of the National Guard Bureau, and Army Maj. Gen. Bobby L. Christine for appointment as judge advocate general.

    MIL OSI USA News

  • MIL-OSI USA: Remarks at the Executive Compensation Roundtable

    Source: Securities and Exchange Commission

    Good afternoon. Welcome to all of you attending in person or watching and listening online to today’s roundtable on executive compensation. I thank the very distinguished group of moderators and panelists who have assembled here today for volunteering their time to contribute their thoughts on this important topic.

    As one of the enumerated disclosure items in Schedule A to the Securities Act of 1933,[1] the requirement to provide executive compensation information is as old as the federal securities laws themselves. Over the past ninety years, the Commission has adopted numerous rules requiring more and more information about executive compensation. Some of these rules have come about from Congressional mandates, while others have not. I have been at the SEC in one role or another for a couple of these changes, including the 1992 rulemaking initiated by Chairman Richard Breeden that created the “summary compensation table”[2] and the 2006 rulemaking that introduced “compensation discussion and analysis” and added other compensation tables.[3]

    Today, one might describe the Commission’s current disclosure requirements as a Frankenstein patchwork of rules. The volume and complexity of these rules may be just as scary to a law firm associate performing a “form check” of a proxy statement, as the monster was to Dr. Frankenstein himself when the monster opened its eyes. 

    The Commission amended Item 402 of Regulation S-K in 1992 to state specifically that “This Item [402] requires clear, concise and understandable disclosure of…compensation…”[4] However, one could say that this well-intentioned, three-decade-old statement has become facetious with the passage of time in light of the lengthy narrative disclosure and numerous tables and charts that appear in today’s proxy statements.

    Our rules must be grounded in achieving the Commission’s three-part mission: investor protection, fair, orderly and efficient markets, and capital formation. These rules should be cost-effective for companies to comply with and provide material information to investors in plain English. Most importantly, the information required to be disclosed should be material to the company and understandable to the Supreme Court’s objective reasonable investor.[5]  The outcome of our rules is not effective when companies require highly specialized lawyers and compensation consultants to prepare disclosure that the reasonable investor struggles to understand.

    Today’s roundtable is one of the first steps in considering whether the current executive compensation disclosure requirements achieve these objectives, and if not, how the rules should be amended. In connection with this process, I previously asked the Commission staff to consider several questions in this area and for the public to provide their views on those questions.[6] Thank you to those who have already submitted comment letters. For others who intend to submit a letter, please do so as soon as possible over the next several weeks, to provide the staff time to consider and incorporate your views into any potential rulemaking proposal.

    Thank you to the staff of the Division of Corporation Finance, the Office of Support Operations, the Office of Information Technology, and the Office of Public Affairs for organizing this roundtable. I very much look forward to this afternoon’s discussion.

     


    [1] Item (14) of Schedule A to the Securities Act of 1933.

    [4] 1992 Release. See also 17 CFR 229.402(a)(2).

    [5] See TSC Industries, Inc. v. Northway, Inc., 426 U.S. 438, 445 (1976) (“The question of materiality, it is universally agreed, is an objective one, involving the significance of an omitted or misrepresented fact to a reasonable investor.”).

    MIL OSI USA News

  • MIL-OSI USA: RIDOH and DEM Lift Advisory at Worden Pond and Recommend Avoiding Contact with Wilson Reservoir

    Source: US State of Rhode Island

    The Rhode Island Department of Health (RIDOH) and Rhode Island Department of Environmental Management (DEM) have lifted the advisory recommendation for recreational activities at Worden Pond in South Kingstown. The harmful algae bloom (HAB) caused by blue-green algae (cyanobacteria) has cleared. Recent testing shows algae levels are low and no toxins were detected, meeting safety guidelines.

    RIDOH and DEM are also advising people to avoid contact with Wilson Reservoir in Burrillville due to harmful algae blooms (HABs). HABs are caused by blue-green algae, also known as cyanobacteria, which are naturally present in bodies of water. HABs can produce toxins which can be harmful to humans and animals. Toxins and/or high cell counts have been detected by the RIDOH State Health Laboratory from water samples collected by DEM at this location.

    Use caution in all areas of Wilson Reservoir as HABs can move locations in ponds and lakes. All recreation, including swimming, fishing, boating and kayaking, is high risk to health and recommended to be avoided at this location. People should not drink untreated water or eat fish from affected waterbodies. Pet owners should not allow pets to drink or swim in this water. This advisory recommendation remains in effect until further notice.

    Skin contact with water containing blue-green algae can cause irritation of the skin, nose, eyes, and throat. Symptoms can include stomachache, diarrhea, vomiting, and nausea. Less common symptoms can include dizziness, headache, fever, liver damage, and nervous system damage. Young children and pets are at higher risk for health effects associated with HABs because they are more likely to swallow water when they are in or around bodies of water. People who have had contact with these ponds and experience those symptoms should contact their healthcare provider.

    To report suspected blue-green algae blooms, contact DEM’s Office of Water Resources at 401-222-4700 Press 6 or DEM.OWRCyano@dem.ri.gov and if possible, send a photograph of the reported algae bloom. For more information and the Cyanobacteria Tracker Dashboard that lists current advisories and data, visit: www.dem.ri.gov/bluegreen

    MIL OSI USA News

  • MIL-OSI Security: Topeka man indicted for alleged assault on Tribal land

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    TOPEKA, KAN. – A federal grand jury in Topeka returned an indictment charging a Kansas man with committing an assault on Tribal land.

    According to court documents, Wesley Reel Bennett, 23, of Topeka was indicted on one count of assaults within maritime and territorial jurisdiction. 

    In June 2025, Bennett is accused of assaulting and seriously injuring a member of the Prairie Band Potawatomi Nation within the confines of its Tribal territory. 

    The Federal Bureau of Investigation (FBI) and the Prairie Band Potawatomi Tribal Police Department are investigating the case. 

    Assistant U.S. Attorney Stephen Hunting is prosecuting the case.

    OTHER INDICTMENTS

    Hector Alvarado, 55, of Topeka was indicted on one count of possession of a firearm by a prohibited person. The Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) is investigating the case. Assistant U.S. Attorney Stephen Hunting is prosecuting the case. 

    Kenneth Norman Baker, 41, of Baxter Springs was indicted on one count of receipt of child pornography, one count of distribution of child pornography, and one count of possession of child pornography. The Federal Bureau of Investigation (FBI) is investigating the case. Assistant U.S. Attorney Jason Hart is prosecuting the case.

    An indictment is merely an allegation, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.
    ###

     

    MIL Security OSI

  • MIL-OSI Security: Arizona to Evansville Fentanyl Trafficking Operation Dismantled, Landing Two in Federal Prison

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    EVANSVILLE— Two men have been sentenced to a combined 16 years in federal prison for their roles in a drug trafficking operation responsible for pumping thousands of counterfeit fentanyl pills from Arizona into Evansville.

    Deriontai Mathis, 31, of Evansville, has been sentenced to 11 years in federal prison followed by five years of supervised release after pleading guilty to possession with intent to distribute fentanyl, two counts of possession of a firearm by a convicted felon and conspiracy to distribute fentanyl.

    Ernest Gilbert, 38, of Arizona, was sentenced in July of 2024 to five years in federal prison followed by three years of supervised release after pleading guilty to distribution of fentanyl and conspiracy to possess with intent to distribute 400 grams or more of fentanyl.

    According to court documents, between September and November of 2022, Mathis and Gilbert conspired together to buy and sell thousands of fentanyl-laced counterfeit oxycodone pills. Gilbert, who resided in Arizona, would obtain the pills, ship or otherwise transport them to Indiana, and then fly to Indiana and drive the pills to Mathis in Evansville.

    On November 10, 2022, during a search of Mathis’s residence, investigators recovered nine plastic bags containing ten thousand counterfeit M-30 fentanyl pills hidden inside of a child’s toy car, a camouflaged backpack that contained $56,800.00 in cash, a body armor vest and nine firearms. During a search of another residence Mathis used to store his contraband, officers recovered three additional handguns and a 12-gauge shotgun.

    In 2015, Mathis was convicted for being a drug abuser in possession of a firearm, thereby prohibiting from ever legally possessing a firearm again.

    This investigation also led to the discovery that Jeremial Leach was a customer of Mathis, purchasing counterfeit fentanyl pills for $10 per pill. In May of 2024, Leach was sentenced to 20 years in federal prison for dealing fentanyl resulting in at least three overdoses and a teen’s death. See: https://www.justice.gov/usao-sdin/pr/evansville-snapchat-fentanyl-dealer-responsible-least-three-overdoses-and-teens-death

    “The sentences imposed here should serve as a warning: these poisons kill—and selling them will earn you decades in federal prison,” said John E. Childress, Acting United States Attorney for the Southern District of Indiana. “Our office remains committed to working hand in hand with our state, local and federal partners in order to keep our communities safe, hold drug traffickers accountable, and stop the flow of deadly substances into our neighborhoods.”

    The Drug Enforcement Administration, Bureau of Alcohol, Tobacco, Firearms and Explosives, Evansville-Vanderburgh County Drug Task Force and Evansville Police Department investigated this case. The sentences were imposed by U.S. District Judge Richard L. Young.

    Acting U.S. Attorney Childress thanked Assistant U.S. Attorney Lauren Wheatley, who prosecuted this case.

    ###

    MIL Security OSI

  • MIL-OSI: BTC Miner Launches: How to Easily Earn in the Cryptocurrency Era

    Source: GlobeNewswire (MIL-OSI)

    London, UK, June 26, 2025 (GLOBE NEWSWIRE) — The crypto market is expanding rapidly, and investors globally are searching for ways to mine digital currency that is more straightforward and affordable. BTC Miner is the next-generation platform that will change the way the world mines cryptocurrencies, and will respond to this need in the market by streamlining the crypto mining process and its functions. Using a cloud-based mining approach, BTC Miner allows customers to effectively avoid the hassle of a high-cost installation and enjoy a seamless journey into creating digital wealth.

    Why More Users Are Turning to BTC Miner

    BTC Miner empowers individuals to earn passive income daily through streamlined, user-friendly cloud mining contracts. There’s no need to worry about managing hardware or electricity expenses once users select their preferred mining plan. BTC Miner’s automated system takes over entirely. This structure enables a low-risk, high-convenience environment for earning steady returns in a rapidly growing market.

    Zero Entry Barriers: Get Started Free

    New users receive a  $500 sign-up bonus, which does not require any initial investment. Besides that, BTC Miner also offers a risk-free daily contract of $2 which allows users to try out the platform without any money. This makes it possible for everyone to have a go at the platform before they make the final decision to invest.

    Reliable Daily Income with Transparent Terms

    BTC Miner is a platform for forming contracts that guarantee Bitcoin payments daily. The profits can be either withdrawn or reinvested at the user’s discretion. The contracts come with definite fixed income conditions and do not contain any hidden fees for installation, service, or energy consumption. Moreover, the system is based on smart contract automation, which means that it is possible to track the entire process, and funds are managed in a transparent way.

    FCA-Certified Security and Compliance

    BTC Miner is proudly certified by the UK Financial Conduct Authority (FCA), offering users a trusted and compliant environment for cryptocurrency investment. This regulatory assurance adds a critical layer of protection and transparency, especially valuable in a decentralised financial landscape.

    About BTC Miner

    BTC Miner is a worldwide innovator in cloud mining that is focused on providing low-barrier, high-transparency investment services to a large spectrum of potential users. BTC Miner is paving the way for the future of generations of decentralized assets and wealth creation with renewable energy data centres, smart autonomy, and regulatory adherence.

    User Experience That Delivers

    “BTC Miner has completely changed the way I invest,” shared one user. “The platform is natural and allows me to earn steady passive income without a technical background. The referral rewards are generous, and the FCA certification adds real peace of mind. Highly recommended.”

    Discover how BTC Miner is redefining crypto mining for everyday users, no complexity, no hardware, just daily returns.

    MEDIA Contact:
    Full Name: Isidro Miranda
    Email: info@btcminer.net
    Official Website: https://btcminer.net
    City/Country: London, United Kingdom

    Disclaimer: This press release is for informational purposes only and does not constitute financial advice, legal advice, or investment recommendations. Stock Trading involves risk and market volatility. Please research or consult a licensed financial advisor before making investment decisions. BTCMiner.net and associated parties are not liable for any financial loss incurred.

    Attachment

    The MIL Network

  • MIL-OSI: PFMCrypto Launches Innovative DOGE Cloud Mining Platform as Dogecoin Eyes Its Next Breakout

    Source: GlobeNewswire (MIL-OSI)

    Farington, England, June 26, 2025 (GLOBE NEWSWIRE) — As meme-coin legend Dogecoin (DOGE) regains traction in the crypto market, PFMCrypto has unveiled a new cloud mining solution tailor-made for DOGE holders. This latest release introduces AI-powered DOGE mining contracts, enabling users to earn passive daily income without the need for mining equipment or technical expertise.

    This launch aligns with PFMCrypto’s broader mission: to make crypto mining accessible, automated, and consistently profitable—particularly for trending assets like DOGE, which historically lacked structured mining solutions in cloud-based environments.

    [Click here to view DOGE mining solution.]

    PFMCrypto Redefines DOGE Cloud Mining

    While traditional mining has long favored Bitcoin and Ethereum, PFMCrypto has stepped in to fill a critical gap—bringing contract-based simulated mining to Dogecoin. In addition to DOGE, the platform also supports cloud mining for multiple assets including XRP, BTC, ETH, BCH, LTC, and SOL—removing the technical and financial barriers of traditional mining.

    “We’ve seen a surge in interest from long-term holders and meme-driven communities around DOGE,” said PFMCrypto’s Chief Technology Officer. “Now, they can passively earn from DOGE without relying solely on price movement.”

    Key Highlights of PFMCrypto DOGE Mining:

    • No Hardware Required: Users can rent industrial-grade hash power from PFMCrypto’s network with zero setup or equipment.
    • Zero Maintenance Costs: All electricity, repairs, and operational overhead are fully covered by PFMCrypto.
    • Beginner-Friendly: No tech knowledge needed. Users simply register and select a plan. New users receive a $10 welcome bonus instantly.
    • Daily Withdrawals & Capital Protection: Daily earnings can be withdrawn anytime, and the initial investment is fully refunded at contract maturity—ensuring both potential profits and safety.

    Flexible DOGE Mining Contracts Now Available

    Following the explosive success of its XRP cloud mining contracts—where contract purchases grew 295% week-over-week—PFMCrypto now offers over 10 DOGE mining plans, allowing users to select based on their budget and goals:

    • $100 Plan – 2 Days – Earn $3.00 per day (+$2 bonus)
    • $1,000 Plan – 9 Days – Earn $13.10 per day
    • $5,000 Plan – 30 Days – Earn $78.50 per day
    • $10,000 Plan – 40 Days – Earn $180.00 per day

    These are not theoretical forecasts—they’re backed by real-time data from over 9.2 million global users and powered by PFMCrypto’s high-performance infrastructure and AI-optimized yield model.

    [Click here to explore more cloud mining plans.]

    All contracts guarantee full principal return at maturity, making it a low-risk entry point for both beginners and seasoned investors.

    New Incentive Program

    Every new PFMCrypto user receives a free $10 bonus upon registration, which can be used to purchase a free mining contract that generates $0.66 in daily rewards.

    “This product was designed with the community in mind—it’s fun, rewarding, and aligns with crypto’s inclusive ethos,” said PFMCrypto’s Marketing Director.

    [Click here to register and claim your $10 bonus.]

    PFMCrypto’s Global Reach

    PFMCrypto currently operates in 192 countries and regions, with a global user base surpassing 9.2 million in 2025. It’s redefining what crypto cloud mining can be. With the launch of DOGE mining contracts, tens of thousands of new contracts have been activated within weeks—many by first-time earners looking to put their Dogecoin to work.

    How to Start Dogecoin Cloud Mining with PFMCrypto

    1. Register: Create a free account and instantly receive a $10 bonus, plus daily sign-in rewards.
    2. Choose a Plan: Select a DOGE mining contract that aligns with your financial goals.
    3. Start Earning: Once activated, your contract will automatically generate daily income—no manual oversight required.

    About PFMCrypto

    Founded in 2018, PFMCrypto is an AI-powered cloud mining platform that removes the technical and financial barriers from crypto mining. Committed to transparency, ease of use, and capital safety, PFMCrypto offers one of the most reliable and scalable mining ecosystems in the crypto space.

    Visit https://pfmcrypto.net to learn more and start your Dogecoin mining journey today.

    Disclaimer: The information provided in this press release does not constitute an investment solicitation, nor does it constitute investment advice, financial advice, or trading recommendations. Cryptocurrency mining and staking involve risks and the possibility of losing funds. It is strongly recommended that you perform due diligence before investing or trading in cryptocurrencies and securities, including consulting a professional financial advisor.

     

    The MIL Network

  • MIL-OSI: BAY Miner Redefines Cloud Mining in 2025 with AI and Mobile-First Experience

    Source: GlobeNewswire (MIL-OSI)

    Salt Lake City, Utah, June 26, 2025 (GLOBE NEWSWIRE) — As the cryptocurrency market recovers, the threshold of traditional mining machines is increasing, and investors are turning to cloud solutions. BAY Miner has become a leading choice with its AI computing power scheduling and equipment-free mining model.

    Salt Lake City is rapidly emerging as a key hub for cryptocurrency development in the western United States. With the influx of tech-savvy populations and the booming growth of decentralized finance (DeFi), local acceptance of digital assets such as Bitcoin, Ethereum, and XRP continues to rise. At the same time, due to high energy consumption and the complexity of hardware equipment, many investors are turning to more efficient and accessible participation methods. Cloud mining platforms like BAY Miner, leveraging AI-powered computing power allocation and convenient mobile operations, are becoming an important gateway for local users to enter the crypto economy, avoiding the investment costs and regulatory pressures associated with traditional mining rigs.

    BAY Miner Cloud Mining Core and Advantages
    Why Do Cryptocurrency Investors in Salt Lake City Favor Cloud Mining?
    · AI intelligent computing power scheduling system
    Use artificial intelligence algorithms to optimize cloud computing power resource allocation and maximize revenue efficiency and stability.
    ·No physical mining machine required, 0 maintenance cost
    Users can start mining with one click without purchasing expensive equipment, deployment, cooling or power maintenance.
    ·Mobile-first experience
    Provide full-featured mobile app support, users can monitor contracts and revenue anytime, anywhere, and truly realize the “mining farm on the palm of your hand”.
    ·Flexible contract mechanism
    Diverse mining contracts (including short-term/medium-term/revenue types) are available to meet the risk preferences and revenue goals of different investors.
    ·Comprehensive coverage of popular currencies
    Support mainstream crypto assets such as BTC, ETH, XRP, SOL, DOGE, LTC, etc., and easily deploy multi-currency asset configuration.
    ·Automatic profit distribution mechanism
    Daily income is automatically settled to the account balance every day, and cash withdrawal is supported at any time, with strong capital liquidity.
    ·Powerful risk control system
    Multiple risk control models identify suspicious operations, protect user asset security, and cooperate with compliant capital flow paths.

    How BAY Miner Works – A Technology-Driven Mining Model
    BAY Miner, built on a cloud architecture, utilizes AI algorithms to dynamically allocate computing resources. Users bypass the need for traditional mining rigs or local configurations; instead, they simply select the desired smart contract via their device to participate in cloud mining of major cryptocurrencies such as BTC, ETH, XRP, and DOGE. The platform automatically handles task allocation and profit settlement, ensuring complete transparency while minimizing the need for equipment intervention and maintenance. This represents a highly efficient and convenient technological solution for cryptocurrency mining.

    Start BAY Miner cloud mining in three easy steps

    1. Visit the official website to register – go to www.bayminer.com, fill in your email and username, and complete the account creation.
    2. Automatically get $15 to use for trial contracts – new users can immediately get free cloud contracts for BTC, XRP or DOGE.
    3. Choose a mining plan – browse the contract portfolio and start the smart cloud mining experience on mobile or web.

    User Case Examples

    Plan Type Coins Investment Contract Features
    Free Trial DOGE $0 No deposit needed. Try the platform’s mining interface.
    Mid Plan ETH + SOL $3,000 For moderate investors focused on long-term growth.
    AI Pro XRP + BTC + DOGE $30,000 AI-driven multi-coin strategy for optimized performance.


    From Trial to Scaled Mining Participation

    John from Texas began with a $15 trial contract, using it to explore BAY Miner’s cloud mining interface. After validating platform performance and smart contract reliability, he expanded to a diversified portfolio including XRP, BTC, and DOGE—now benefiting from a streamlined crypto mining experience with no hardware setup.

    Click here for full contract details

    BAY Miner Cloud Mining Development Plan
    BAY Miner is building a global intelligent cloud mining platform, relying on AI computing power scheduling technology to achieve efficient multi-currency mining and flexible income management. The platform will soon launch a dedicated token BMT, access the DeFi protocol, and expand the application of cloud computing power in Web3, GameFi and other scenarios to promote the construction of a decentralized digital asset ecosystem.
    Contact Information

    Website: www.bayminer.com
    Email: info@bayminer.com
    App: Download Now

    Disclaimer: The information provided in this press release does not constitute an investment solicitation, nor does it constitute investment advice, financial advice, or trading recommendations. Cryptocurrency mining and staking involve risks. There is a possibility of financial loss. It is strongly recommended that you perform due diligence before investing or trading in cryptocurrencies and securities, including consulting a professional financial advisor.

    Attachment

    The MIL Network

  • MIL-OSI Security: Defense News in Brief: ‘Historically Successful’ Strike on Iranian Nuclear Site Was 15 Years in the Making

    Source: United States Department of Defense

    Defense Secretary Pete Hegseth and Air Force Gen. Dan Caine, chairman of the Joint Chiefs of Staff held a press briefing to share more details about the success of Operation Midnight Hammer, which had been in the works for 15 years.

    MIL Security OSI

  • MIL-OSI Security: Defense News in Brief: Secretary of Defense General Officer Announcements for June 26, 2025

    Source: United States Department of Defense

    Defense Secretary Pete Hegseth announced that President Donald J. Trump has nominated Army Lt. Gen. Thomas M. Carden, Jr. for appointment to the grade of general, with assignment as vice chief of the National Guard Bureau, and Army Maj. Gen. Bobby L. Christine for appointment as judge advocate general.

    MIL Security OSI

  • MIL-OSI USA: Congressman Valadao’s Bill to Provide Resources for Lifesaving Earthquake Emergency Response Passes Out of House Committee on Natural Resources

    Source: United States House of Representatives – Congressman David G. Valadao (California)

    WASHINGTON – This week, the House Committee on Natural Resources advanced H.R. 3168, the National Earthquake Hazards Reduction Program Reauthorization Act, out of full committee markup. This bipartisan bill was introduced by Congressman David Valadao (CA-22) and Congressman Jim Costa (CA-21) and would reauthorize the National Earthquake Hazards Reduction Program through Fiscal Year 2030—providing resources to the research, development, and implementation of lifesaving earthquake risk reduction and safety.

    “With millions of families living near active fault lines throughout California, we have a responsibility to make sure our communities are as prepared as possible for earthquakes,” said Congressman Valadao. “Reauthorizing this program means better coordination and more reliable early warning systems, and I’m grateful to Chairman Westerman and the House Committee on Natural Resources for recognizing how important this bill is to public safety in our state and across the country.”

    “H.R. 3168 renews the critical Earthquake Hazards Reduction Program through 2030,” said House Committee on Natural Resources Chairman Bruce Westerman. “The program reduces the risk to life and property from future earthquakes in the U.S. I applaud Rep. Valadao for his work and look forward to helping him usher this bill through the House.”

    Background:

    The National Earthquake Hazards Reduction Program (NEHRP) is a program authorized in 1977. It supports activities like seismic monitoring, risk assessment, and the development of building codes and mitigation strategies. The program is managed through a partnership among four federal agencies: the Federal Emergency Management Agency (FEMA), the National Institute of Standards and Technology (NIST), the National Science Foundation (NSF), and the U.S. Geological Survey (USGS). The most recent reauthorization of NEHRP occurred in 2018 under the National Earthquake Hazards Reduction Program Reauthorization Act of 2018.

    Read the full bill here.

    ###

    MIL OSI USA News

  • Uttar Pradesh CM and Union Minister Jitendra Singh lay foundation for Green Data Centre in Ghaziabad

    Source: Government of India

    Source: Government of India (4)

    Uttar Pradesh Chief Minister Yogi Adityanath and Union Minister for Science & Technology Dr. Jitendra Singh on Thursday laid the foundation stone and performed the Bhumi Pujan for a state-of-the-art Green Data Centre in Sahibabad, Ghaziabad. The project, a collaboration between Central Electronics Limited (CEL), a public sector undertaking under the Ministry of Science & Technology, and ESDS, involves an investment of approximately ₹1,000 crore and boasts a 30 MW capacity.

    Dr. Jitendra Singh described the data centre as a pivotal step in India’s journey toward becoming a self-reliant global digital power. The facility is designed with sustainability at its core, incorporating energy-efficient technologies, renewable energy sources, and eco-friendly practices to minimize environmental impact. It will feature a scalable infrastructure capable of supporting 200 high-density racks per floor, adhering to Tier III/TIA/Uptime-compliant standards for high availability and resilience. Equipped with a 40 Gbps ring fibre network and dual 10 Gbps links for cloud integration and disaster recovery, the centre will also include rainwater harvesting, reflective roofing, and smart cooling systems to enhance energy efficiency.

    Chief Minister Yogi Adityanath praised CEL for its pioneering contributions to solar photovoltaic technology, noting its role in delivering solar-based electricity solutions to tribal and remote areas of Uttar Pradesh. He highlighted CEL’s broader impact beyond defence, including advancements in digital literacy and railway safety, which have strengthened critical infrastructure and supported inclusive growth across the state.

    Dr. Jitendra Singh recalled CEL’s historic legacy, established in 1974 to commercialize indigenous technologies. He noted its introduction of India’s first solar cell in 1977, well ahead of global recognition of solar energy’s potential. Despite facing a severe financial crisis that nearly led to disinvestment, CEL achieved a remarkable turnaround through a public-private partnership model, earning “Mini Ratna” status last year. The minister also underscored CEL’s contributions to strategic sectors, particularly its radars for the Akash Missile System, which played a critical role during Operation Sindhoor. CEL’s innovations extend to defence, railways, and solar sectors, making it a trusted name in innovation-led manufacturing.

    The Green Data Centre is expected to attract startups, enterprises, and government agencies, while generating skilled jobs and fostering local innovation. Dr. Singh also announced the establishment of a Biotechnology Industrial Park in Lucknow and a Startup Conclave in Uttar Pradesh post-Independence Day, reinforcing the state’s growing status as an innovation hub. He thanked CM Yogi Adityanath for his support in promoting science and innovation, citing his role in inaugurating the Central Administrative Tribunal building in Lucknow.

    Highlighting India’s advancements in science and technology, Dr. Singh cited CSIR-NBRI’s development of a 108-petal lotus, the Palampur Institute’s out-of-season tulips offered during the Ram Temple consecration, and the Surya Tilak phenomenon enabled by precise astronomical engineering. He also noted the Department of Atomic Energy’s faecal sludge treatment plants at this year’s Kumbh Mela, which processed 1.5 million tonnes of waste, ensuring hygiene at the world’s largest human gathering.

    Dr. Singh emphasized the vision of “Viksit Bharat @2047,” calling for collaborative efforts between government and private sectors to unlock India’s potential through science, technology, and innovation.

  • MIL-OSI Canada: Expanding Indigenous employment supports

    Source: Government of Canada regional news (2)

    MIL OSI Canada News

  • MIL-OSI USA: Congresswoman Torres Introduces The Taxpayer Protection Act

    Source: United States House of Representatives – Congresswoman Norma Torres (35th District of California)

    June 26, 2025

    Legislation to Ensure Donor States Receive Fair Federal Funding and Ends Politically Motivated Budget Punishment

    Washington, D.C. – Today, Congresswoman Norma Torres (CA-35) unveiled The Taxpayer Protection Act, legislation that addresses politically motivated funding cuts, as well as the persistent imbalance between donor states’ federal tax contributions and the federal funding they receive.

    For months now, California has been subject to threats of across the board federal funding cuts because of the political whims of the Trump Administration.  This is particularly offensive given California’s role as the biggest donor state in the nation- California taxpayers contribute approximately $83 billion more annually to the federal government than the state receives back in federal funding, according to the Rockefeller Institute of Government. The bill establishes  a transparent, accountable, and equitable framework ensuring that federal funds are allocated based on fairness — not political retribution.

    “California contributes more to our nation than any other state, yet Donald Trump wants to punish us for our values and political decisions. That stops now. This legislation ensures that federal funding decisions are based on need and equity—not political retribution from the Trump Administration. With the Taxpayer Protection Act, we will ensure fairness, transparency, and accountability from the federal government. This bill isn’t about special treatment—it’s about equal treatment. Our tax dollars should work for us, not be used against us,” said Congresswoman Norma Torres.

    The Act establishes the Donor State Protection Trust Fund, a special Treasury account designed to balance donor states federal tax contributions against the federal funding it receives. It requires independent verification and protects against politically motivated funding cuts. It also prohibits federal agencies from circumventing the law through reclassification or freezing funds.

    The bill would include:

    • A formula-based approach linking donor states federal tax contributions to federal funding received.

    • Protections against funding reductions motivated by political retaliation.

    • Oversight against waste, fraud, and abuse by the Government Accountability Office

    Full bill text

    ###

    MIL OSI USA News

  • MIL-OSI USA: IAM Journal Feature: Flying High

    Source: US GOIAM Union

    This article was featured in the Summer 2025 IAM Journal and was written by IAM Communications Representative John Lett.

    For decades, the IAM Air Transport Territory has been the backbone of the IAM. It weathered the airline bankruptcies of the 2000s resulting from the 9/11 terrorist attacks. IAM Air Transport fought for its members and preserved contracts, pensions and a quality way of life for thousands of working-class families across the United States.

    But about a decade ago, labor in general was stagnant, with mini­ mal growth and an uncertain future.

    “There was a time when people thought unions would go extinct, but J think we are changing that,” said Richie Johnsen, who has ser­ ved as IAM Air Transport Terri­ tory General Vice President for the past three years.

    IAM Air Transport Territory and District leadership gather at a conference in March. From left: 1AM Air Transport Territory Airline Coordinator Tom Regan, District
    141 President and Directing General Chair Mike Klemm, Air Transport Territory General Vice President Richie Johnsen, Air Transport Territory Chief of Staff Edison Fraser, District
    142 President and Directing General Chair John Coveny Jr., and Air Transport Territory Coordinator James Carlson.

    Under Johnsen’s leadership, IAM Air Trans­ port has experienced a resurgence. The territory has become the largest airline labor conglomerate in the AFL-CIO, representing more than 65,000 active members and 40,000 retirees at airlines across the country, including Puerto Rico and Guam. The territory, which represents mechanics, customer service agents, ramp workers and more, is divided into two large groups-District 141 with 42,000 members, from United, American, Spirit and other carriers and District 142, with 25,000 members, who pri­marily work for Southwest, Alaska, Hawaiian and American.

    “My exposure to the union came as far back as I can remem­ber. My father was a Machinist member. He was a shop steward. His father was an officer with the Longshoremen,” said Johnsen, who joined the IAM in I988 as an airline mechanic with United Air­ lines in San Francisco. “When J talk to my father, and he sees how the union has evolved, I think he’s fired up by seeing how we continue to grow.”

    Johnsen credits his territory’s ascension with an influx of new leadership from top to bottom, nego­tiating industry leading contracts, a fresh approach to labor activism, and a renewed hunger for organizing workers.

    “It’s very personal to me. What they’ve done is incredible. It has set the standard for what I believe union representation should look like,” said Johnsen. “In recent years, their wages have increased almost $8 an hour. For someone that was making $32 an hour, they’re making $40 now. Those are massive increases that we haven’t seen in decades.”

    Assisting General Vice Pre­sident Johnsen is Air Transport Chief of Staff Edison Fraser, a member since 2002, who originally hired on at Southwest Airli­nes in Baltimore. Fraser says he’s excited about the direction of the territory.

    “As a leader in the Air Transport Territory I am extremely proud of the work that Districts 141 and 142 have done,” said Fraser. ‘The leaders of those districts have embraced the growth of the districts and put the members first. With our help, from Headquarters, we’ve been able to support them 100%.”

    Qantas Airways aircraft maintenance engineers organized by the 1AM in 2024.

    Recent union victories include organizing wins at Qantas Airlines, PSA Airlines, multiple Swissport locations, Atlantic Aviation and Unifi Aviation, wins that have uplifted the lives of hundreds of workers. A large-scale victory of note took place in 2020 when the IAM negotiated a new contract for I0,000 union members at American Airlines, including Kenny Geis, a member and grievance committee chair at Local 1903M at Charlotte International Airport in North Carolina. Geis, who helped negotiate the contract, has been in the airline industry for 40 years, raised a family with three kids and says !AM Air Transport is enhancing lives across the country.

    “It was an industry-leading contract in pay, but more importantly in benefits. By far, the IAM gave us the best contract for work rules and scope of lan­ guage. Just recently, the company did a percentage rate increase to bring us back to the top of the industry as far as pay, and we keep all of our bene­ fits. That was huge,” said Geis, who works at American as a line aircraft inspector, testing for cra­ cks and corrosion in planes. “Not only are we the highest paid in the industry, we have the best benefits. That helps me and my family on a daily basis. As far as our medical, dental and eye coverage, I believe it’s the best in the industry and it’s all because of the IAM and the negotiating it did.”

    DISTRICT 141: A POWERHOUSE FOR AIRLINE WORKERS

    A decade ago, IAM District 141 had 23,000 members. Now, under the guidance of President and Directing Chairman Mike Klemm, it has increased in size to 41,000 members, 14 con­ tracts, and a budget that has tripled over IO years. Klemm, who became an IAM member in 1992, while working on the ramp for United Airlines at JFK Airport in New York, credits the district’s success to organizing, building relationships with members, rolling out an award-winning website, increasing safety standards on the shop floor, and updated training for members and shop stewards.

    “I feel very lucky. I couldn’t have done it without the support of the incredible members, especially at JFK Airport where 1 got my start, and the Executive Board,” said Klemm, who says his IAM membership has helped him provide a good life for his wife and two daughters. “If I didn’t have a strong team, I wouldn’t be able to be here. I never forget that, and I always make sure I keep in touch with my membership. I always work on improving their lives through the collective bar­ gaining agreements that I negotiate.”

    Growth at District 141 is also contributing to the communities it serves by supporting non-profit organizations at the local and national level.

    “We raised and donated at least $250,000 to the IAM Disaster Relief Fund. We felt like we were in a good monetary situation where we could contribute to the IAM and its members in need. We are certainly proud of that,” said Klemm. “We also give to Guide Dogs of America I Tender Loving Canines and even schools with kids that are less fortunate who have trouble finding school supplies. We also do Santa Clause gift runs during Christmas.”

    Members on a local level have high praises for the leadership and direction within IAM District 141. Marcello Serrao, IAM Local 1322 Commit­ tee Chair, who’s worked as a ramp serviceman at busy New York area airports for decades, says it’s refreshing to see top district representatives rou­tinely communicate with members and listen to their concerns.

    “It ‘s a great experience. It ‘s so necessary to have that relationship with the members,” said Serrao, a resident of Long Island. “There’s been such a change, more transparency, and what an improvement. It’s really good to see. In the past, you felt like you didn’t get a lot of information. It was very stagnant. But now there ‘s more updates on the website, more emails and people can keep track of what’s going on.”

    DISTRICT 142: RISING RAPIDLY TO SERVE IAM MEMBERS

    IAM District 142 has also experienced a rapid rise, increasing its membership in recent years from 16,000 to 20,000, with 36 contracts at 20 companies. District President and Directing Chairman John Coveny took over in 2022, after rising through the union ranks for years, with stops in Upstate New York, Pittsburgh and now Arizona.

    “The union is where I truly belong. Once I got involved with the union, that became my passion, and my desire,” said Coveny. “It’s a 24/7, 365 job. I love what I do. I live, eat and sleep this union because I believe in it that much.”

    After his installation, Coveny immediately moved district headquarters from Kansas City to Phoenix, where more IAM members resided. He and his staff also utilized social media with Facebook, X (For­mally known as Twitter), lnstagram and TikTok. Coveny and his staff reenergized organizing cam­paigns, streamlined technology and promoted diver­sity within the ranks.

    “We’ve established an organizing committee, a women’s committee, a young workers committee,” said Coveny. “We also put in place new dues processing software.”

    Coveny, who joined the union in 1988 as a mechanic at US Airways in Buffalo, N.Y., is passio­nate about the TAM because it has given him and his family a better quality of life. Strong union contracts and salaries over the years gave Coveny the ability to pay college tuition for his three children, and also hike, bike and enjoy time off with his wife of 37 years.

    “The purpose of the union is to provide a reaso­nable living for the members. I truly stand by every contract that we’ve negotiated,” said Coveny. “We lead the industry in almost every contract we’ve negotiated.”

    Coveny is also committed to mentoring a new generation of IAM leaders at the district. Nearing retirement, Coveny says he’s excited about a new generation of District 142 representatives who can build on the foundation, he and his staff, have laid.

    “It’s very important to me, that people who are younger and help push them forward, so when folks who are in office today leave, somebody is ready to fill that role,” said Coveny.

    Steve Oheme is a member of IAM Local 1976 in Pittsburgh who joined the union in 1986 as a mechanic at United Airlines. He says new district leadership has boosted communication with mem­bership, fought for lucrative collective bargaining agreements and pressured airlines to protect IAM mechanics by maintaining stricter safety standards in aircraft hangers.

    ‘They’re doing a fantastic job. They keep us up to date. We are better than we were. It’s amazing. And it’s a great deal,” said Oheme, who works as a crew chief and supervisor of 16 mechanics. ‘There is a big push for safety that wasn’t there before. They make sure we get all the tools, supplies and anything we need, like eyewear and hearing protection. The district pushes the company to supply that stuff. It’s good knowing that they fought for us. I feel secure. It’s awesome.”

    Industry-leading IAM contracts, negotiated by District 142, have helped members like Oheme to thrive. As his four-decade career winds down, he’s proud of raising two children with his wife of 40 years, and enjoys hobbies like pickleball, skiing, mountain biking and golfing, a way of life that embo­dies the success and mission of the district, and the IAM Air Transport Territory as a whole.

    “I want us to continue to grow and I want these Districts to be larger and stronger,” said IAM Air Transport Territory Chief of Staff Edison Fraser.

    IAM Air Transport has set ambitious goals for 2025 and beyond. The union is gaining ground in two large organizing campaigns, 20,000 ramp and cargo workers at Delta Air Lines, and 3,000 ramp workers at JetBlue Airways, and is aggressively organizing the ground handling sector across the United Sta­tes. Leadership believes it will win those campaigns, grow the territory and continue to boost the quality of life for aviation workers, and their families, across the country.

    “I feel like we set the standard. No one does what we do. I feel like we lead the way and it’s our job to lead the way. Were big, we’re progressive and we’re diverse,” said General Vice President Johnsen. “We move people and cargo. Without air transportation, the economy stops. It shuts down. There is no eco­nomy without us taking care of the passengers and the cargo This 1s an exciting time “

    The post IAM Journal Feature: Flying High appeared first on IAM Union.

    MIL OSI USA News

  • MIL-OSI USA: AG Labrador and Acting U.S. Attorney Whatcott Announces 30-Year Sentence for Burley Man Who Produced Child Sexual Abuse Material

    Source: US State of Idaho

    Home Newsroom AG Labrador and Acting U.S. Attorney Whatcott Announces 30-Year Sentence for Burley Man Who Produced Child Sexual Abuse Material

    POCATELLO – Michael Allen Montoya, 40, of Burley, was sentenced to 360 months in federal prison for sexual exploitation of a child, Idaho Attorney General Raúl Labrador and Acting U.S. Attorney Justin Whatcott announced today.
    According to court records, the investigation began when the FBI became aware that a person, later identified as Montoya, was distributing child sexual abuse material through an online social media platform. The FBI also learned that during online chat conversations, Montoya had discussed his sexual interest in children and had exchanged child sexual abuse material with other offenders. The FBI referred the investigation to the Idaho Internet Crimes Against Children Task Force (ICAC). ICAC obtained a federal search warrant for Montoya’s Burley residence. During a forensic examination of Montoya’s electronic devices, ICAC located numerous files of child sexual abuse material. ICAC also discovered that Montoya had produced explicit images and videos of himself sexually abusing an infant and an 8-year-old child in his care.
    “Our commitment to protecting children from abuse is unwavering,” said Idaho Attorney General Labrador. “I am grateful for our ICAC Task Force and the partnership we have with Acting U.S. Attorney Whatcott’s office. By working together, we can continue making Idaho safer by investigating, arresting, and prosecuting one bad guy at a time.”
    “Law enforcement in Idaho has zero tolerance for those that target children for abuse and exploitation,” Acting U.S. Attorney Whatcott said. “As this case illustrates, images of child sexual abuse material are not just images – they are evidence of sexual abuse committed by predators like this defendant. I am thankful that we have outstanding professionals in the ICAC, the FBI, and our office that are dedicated to protecting Idaho’s children and ensuring this type of abhorrent conduct results in significant prison sentences.”
    Senior U.S. District Judge B. Lynn Winmill also sentenced Montoya to lifetime supervised release and ordered him to pay restitution to his victims. Montoya will be required to register as a sex offender as a result of the conviction.
    Acting U.S. Attorney Whatcott commended the cooperative efforts of the Idaho ICAC Task Force, the Federal Bureau of Investigation, the Rupert Police Department, the Idaho State Police, the Minidoka County Sheriff’s Office, and the Cassia County Sheriff’s Office, which led to the charge. This case was prosecuted by Assistant United States Attorneys Kassandra McGrady and Erin Blackadar.This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. As part of Project Safe Childhood, the U.S. Attorney’s Office for the District of Idaho and the Idaho Attorney General’s Office partner to marshal federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    MIL OSI USA News

  • MIL-OSI Security: PDAAG Roger P. Alford Delivers Remarks to the International Association of Privacy Professionals

    Source: United States Attorneys General

    Good afternoon. I am pleased to be here today. It is an honor to represent the United States and work with the Assistant Attorney General Gail Slater and the amazing attorneys, economists, and staff and the Antitrust Division of the Department of Justice. I also want to thank the IAPP for inviting me to participate in this 2025 Digital Policy Leadership Retreat and Jonathan Zittrain and David Sanger for joining this discussion on such an important and timely topic.

    The world today has indeed become a digital world. Almost every company has some digital presence and almost every product sector is touched by digital platforms. Every day, platforms are connecting users and consumers in new and exciting ways. They are introducing novel commercial relationships with ever sophisticated algorithms. While we welcome these changes, we also recognize that these innovations introduce a range of competition issues. At the Department of Justice, we are watching these developments closely, scrutinizing the competitive implications of digital conduct.

    The topic for my speech today is where we go from here in applying antitrust law and policy in the digital world. I won’t bury the lede. We are heading towards a better future for the American people that maximizes their consumer welfare in digital markets through the vigorous enforcement of the antitrust laws. In fact, thanks to recent enforcement efforts, we are already beginning to see that world unfold.

    Many doubted that would ever be possible. When digital markets first emerged, enforcers had for decades been accustomed mostly to smokestack industries. Products rolled off assembly lines with similar features and prices year after year. These things could be measured and scrutinized quantitatively. We came to think that’s all antitrust enforcers should do.

    In contrast, digital markets offered zero price goods, with consumers trading their time and data for services. They were often defined by innovation and dynamism. Those looked like square pegs that didn’t fit the round holes of traditional antitrust analysis.

    We had become so used to smokestack industries that many assumed consumer welfare should always be measured in the prices and outputs of the goods that rolled off the assembly line. Privacy, attention, choice, and innovation were afterthoughts. And so some suggested that there could be no antitrust enforcement in many digital markets because traditional measures of consumer welfare were difficult to apply.

    Others accepted that premise, but pushed for a divorce between antitrust enforcement and the consumer welfare standard. They thought that to adequately protect competition in digital markets, antitrust needed to abandon its core focus on consumer welfare and have an essentially unlimited lens on its mission to include citizen welfare or a nebulous public interest standard.

    We now know that there is a third way. Consumers’ welfare is not merely about the price they pay. Consumers benefit when their privacy is better protected. They pay for digital services in time, attention, and data. Consumer welfare rises when companies innovate, and new technologies disrupt incumbent technologies.

    The answer was not to abandon antitrust in digital markets, or to abandon consumer welfare. The answer was to recognize the many dimensions of the competitive process that maximizes consumer welfare online.

    I’d like to spend my time today talking about how that principle has played out in recent cases and will continue to inform our work in digital markets in the years to come.

    First, our recent successes in protecting consumers from monopoly abuse in digital markets unequivocally demonstrate the continued vitality of the consumer welfare frame in protecting the American people online.

    As many of you are aware, the Department of Justice has been vigorously enforcing the antitrust laws against the exclusionary and unlawful conduct of Big Tech for some time now, going back to the first Trump Administration. The DOJ currently has two large, ongoing litigations against Google in particular.

    These are historic monopolization cases in which the DOJ earned landmark wins in federal district courts in Washington D.C. and Virginia, finding that Google is a serial monopolist — in general search, in search text advertising, and in multiple segments of the ad-tech stack. These rulings recognize that Google has abused its monopoly status by controlling how digital advertisements are placed on the free and open internet.

    The DOJ has proven that Google repeatedly broke the law against monopolization. In response, we have proposed remedies tailored to restore competition and address the competitive harms of Google’s monopoly abuses.[1] In the Google Search case, a decision is expected by the end of the summer, following a three-week remedy hearing this spring. In Google Ad Tech, a remedies hearing is scheduled for early fall. We are hopeful that the federal courts in both cases will issue strong rulings that adopt structural and behavioral remedies to restore competition. Historic monopolization cases call for historic remedies, and our digital freedoms deserve nothing less.

    The Google cases represent a bipartisan consensus in favor of vigorous antitrust enforcement. Beginning in the first Trump Administration, these cases reflect an historic commitment by both Republican and Democratic Administrations and almost every State Attorney General to protect consumers from monopoly abuse.

    Both of these cases were won with evidence presented within a consumer welfare frame, expanded to account for the unique properties of digital markets. We defined consumer welfare broadly to include not only price, but also quality, output, innovation and anything else that impacts consumers. And we recognized that consumer welfare impacts do not always need to involve the kind of quantitative evidence available in a price-focused case, but that qualitative non-price evidence can be equally valuable.

    Judge Mehta’s opinion in Google Search is a great example of the modern approach to addressing all of the determinants of consumer welfare. It mentions privacy 55 times. For example, when assessing the relevant market, it notes how Google compares its privacy to Duck Duck Go.[2] And its overall market definition approach appropriately takes account for the full range of qualitative evidence that bears on defining competition in search. Meanwhile, the Google Ad Tech opinion reminds its readers that the antitrust laws are a “consumer welfare prescription,” and then goes on to examine the many unique attributes of consumer welfare, beyond price and output, in the ad tech markets Google monopolized there.[3]

    While we assess the full range of determinants of consumer welfare, that does not mean our analysis is unlimited. The ultimate question for antitrust law remains economic competition in a relevant market. The law does not permit an untethered overall public interest analysis that asks courts to weigh effects across markets or to include non-competition values.

    For that reason, we consistently reject arguments that we should excuse harm to competition in order to protect a national champion firm on the theory that this will somehow benefit national security. We don’t accept the premise that shielding our businesses from competition somehow makes us stronger. That’s the Chinese and Russian way. The American way of winning the global economic competition is with strong competition in our domestic firms that makes our companies stronger to compete abroad. That premise has served us well for centuries, and we do not intend to abandon it now.

    Let me offer a word of thanks to those who prosecuted these cases. The incredible attorneys, economists, and staff at the Antitrust Division that prosecuted the Google Search case deserve particular mention. Following a ten-week liability trial in 2023 and then a three-week remedies trial in 2025, they outlawyered the other side by presenting strong legal theories in support of critical remedies designed to ensure that our digital spaces will be free and open. No matter what the federal court orders in the remedies phase, the leadership at the Division is incredibly proud of the hard work and dedication of the public servants who have litigated that case.

    As Assistant Attorney General Gail Slater has said, “The Google Search case matters because nothing less than the future of the internet is at stake here. Are we going to give Americans choices and allow innovation and competition to thrive online? Or will we maintain the status quo that favors Big Tech monopolies? If Google’s conduct is not remedied, it will control much of the internet for the next decade and not just in internet search, but in new technologies like artificial intelligence.”[4]

    As for the Google Ad Tech case, the extraordinary attorneys have won a landmark liability ruling and we anticipate that they will present a strong case for robust remedies in the digital ad tech space. As Attorney General Pam Bondi has said, the ruling in the Antitrust Division’s favor in April in that case was “a landmark victory in the ongoing fight to stop Google from monopolizing the digital public square.”  I could not agree more. We are fortunate to have such quality attorneys working to protect the American public.

    Let me now turn to some of our thinking about how we will protect consumer welfare in digital markets in the future. Digital technologies have significant implications for virtually all the monopoly conduct and cartels that the DOJ analyzes today. The DOJ has an obligation to husband our resources to enforce the laws where it matters most, to protect markets that most directly impact the average American, markets such as healthcare, housing, agriculture, education, and insurance. Let me focus on just a few of those digital markets.

    In healthcare, in particular, we have a mandate to use our resources to ensure American markets in health sectors are more competitive, innovative, affordable, and provide higher quality to patients and consumers. For years, we have witnessed consolidation across healthcare leading to higher prices and lower wages for healthcare workers. We see pharmacy benefit managers and brand name monopolies driving up prescription drug prices. Consolidation and roll-ups of physician practices and hospitals often increase health care costs, raising prices for services, and deteriorating patient outcomes. And algorithms and data increase complexity by playing an ever-larger role in health care markets and practices. We are even seeing algorithmic management technologies gaining a foothold in the health care labor sector, one of the largest labor sectors in the country.[5]

    Our recent Las Vegas nursing case is an example of the Department of Justice protecting Americans’ pocketbooks in the health sector. In that case, the Division successfully prosecuted a three-year conspiracy to fix the wages of nurses — capping their wages. As AAG Slater has stated: “Wage-fixing agreements are nakedly unlawful attempts at unjustly profiting off American workers…. The nurses here deserved better, and under President Trump’s leadership, they will be protected.”[6]

    The DOJ is committed to combatting monopoly abuse and collusion in the health care sector. This includes collusion that is accomplished by digital algorithms. Our recent statement of interest in the In re Multiplan Health Insurance Provider Litigation is an example.[7] In that case, competitors used a common pricing algorithm to share confidential information to set prices. Such algorithmic sharing of confidential information on digital platforms should be challenged as a violation of the antitrust laws.

    The DOJ is focused on algorithmic collusion in housing markets as well. The Division is litigating an ongoing case against RealPage and large landlords for algorithmic collusion affecting the rental prices for millions of Americans.[8] In this case, RealPage has introduced a digital platform that made it easier for landlords to coordinate to dramatically increase rental prices for the average American. RealPage and large landlords actively participated in the illegal pricing scheme, setting their rents by using each other’s competitively sensitive information via common pricing algorithms.[9]

    These cases are examples of a growing trend. If we do not take a strong stand now against algorithmic collusion, we will see this new form of price fixing destroying effective competition across a whole range of digital markets.

    And still there is more. Algorithmic collusion is only a subset of the issues that algorithms raise for antitrust enforcement. We can see on the horizon new concerns that will be extremely difficult for enforcers to address using traditional antitrust law. Academic work is already exploring how artificial intelligence can be instructed to profit maximize and learn to set prices in a manner consistent with collusion. We are on the verge of autonomous algorithmic collusion.

    Regardless of the digital sector, we at the DOJ will follow the facts and apply the law in connection with algorithmic pricing and potential collusion. These issues provide an opportunity for our enforcers to engage critically with the practical realities of how complex technologies are affecting Americans’ lives today and in the future. Artificial intelligence holds so much promise, but it also presents unique challenges. Will these technologies empower anticompetitive behavior targeted at unsuspecting digital citizens?  The DOJ must meet this moment and fulfill its mandate to protect competition for the American people.

    Let me conclude with a few thoughts about the Antitrust Division’s agenda with respect to mergers in the digital space.

    When President Trump announced that Gail Slater would lead the Antitrust Division, he reiterated that Big Tech has stifled Little Tech innovation and competition. We are pro Little Tech and welcome Little Tech innovation. We will bring the antitrust laws to bear on Big Tech to answer for their abuses, but we are open and receptive to procompetitive mergers, especially in Little Tech. We want innovative start-ups to see exit opportunities other than acquisitions by the largest, most dominant players, whose acquisition strategies are often driven as much by their desire to entrench their existing power as they are to drive innovation. The enforcers at the DOJ work tirelessly to promote a competitive landscape to ensure that new ideas get funding, so that startups can compete on the merits and disrupt incumbents.

    An embrace of Little Tech recognizes the benefits of venture capital and digital mergers. We want to see venture capital funds flowing to support innovative companies. In healthy, competitive markets, venture capital funds should flow freely.

    During AAG Slater’s tenure at the Division, we will challenge anticompetitive mergers. That is already evident in these early months. But the vast majority of mergers do not raise competition concerns, and those that do often can be resolved through negotiation, settlements, and consent decrees. We are committed to providing clear guidance to merging parties on their proposed transactions, welcoming most mergers and only challenging the problematic ones.

    In conclusion, let me state what an honor it is for me to return to the Antitrust Division and serve as Principal Deputy Assistant Attorney General to AAG Slater. As part of the Republican realignment, President Trump and Assistant Attorney General Slater have a clear vision for robust antitrust enforcement over the next four years. Our paramount focus will be to put consumer welfare first, accounting for the wide range of harms and benefits to consumers and workers that can arise in modern markets.

    Yes, competition brings lower prices. But it also brings better quality, improved privacy options, lower advertising loads, greater data portability, more choice, and increased innovations. Competition maximizes consumer welfare by driving businesses to deliver everything consumers want. That makes it the critical tool to protect consumers in our free market system, even in a changing world.

    Thank you. 


    [2] See United States v. Google LLC, 747 F. Supp. 3d 1, 54-55 (D.D.C. 2024).

    [3] See United States v. Google LLC, 23-cv-108, 2025 WL 1132012 (E.D. Va. Apr. 17, 2025) (“Google AdTech”).

    MIL Security OSI

  • MIL-OSI Security: Secretary Noem Terminates Wasteful DHS Program that Encouraged DEI in K-12 Schools

    Source: US Department of Homeland Security

    The “Invent2Prevent” program funneled millions of dollars to a highly politicized organization and targeted school children with radical ideology

    WASHINGTON – Today, Homeland Security Secretary Kristi Noem announced that she terminated the DHS “Invent2Prevent” program – a wasteful and highly politicized initiative that cost the American taxpayer over $1.5 million dollars.

    Despite its high cost, the program accomplished very little towards its apparent mission: preventing terrorism. Instead, it funneled taxpayer money into a highly politicized organization called “The Eradicate Hate Global Summit,” which promoted DEI and LGBTQ ideology at K-12 schools.

    “President Trump was given a mandate by the American people to eliminate wasteful government spending, and that is exactly what we are doing,” said Tricia McLaughlin, DHS Assistant Secretary. “This program was not only wasteful, it was also using public money to support an openly partisan and political organization. Politicized NGOs like Eradicate Hate have been siphoning away taxpayer dollars for far too long. We are ending the grift.”

    Under the guise of counter terrorism, this program used tax money on initiatives to foster “inclusive environments in schools,” promote DEI, and expose grade school children to sexualized topics like LGBTQ issues.

    By canceling Invent2Prevent, Secretary Noem is saving the taxpayer $1,523,146.24.

    ###

    MIL Security OSI

  • MIL-OSI: AAS Miner Launches Next-Generation Cloud Mining Platform to Democratize Profitability

    Source: GlobeNewswire (MIL-OSI)

    LONDON, UK, June 26, 2025 (GLOBE NEWSWIRE) —  AAS Miner, a prominent cloud mining platform, today announced the extension of its services, providing a seamless and safe gateway for people to invest in cryptocurrency mining and receive passive income. As a user-friendly and efficient solution, AAS Miner looks to set the standard for the international cloud mining sector with their accessible solutions for established investors and novice digital asset investors alike. 

    AAS Miner vows to provide an unrivalled mining experience through the integration of innovative ASIC and GPU mining hardware with a friendly user interface. The platform eliminates the complexities associated with traditional cryptocurrency mining, such as hardware procurement, maintenance, and high energy costs, making it easier for users to begin their wealth appreciation journey.

    “At AAS Miner, our core mission is to empower individuals to participate in the burgeoning digital economy with confidence and ease,” said a spokesperson for AAS Miner. “We believe that generating passive income from cryptocurrencies should be straightforward and accessible. Our platform, backed by advanced technology and a dedicated expert team, ensures a reliable and efficient mining environment for all our users.”

    Key Advantages of Choosing AAS Miner:

    • Effortless Start: Users can begin mining in a few simple steps: register an account, select a preferred mining contract, and start receiving stable daily income directly to their account. New users are welcomed with a $10 registration bonus, and daily sign-in rewards of $0.8 are available.
    • State-of-the-Art Hardware: AAS Miner utilizes the latest ASIC and GPU mining equipment, ensuring high efficiency and optimal performance for digital asset production.
    • No Hidden Fees: The platform transparently covers all hardware, installation, maintenance, and electricity costs, providing a clear and predictable earning model for users.
    • Stable and Predictable Earnings: Once a contract is purchased, the system automatically processes and updates earnings every 24 hours, offering a consistent income stream.
    • Robust Fund Security: A significant portion of user funds is secured in offline cold wallets. Enhanced security protocols, including McAfee® Security and Cloudflare® Security, are implemented to ensure maximum asset protection.
    • Expert Support and Eco-Friendly Operations: An expert team of blockchain professionals and IT engineers provides 24/7 online customer service. Furthermore, AAS Miner is dedicated to environmentally friendly mining, powering its operations with clean energy sources like monocrystalline solar panels and large-scale wind energy to ensure profitability while minimizing ecological impact.
    • Lucrative Referral Program: Users can earn a permanent 5% referral bonus (Level 1) and 2.5% (Level 2) by inviting friends, providing an additional avenue for wealth accumulation.

    AAS Miner offers a variety of popular mining contracts tailored to different investment capacities and durations, including options for Bitcoin (BTC), Litecoin (LTC), and Dogecoin (DOGE) cloud computing power.

    As the cryptocurrency market continues its appreciation, cloud mining with AAS Miner presents an opportunity to participate in the digital economy’s growth, aligning technological advancement with sustainable development.

    About AAS Miner: AAS Miner is a leading cloud mining platform established with the goal of providing a simple, secure, and efficient way for individuals worldwide to earn cryptocurrency. Leveraging advanced mining hardware and an expert team, AAS Miner is committed to transparent operations, robust security, and environmentally responsible practices, empowering users to achieve passive income in the digital asset space.

    Media Contact:
    Full Name: DOLAN Peter James
    Position: Advertising Manager
    Email: Miner@aas8.com
    Website: https://aas8.com
    Address: 5 Egerton Drive, Hale, Altrincham, United Kingdom, WA15 8EF

    Attachment

    The MIL Network

  • MIL-OSI Economics: Building security that lasts: Microsoft’s journey towards durability at scale

    Source: Microsoft

    Headline: Building security that lasts: Microsoft’s journey towards durability at scale

    In this blog you will hear directly from Microsoft’s Deputy Chief Information Security Officer (CISO) for Azure and operating systems, Mark Russinovich, about how Microsoft operationalized security durability at scale. This blog is part of an ongoing series where our Deputy CISOs share their thoughts on what is most important in their respective domains. In this series you will get practical advice and forward-looking commentary on where the industry is going, as well as tactics you should start (and stop) deploying, and more.

    In late 2023, Microsoft launched its most ambitious security transformation to date, the Microsoft Secure Future Initiative (SFI).  An initiative with the equivalent of 34,000 engineers working across 14 product divisions, supporting more than 20,000 cloud services on 1.2 million Azure subscriptions, the scope is massive. These services operate on 21 million compute nodes, protected by 46.7 million certificates, and developed across 134,000 code repositories. 

    At Microsoft’s scale, the real challenge isn’t just shipping security fixes—it’s ensuring they’re automatically enforced by the platform, with no extra lift from engineers. This work aligns directly to our Secure by Default principle. Durable security is about building systems that apply fixes proactively, uphold standards over time, and engineering teams can focus on innovation rather than rework. This is the next frontier in security resilience.

    Learn more about the Secure Future Initiative

    Why “staying secure” is harder than getting there 

    SFI April 2025 report blog

    Read the blog ›

    When SFI began, Microsoft made rapid progress: teams addressed vulnerabilities, met key performance indicators (KPIs), and turned dashboards green. Over time, sustaining these gains proved challenging, as some fixes required reinforcement and recurring patterns like misconfigurations and legacy issues began to re-emerge in new projects—highlighting the need for durable, long-term security practices. 

    The pattern was clear: security improvements weren’t durable

    While key milestones were successfully achieved, there were instances where we did not have a clearly defined ownership or built-in features to automatically sustain security baselines. Enforcement mechanisms varied, leading to inconsistencies in how security standards were upheld. As resources shifted post-delivery, this created a risk of baseline drift over time. 

    Moving forward, we realized that our teams need to establish explicit ownership, standardize enforcement design, and embed automation at the platform level because it is essential to ensure long-term resilience, reduce operational burden, and prevent regression. 

    Read the latest SFI report

    Engineering for endurance: The making of Microsoft’s durability strategy 

    To transform security from a reactive effort into an enduring capability, Microsoft launched a company-wide initiative to operationalize security durability at scale. The result was the creation of the Security Durability Model, anchored in the principle to “Start Green, Get Green, Stay Green, and Validate Green.” This framework is not a slogan—it is a foundational shift in how Microsoft engineers build, enforce, and sustain secure systems across the enterprise. 

    At the core of this effort are Durability Architects—dedicated Architects embedded within each division who act as stewards of persistent security. These individuals champion a “fix-once, fix-forever” mindset by enforcing ownership and driving accountability across teams. One example that catalyzed this effort involved cross-tenant access risks through Passthrough Authentication. In this case, users without presence in a target tenant could authenticate through passthrough mechanisms, unintentionally breaching tenant boundaries. The mitigation initially lacked durability and resurfaced until ownership and enforcement were systemically addressed. 

    Microsoft also applies a lifecycle framework they call “Start Green, Get Green, Stay Green, Validated Green.” New features are developed in a secure-by-default posture using hardened templates, ensuring they “Start Green.” Legacy systems or existing features are brought into compliance through targeted remediation efforts—this is “Get Green.” To “Stay Green,” ongoing monitoring and guardrails prevent regression. Finally, security is verified through automated reviews, and executive reporting—ensuring enduring resilience. 

    Automating for scale and embedding security into engineering culture 

    What is Azure Policy?

    Learn more

    Recognizing that manual security checks cannot scale across an enterprise of this size, Microsoft has heavily invested in automation to prevent regressions. Tools such as Azure Policy automatically enforce best practices like encryption-at-rest or multifactor authentication across cloud resources. Continuous scanners detect expired certificates or known vulnerable packages. Self-healing scripts autocorrect deviations, closing the loop between detection and remediation. 

    To embed durability into the operational fabric, review cadences and executive oversight play a critical role. Security KPIs are reviewed at weekly or biweekly engineering operations meetings, with Microsoft’s top leadership, including the Chief Executive Officer (CEO), Executive Vice Presidents (EVPs), and engineering leaders receiving regular updates. Notably, executive compensation is now directly tied to security performance metrics—an accountability mechanism that has driven measurable improvements in areas such as secret hygiene across code repositories. 

    Rather than building fragmented solutions, Microsoft focuses on shared, scalable security capabilities. For example, to maintain a clean build environment, all new build queues will now default to a virtualized setup. Customers will not have the option to revert to the classic Artifact Processor (AP) on their own. Once a build is executed in the virtualized CloudBuild environment, any previously allocated resources in the classic CloudBuild will be either decommissioned or reassigned. 

    Finally, durability is now a built-in requirement at development gates. Security fixes must not only remediate current issues but be designed to endure. Teams must assign owners, undergo gated reviews or durability, and build enforcement mechanisms. This philosophy has shifted the mindset from one-time patching to long-term resilience.  

    The path to durable security: A maturity framework 

    Durable security isn’t just about fixing vulnerabilities—it’s about ensuring security holds over time. As Microsoft learned during the early days of its Secure Future Initiative, lasting protection requires organizations to mature operationally, culturally, and technically. The following framework outlines how to evolve toward security durability at scale: 

    1. Stages of security durability maturity: Security durability evolves through distinct operational phases that reflect an organization’s ability to sustain and scale secure outcomes, not just achieve them temporarily. 

    • Reactive: Durable outcomes are rare. Fixes are implemented manually and inconsistently. Drift and regressions are common due to a lack of enforcement or oversight. 
    • Define: Security fixes are codified in basic processes. Teams may implement fixes, but durability is still dependent on individual vigilance rather than systemic support. 
    • Managed: Security controls are embedded in standardized workflows. Durable design patterns are introduced. Baseline drift is measured, and early automation begins to prevent regression. 
    • Optimized: Durability becomes part of engineering culture. Secure-by-default templates, guardrails, and metrics reduce variance. Real-time enforcement prevents security drift. 
    • Autonomous and predictive: Systems proactively enforce durability. AI-assisted controls detect and self-remediate regressions. Durable security becomes self-sustaining and adaptive to change. 

    2. Dimensions of security durability: To embed durability across the enterprise, organizations must mature along five integrated dimensions: 

    • Resilience to change: Security controls must remain stable even as infrastructure, tools, and organizational structures evolve. This requires decoupling controls from fragile, manual systems. 
    • Scalability: Durable security must scale effortlessly across expanding environments, including new regions, services, and team structures—without introducing regressions. 
    • Automation and AI readiness: Durability depends on machine-powered enforcement. Manual reviews alone cannot guarantee persistence. AI and automation provide speed, consistency, and fail-safes. 
    • Governance integration: Durability must be wired into governance platforms to provide traceability, accountability, and risk closure across the control lifecycle. 
    • Sustainability: Durable security solutions must be lightweight and operationally viable. If controls are too burdensome, teams will circumvent them, undermining long-term resilience. 

    3. Key milestones in security durability evolution: Microsoft’s implementation of durable security revealed critical transformation points that signal organizational maturity: 

    • Establish durable security baselines (identity hygiene, patching, config hardening).
    • Enforce controls through automated policy and self-healing. 
    • Build durability-aware platforms like Govern Risk Intelligent Platform (GRIP) to track regressions and closure loops. 
    • Embed durability reviews into engineering checkpoints and risk ownership cycles.
    • Drive a durability mindset across teams—from development to operations. 
    • Create feedback loops to evaluate what holds and what regresses over time. 
    • Deploy AI-powered agents to detect drift and initiate remediation. 

    Each milestone builds a stronger foundation for durability and aligns incentives with sustained security excellence. 

    4. Measuring security durability: Tracking the stickiness of security work requires a shift from traditional risk metrics to durability-focused indicators. Microsoft uses the following to monitor progress: 

    • Percentage of controls enforced automatically versus manually 
    • Baseline drift rate (how often known-good states erode) 
    • Mean time to regress (how quickly fixes unravel)
    • Volume of self-healing actions triggered and resolved 
    • Percentage of fixes that meet “never regress” criteria 
    • Durability metadata coverage in systems like GRIP (ownership, status, and closure) 
    • Percentage of engineering teams integrated into durability reporting cadences 

    Results: From short-term wins to sustained gains 

    By February 2025, the durability push resulted in: 

    • 100% multi-factor authentication (MFA) enforcement or legacy protocol removal remained stable for months. 
    • Teams use real-time dashboards to catch any KPI dips—addressing them before they spiral. 

    Where previous improvements faded, new ones held firm—validating the durability model. 

    Get the latest Secure Future Initiative updates

    Lessons for any enterprise 

    Microsoft’s journey offers valuable takeaways for organizations of all sizes. 

    Durability requires programmatic support 

    Security doesn’t persist by accident. It needs: 

    • Roles for durability and accountability.
    • Durable design patterns. 
    • Empowering technologies (automation and policy enforcement). 
    • Regular leadership and architect reviews. 
    • Standardized workflows. 

    Teams across security, development, and operations must be aligned and coordinated—using the same metrics, tools, and gates. 

    Culture and leadership matter 

    Security must be everyone’s job—and leadership must reinforce that relentlessly. At Microsoft, security became part of performance reviews, executive dashboards, and everyday conversation. 

    As EVP Charlie Bell put it: “Security is not just a feature, it’s the foundation.” 

    That mindset—combined with consistent leadership pressure—is what transforms short-lived security into long-term resilience. 

    Security that endures 

    The Secure Future Initiative proves that durable security is achievable—even at hyperscale.  

    Microsoft is showing that lasting security can be achieved by investing in: 

    • People (clear ownership and champions). 
    • Processes (repeatable metrics and reviews). 
    • Platforms (shared tooling and automation). 

    The playbook isn’t just for tech giants. Any organization—whether you’re securing 20 cloud services or 20,000—can adopt the principles of security durability 

    Because in today’s cyberthreat landscape, fixing isn’t enough.  

    Secure Future Initiative

    A new world of security.

    Learn more with Microsoft Security

    To see an example of the Microsoft Durability Strategy in action, read this case study in the appendix below. Learn more about the Microsoft Security Future Initiative and our Secure by Default principle.  

    ​​To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (Microsoft Security) and X (@MSFTSecurity) for the latest news and updates on cybersecurity. 


    Appendix: 

    Security Durability Case Study 

    Eliminating pinned certificates: A durable fix for secret hygiene in MSA apps 

    SFI Reference: [SFI-ID4.1.3] 
    Initiative Owner: Microsoft Account (MSA) Engineering Team 

    Overview 

    As part of the Secure Future Initiative (SFI), the Microsoft Account (MSA) team addressed a critical weakness identified through Software Security Incident Response Plans (SSIRPs): the unsafe use of pinned certificates. By eliminating this legacy pattern and embedding preventive guardrails, the MSA team set a new bar for durable secrets management and secure partner onboarding

    The challenge: Pinned certificates and hidden fragility 

    Pinned certificates were once seen as a strong trust enforcement mechanism, ensuring that only specific certificates could be used to establish connections. However, they became a security and operational liability

    • Difficult to rotate: If a pinned certificate expired or was compromised, coordinating a fast and seamless replacement across services was challenging. 
    • Onboarding risk: New services had no safe, scalable path to onboard without replicating this fragile pattern. 
    • Lack of durability: Without controls, the risk of regression and repeated misuse remained high. 

    The durable fix: Secure by default and enforced by design 

    The MSA team implemented a durability-first solution grounded in engineering enforcement and operational pragmatism: 

    Strategy  Action 
    Code-Level Blocking  All code paths accepting pinned certificates were hardened to prevent adoption. 
    Temporary Allow Lists  Existing apps using pinned certificates were allow-listed to prevent immediate outages. 
    Default Deny Posture  New apps are automatically blocked from using pinned certificates, enforcing secure defaults. 

    This “fix-once, fix-forever” approach ensures the issue doesn’t resurface—even as new partners onboard or systems evolve. 

    Sustained impact and lifecycle integration 

    To maintain progress and ensure no regression, the MSA team aligned remediation with each partner’s SFI KPI milestones. Services were removed from the allow list only after completing their transition, closing the loop with full compliance and operational readiness

    This work reinforced several Security Durability pillars: 

    • Preventive guardrails 
    • Owner-enforced controls 
    • Security built into the engineering lifecycle 

    Lessons and model for the future 

    This case is a model for how Microsoft is shifting from reactive security work to systemic, enforceable, and scalable durability models. Rather than patching the same issue repeatedly, the MSA team eliminated the root cause, protected the ecosystem, and created a repeatable blueprint for other risky cryptographic practices. 

    Key takeaways 

    • Eliminating pinned certificates reduced fragility and boosted long-term resilience. 
    • Durable controls were enforced via code, not just process. 
    • Gradual deprecation through partner alignment ensured no disruption. 
    • This sets a precedent for eliminating insecure patterns across Microsoft platforms. 

    MIL OSI Economics

  • MIL-OSI Canada: End of lockdown and search at Dorchester Penitentiary – Medium security unit

    Source: Government of Canada News (2)

    June 26, 2025 – Dorchester, New Brunswick – Correctional Service Canada

    The lockdown put in place at the medium security unit at Dorchester Penitentiary on June 9, 2025, has ended and the exceptional search has been completed. The institution has resumed its normal operations and visits have resumed.

    During the exceptional search, contraband and unauthorized items were found.

    The Correctional Service of Canada (CSC) is strengthening measures to prevent the entry of contraband into its institutions in order to ensure a safe and secure environment for everyone. CSC also works in partnership with the police to take action against those who attempt to have contraband brought into correctional institutions.

    -30-

    MIL OSI Canada News

  • MIL-OSI USA: Tonko Demands Trump Withdraw Executive Order Attacking Public Science

    Source: United States House of Representatives – Representative Paul Tonko (Capital Region New York)

    WASHINGTON, D.C. — Congressman Paul D. Tonko led more than 20 members in the House in a letter today calling President Trump to withdraw his Executive Order, Restoring Gold Standard Science. The lawmakers call out the hypocrisy of Trump’s claim to boost scientific standards while slashing federal science programs, attacking scientists and experts, and eroding trust in public science.

    “Your administration has proposed slashing the National Institutes of Health budget by nearly 40%, removed and altered essential technical resources targeted diversity, equity, and inclusion (DEI) initiatives that strengthen the rigor and reach of American science, and cast entire disciplines including climate science, public health, and gender equity, as invalid,” the letter reads. “This order continues that pattern, masking efforts to assert political control over science under the guise of accountability.

     

    “If your administration were genuinely committed to trustworthy, reproducible science, you would begin by adequately funding it. This Executive Order is not a return to “gold standard” science. It is a hollow public relations stunt from an administration that has repeatedly weakened America’s scientific credibility and further eroded trust in evidence-based policymaking. We urge you to withdraw this order and instead support policies that meaningfully uphold the independence, integrity, and funding of American science — not just in rhetoric, but in practice.”

     

    Tonko has long been a champion and advocate for protecting scientific standards and protecting independent science. He is the author of the Scientific Integrity Actbipartisan legislation that sets clear, enforceable standards for federal agencies and federally-funded research to prevent meddling in public science by political and special interests.
    A fact sheet of the Scientific Integrity Act can be found HERE.     
    The full letter can be read HERE and below:
    The Honorable Donald J. Trump 
    President
    The White House
    1600 Pennsylvania Avenue NW
    Washington, DC 20500. 
    Dear President Trump:
    We write to express profound concern with your recent Executive Order, Restoring Gold Standard Science. While the principles of transparency, integrity, and reliability this order claims to champion are indeed crucial to good science, it is difficult to take a call for scientific integrity seriously from an administration that has consistently undermined the very foundations of the U.S. research enterprise. This Executive Order does not restore high scientific standards; it cloaks political interference in the language of pro-science reform.
    Your administration has proposed slashing the National Institutes of Health budget by nearly 40%, removed and altered essential technical resources, targeted diversity, equity, and inclusion (DEI) initiatives that strengthen the rigor and reach of American science, and cast entire disciplines including climate science, public health, and gender equity, as invalid. This order continues that pattern, masking efforts to assert political control over science under the guise of accountability.
    One of the most concerning elements of the order is the requirement that agencies publicly release all “data, analyses, and conclusions” underpinning major policies. While transparency is a fundamental scientific value, this language closely mirrors the flawed Strengthening Transparency in Regulatory Science rule from your first term, a rule that sought to exclude essential studies from Environmental Protection Agency policymaking unless raw data, including sensitive medical information, was made public. Such an approach does not enhance scientific integrity; it undermines it, while also weakening public health protections.
    Even more alarming is the provision granting political appointees sweeping power over the interpretation, use, and communication of federal scientific research. By authorizing senior political staff to investigate alleged violations, impose disciplinary action, and unilaterally “correct” scientific outputs, the order invites ideological enforcement and suppresses dissent. That is not scientific integrity — it is its undoing.
    True scientific integrity means protecting the independence of science from external manipulation. That’s why the Biden administration required federal agencies to update and strengthen their scientific integrity policies, creating a government-wide framework to safeguard objectivity and shield science from undue influence. Your Executive Order seeks to dismantle that progress. By rolling back policies to 2021 standards, it strips scientists of strong institutional protections and leaves agencies without real accountability.
    If your administration were genuinely committed to trustworthy, reproducible science, you would begin by adequately funding it. The so-called replication crisis is not rooted in malicious intent, it is the result of systemic underinvestment and perverse incentives. Researchers, especially those early in their careers, face precarious employment, low pay, and pressure to prioritize novelty over rigor. Yet your Executive Order ignores these structural issues entirely. Instead, it doubles down on austerity, depriving scientists of the time, resources, and institutional support they need to do robust and verifiable research.
    You claim scientists are afraid to ask, “inconvenient questions.” But it is your administration’s policies, proposed funding and personnel cuts, and dismissal of widely accepted peer-reviewed science that have created a chilling effect. You are cultivating an environment where researchers fear professional retaliation or public vilification for producing evidence that challenges political narratives. That is the very definition of politicizing science.

    Moreover, if you were truly concerned about protecting science from corporate influence, you would be increasing public investment in research to guard against private sector capture. Pulling federal support doesn’t reduce the sway of Big Pharma or Big Ag, it strengthens their influence, allowing profit-driven interests to dictate research priorities at the expense of the public good.

    Buzzwords like “transparency” and “interdisciplinary research” cannot substitute for real commitment to the scientific enterprise. Genuine scientific progress demands sustained investment in people, infrastructure, and the freedom to follow the evidence wherever it leads, without censorship, coercion, or fear. Yet your administration has steadily dismantled the conditions necessary for such progress to flourish.
    This Executive Order is not a return to “gold standard” science. It is a hollow public relations stunt from an administration that has repeatedly weakened America’s scientific credibility and further eroded trust in evidence-based policymaking.

    I urge you to withdraw this order and instead support policies that meaningfully uphold the independence, integrity, and funding of American science — not just in rhetoric, but in practice.

    MIL OSI USA News

  • MIL-OSI USA: Second Owner of Fuel Truck Supply Company Incarcerated for Bid Rigging, Market Allocation, and Wire Fraud Conspiracies

    Source: US Justice – Antitrust Division

    Headline: Second Owner of Fuel Truck Supply Company Incarcerated for Bid Rigging, Market Allocation, and Wire Fraud Conspiracies

    The owner of a fuel truck supply company, Kris Bird, 62, was sentenced today in Boise, Idaho, to three months in prison and a $24,000 fine for his role in schemes to rig bids, allocate territories, and commit wire fraud over an eight-year period. Further, Bird was ordered to forfeit to the federal government $1,542,387 as proceeds of his wire fraud offenses. The conspiracies Bird participated in related to contracts to provide fuel trucks that assist the U.S. Forest Service’s efforts to battle wildfires in Idaho and the mountain west.

    MIL OSI USA News

  • MIL-OSI USA: ICYMI: Court Will Allow California to Obtain Evidence Regarding Deployment of Federalized National Guard and Marines in California

    Source: US State of California

    Thursday, June 26, 2025

    Contact: (916) 210-6000, agpressoffice@doj.ca.gov

    Case challenging Trump Administration’s unlawful deployment of federalized National Guard and Marines in California moves forward 

    OAKLAND – California Attorney General Rob Bonta today responded to the U.S. District Court for the Northern District of California’s order last night in California’s lawsuit challenging President Donald Trump and Defense Secretary Pete Hegseth’s unlawful federalization of the California National Guard and deployment of federalized National Guard troops and Marines for civilian law enforcement in Los Angeles. The court’s order (1) grants the state’s request for expedited discovery as to potential Posse Comitatus Act violations; and (2) denies the federal government’s request to transfer the case to the Central District of California. 

    “President Trump continues to needlessly – and unlawfully – pull California National Guard servicemembers off of counterdrug taskforces and wildfire crews for the singular purpose of furthering his political agenda,” said Attorney General Bonta. “As he has done time and again, President Trump is choosing the path that makes our communities less safe instead of more. We need to know more about what the troops’ orders are and how they are being deployed in Los Angeles communities. The court’s order allows us to gather those facts and continue to make our case in court. We will not let the President’s unprecedented overreach of executive authority go unchecked.”

    A copy of the court’s order is available here. 

    # # #

    MIL OSI USA News

  • MIL-OSI Security: Second Owner of Fuel Truck Supply Company Incarcerated for Bid Rigging, Market Allocation, and Wire Fraud Conspiracies

    Source: United States Attorneys General

    The owner of a fuel truck supply company, Kris Bird, 62, was sentenced today in Boise, Idaho, to three months in prison and a $24,000 fine for his role in schemes to rig bids, allocate territories, and commit wire fraud over an eight-year period. Further, Bird was ordered to forfeit to the federal government $1,542,387 as proceeds of his wire fraud offenses. The conspiracies Bird participated in related to contracts to provide fuel trucks that assist the U.S. Forest Service’s efforts to battle wildfires in Idaho and the mountain west.

    Bird pleaded guilty in March 2025 — two weeks before his trial was set to begin — to the seven-count indictment. The plea followed an investigation that involved evidence from a judicially authorized wiretap and led to charges against two executives in December 2023. Earlier this month on June 5, Bird’s co-defendant, Ike Tomlinson, 61, was sentenced to 12 months in prison and a $20,000 fine for his leadership role in the criminal conduct.

    “Mr. Bird stole taxpayer funds allocated for critical wildfire-fighting efforts protecting the American people to line his own pockets,” said Assistant Attorney General Abigail Slater of the Justice Department’s Antitrust Division. “The Trump Antitrust Division’s Procurement Collusion Strike Force and its law enforcement partners will continue the fight to ensure that the fraudulent use of taxpayer money results in incarceration.”

    “Today’s sentencing underscores the FBI’s commitment to protecting the integrity of our markets,” said Assistant Director Jose A. Perez of the FBI Criminal Investigative Division. “Antitrust violations are not just corporate misconduct, they’re federal crimes that distort competition, drive up costs for consumers and erode public trust. We will continue to work with our law enforcement and regulatory partners to hold accountable those who rig the system for personal gain.”

    “Bid rigging is not a victimless crime. It cheats taxpayers and the honest contractors who play by the rules,” said Assistant Inspector General for Investigations Jason Suffredini of the General Services Administration (GSA) Office of Inspector General (OIG). “GSA OIG and our partners remain committed to pursuing those who engage in procurement fraud.”

    According to court documents, the co-conspirators coordinated their bids to inflate prices and to determine who would have priority to receive business from the U.S. Forest Service and other federal agencies in the event of a wildfire in a specific geographic area. The co-conspirators further coordinated to exclude and punish potential competitors to further maintain the success of their conspiracy. During the conspiracies, from March 2015 to March 2023, Bird annually submitted false SAM certifications to the federal government covering up his bid-rigging conspiracy and committing wire fraud. 

    The Antitrust Division’s San Francisco Office, U.S. Attorney’s Office for the District of Idaho, FBI Salt Lake City Field Office, Boise Resident Agency, and General Services Administration Office of Inspector General investigated the case. Assistant Chief Christopher J. Carlberg and Trial Attorneys Elena A. Goldstein, Daniel B. Twomey, and Matthew Chou of the Antitrust Division’s San Francisco Office, and Assistant U.S. Attorney Sean M. Mazorol for the District of Idaho have been prosecuting the case.

    In addition to today’s criminal sentence, in May 2025, the United States, on behalf of the U.S. Forest Service, U.S. Bureau of Land Management, and the U.S. Small Business Administration, entered into a civil settlement with Kris Bird and other related entities and individuals who agreed to pay $781,186 to resolve civil claims after admitting to allegations that they obtained government contracts through bid-rigging and the submission of false SAM Certifications, as well as wrongly obtained a Paycheck Protection Program loan.

    The U.S. Attorney’s Office for the District of Idaho and the U.S. Department of Agriculture Office of Inspector General investigated the civil case. Assistant United States Attorney Robert B. Firpo and Civil Chief James Schaefer are handling the case.

    In November 2019, the Justice Department created the Procurement Collusion Strike Force (PCSF), a joint law enforcement effort to combat antitrust crimes and related fraudulent schemes that impact government procurement, grant and program funding at all levels of government—federal, state and local. To learn more about the PCSF, or to report information on bid rigging, price fixing, market allocation and other anticompetitive conduct related to government spending, go to www.justice.gov/procurement-collusion-strike-force. Anyone with information in connection with this investigation can contact the PCSF at the link listed above. 

    MIL Security OSI

  • MIL-OSI Security: Second Owner of Fuel Truck Supply Company Incarcerated for Bid Rigging, Market Allocation, and Wire Fraud Conspiracies

    Source: United States Attorneys General

    The owner of a fuel truck supply company, Kris Bird, 62, was sentenced today in Boise, Idaho, to three months in prison and a $24,000 fine for his role in schemes to rig bids, allocate territories, and commit wire fraud over an eight-year period. Further, Bird was ordered to forfeit to the federal government $1,542,387 as proceeds of his wire fraud offenses. The conspiracies Bird participated in related to contracts to provide fuel trucks that assist the U.S. Forest Service’s efforts to battle wildfires in Idaho and the mountain west.

    Bird pleaded guilty in March 2025 — two weeks before his trial was set to begin — to the seven-count indictment. The plea followed an investigation that involved evidence from a judicially authorized wiretap and led to charges against two executives in December 2023. Earlier this month on June 5, Bird’s co-defendant, Ike Tomlinson, 61, was sentenced to 12 months in prison and a $20,000 fine for his leadership role in the criminal conduct.

    “Mr. Bird stole taxpayer funds allocated for critical wildfire-fighting efforts protecting the American people to line his own pockets,” said Assistant Attorney General Abigail Slater of the Justice Department’s Antitrust Division. “The Trump Antitrust Division’s Procurement Collusion Strike Force and its law enforcement partners will continue the fight to ensure that the fraudulent use of taxpayer money results in incarceration.”

    “Today’s sentencing underscores the FBI’s commitment to protecting the integrity of our markets,” said Assistant Director Jose A. Perez of the FBI Criminal Investigative Division. “Antitrust violations are not just corporate misconduct, they’re federal crimes that distort competition, drive up costs for consumers and erode public trust. We will continue to work with our law enforcement and regulatory partners to hold accountable those who rig the system for personal gain.”

    “Bid rigging is not a victimless crime. It cheats taxpayers and the honest contractors who play by the rules,” said Assistant Inspector General for Investigations Jason Suffredini of the General Services Administration (GSA) Office of Inspector General (OIG). “GSA OIG and our partners remain committed to pursuing those who engage in procurement fraud.”

    According to court documents, the co-conspirators coordinated their bids to inflate prices and to determine who would have priority to receive business from the U.S. Forest Service and other federal agencies in the event of a wildfire in a specific geographic area. The co-conspirators further coordinated to exclude and punish potential competitors to further maintain the success of their conspiracy. During the conspiracies, from March 2015 to March 2023, Bird annually submitted false SAM certifications to the federal government covering up his bid-rigging conspiracy and committing wire fraud. 

    The Antitrust Division’s San Francisco Office, U.S. Attorney’s Office for the District of Idaho, FBI Salt Lake City Field Office, Boise Resident Agency, and General Services Administration Office of Inspector General investigated the case. Assistant Chief Christopher J. Carlberg and Trial Attorneys Elena A. Goldstein, Daniel B. Twomey, and Matthew Chou of the Antitrust Division’s San Francisco Office, and Assistant U.S. Attorney Sean M. Mazorol for the District of Idaho have been prosecuting the case.

    In addition to today’s criminal sentence, in May 2025, the United States, on behalf of the U.S. Forest Service, U.S. Bureau of Land Management, and the U.S. Small Business Administration, entered into a civil settlement with Kris Bird and other related entities and individuals who agreed to pay $781,186 to resolve civil claims after admitting to allegations that they obtained government contracts through bid-rigging and the submission of false SAM Certifications, as well as wrongly obtained a Paycheck Protection Program loan.

    The U.S. Attorney’s Office for the District of Idaho and the U.S. Department of Agriculture Office of Inspector General investigated the civil case. Assistant United States Attorney Robert B. Firpo and Civil Chief James Schaefer are handling the case.

    In November 2019, the Justice Department created the Procurement Collusion Strike Force (PCSF), a joint law enforcement effort to combat antitrust crimes and related fraudulent schemes that impact government procurement, grant and program funding at all levels of government—federal, state and local. To learn more about the PCSF, or to report information on bid rigging, price fixing, market allocation and other anticompetitive conduct related to government spending, go to www.justice.gov/procurement-collusion-strike-force. Anyone with information in connection with this investigation can contact the PCSF at the link listed above. 

    MIL Security OSI