Category: Middle East

  • MIL-OSI USA: House Foreign Affairs Committee Ranking Member Meeks, Himes, Smith Statement on Unacceptable Cancellation of Middle East Briefing

    Source: United States House of Representatives – Congressman Gregory W Meeks (5th District of New York)

    Washington, D.C. – Representatives Gregory W. Meeks, Ranking Member of the House Foreign Affairs Committee, Jim Himes, Ranking Member of the House Permanent Select Committee on Intelligence, and Adam Smith, Ranking Member of the House Armed Services Committee, today released the following statement regarding the Trump administration’s decision to cancel a classified Member briefing on recent military action in the Middle East. 

    “As the administration has pursued a chaotic and unauthorized policy in the Middle East, it has failed to perform the basic function of informing the Congress—the Article I branch charged with the Constitutional power to authorize force—by canceling a classified briefing on the U.S. military strikes in Iran that was several days overdue. This is unacceptable. We can only speculate as to why the administration canceled the briefing, but it certainly appears as though they’re afraid to answer questions about their policies and the president’s unverified claims that the strikes obliterated Iran’s nuclear program. The administration must be forthcoming in terms of what was accomplished by the unauthorized strikes and how much of Iran’s nuclear program has been impacted. These are the questions the White House does not want to answer because to do so honestly would likely not align with President Trump’s declarations of victory. 

    “The administration must hold the classified briefing this week, in accordance with the obligations that the Executive branch has to keep the Legislative branch informed.” 

    MIL OSI USA News

  • MIL-OSI: Prospectus Approved for Listing of DNO’s USD 600 Million Bonds on Oslo Stock Exchange

    Source: GlobeNewswire (MIL-OSI)

    Oslo, 1 July 2025 – DNO ASA, the Norwegian oil and gas operator, today announced that the Financial Supervisory Authority of Norway on 1 July 2025 approved the prospectus prepared in connection with the listing on the Oslo Stock Exchange of the Company’s 8.5 percent USD 600 million senior unsecured callable bonds issued on 27 March 2025 with maturity in March 2030 (ISIN: NO0013511113). Trading in the bonds is expected to commence shortly.

    The prospectus dated 1 July 2025 is available on the Company’s website www.dno.no.

    For further information, please contact:
    Media: media@dno.no
    Investors: investor.relations@dno.no

    DNO ASA is a Norwegian oil and gas operator active in the Middle East, the North Sea and West Africa. Founded in 1971 and listed on the Oslo Stock Exchange, the Company holds stakes in onshore and offshore licenses at various stages of exploration, development and production in the Kurdistan region of Iraq, Norway, the United Kingdom, Côte d’Ivoire and Yemen. More information is available at www.dno.no.

    This information is subject to the disclosure requirements pursuant to section 5-12 of the Norwegian Securities Trading Act.

    This release does not constitute any offer or solicitation to sell or purchase any securities. 

    The release may not be released, published or distributed in the United States of America or any other jurisdiction where release, publication or distribution would be prohibited or require any registration or filing acts or similar.

    The MIL Network

  • MIL-OSI Africa: State of Qatar Renews Firm Commitment to UN Charter

    Source: Government of Qatar

    New York, July 01

    The State of Qatar renewed its firm commitment to the spirit and letter of the United Nations Charter, affirming its commitment to the UN continuing its role as a forum for dialogue and unity in the contemporary world.

    This came in a statement delivered by HE Permanent Representative of the State of Qatar to the United Nations Sheikha Alya Ahmed bin Saif Al-Thani before the meeting held by the UN General Assembly on the occasion of the 80th anniversary of the signing of the United Nations Charter, in New York.

    Her Excellency explained that the 80th anniversary of the signing of the UN Charter represents an important moment for unifying efforts to maintain international peace and security and promote economic and social progress for all people.

    HE Permanent Representative stressed that the UN’s role has become more important and urgent, as the world today faces the largest number of conflicts since 1945. Her Excellency noted that the State of Qatar has always defended the centrality of international law, the principles of the Charter, the peaceful resolution of disputes, and respect for the sovereignty and territorial integrity of states.

    MIL OSI Africa

  • MIL-OSI Africa: Minister of State for Foreign Affairs Bids Farewell to Bangladesh Ambassador

    Source: Government of Qatar

    Doha, July 01 

    HE Minister of State for Foreign Affairs Sultan bin Saad Al Muraikhi met with HE Ambassador of the People’s Republic of Bangladesh to the State of Qatar Mohammed Nazrul Islam, on the occasion of the end of his tenure in the country.

    HE Minister of State for Foreign Affairs thanked HE the Ambassador for his efforts in supporting and strengthening bilateral relations, wishing him success in his new duties. 

    MIL OSI Africa

  • MIL-OSI USA: Congressmembers Langworthy and Stefanik Introduce SAFER at the Border Act to Block Dangerous Migrants Exploiting Biden-era Loopholes

    Source: US Congressman Nick Langworthy (NY-23)

    WASHINGTON, D.C. – Congressmembers Nick Langworthy (NY-23) and Elise Stefanik (NY-21) introduced the Safeguarding Americans from Extreme Risk (SAFER) at the Border Act, legislation aimed at closing dangerous loopholes left wide open by the Biden administration and restoring strict vetting protocols to ensure extremists and criminals are kept out of the United States.

     

    “My constituents are fed up with the flood of murderers, terrorists, and dangerous individuals that poured into our communities across New York State—all because of the reckless, failed open-border policies of the Biden administration,” said Congressman Langworthy. “A nation without secure borders is a nation in decline, and it’s time we take bold, decisive action to reverse the chaos of the last four years.”

     

    He continued, “The SAFER at the Border Act answers the urgent call from Border Czar Tom Homan, who has sounded the alarm on the unprecedented number of illegal aliens who entered our country under the Biden administration from high-risk countries like Iran. This legislation is about protecting American families from threats that never should have made it onto our soil in the first place.”

     

    “The Worst Governor in America Kathy Hochul embraced and fully supported Joe Biden’s catastrophic open border policies. She has put all New Yorkers at risk by prioritizing illegals first and New Yorkers LAST with her sanctuary state policies,” Chairwoman Stefanik said. “Today, I am announcing I am co-leading the SAFER at the Border Act with Congressman Nick Langworthy to keep dangerous criminal illegals from terrorizing New York and our nation’s streets. The legislation closes loopholes that were exploited by Kathy Hochul’s failed policies and Joe Biden’s reckless abuse of immigration parole. Terrorists, transnational criminals, and dangerous foreign nationals invaded our sovereign nation under the corrupt and failed leadership of Kathy Hochul. We must put law-abiding New Yorkers first and secure our borders.”

     

    Specifically, the SAFER at The Border Act would:

     

    • Prohibit parole for high-risk aliens: The bill bars the Secretary of Homeland Security from granting immigration parole to individuals who pose national security or public safety risks—such as known terrorists, members of transnational criminal organizations, or those flagged in federal threat databases.
    • Closes loopholes for refugee parole: It prohibits parole of refugees into the United States outside of the established refugee admission process, preventing the administration from using broad parole authority to bypass standard vetting and security protocols.
    • Targets national security threats in immigration law: The bill ensures that individuals with ties to terrorism, espionage, or foreign criminal networks are flagged and blocked from entering the U.S., reinforcing existing inadmissibility standards with clear statutory guardrails.

     

    The full text of the legislation can be found here.

     

    Original cosponsors of this legislation include Reps. Michael Cloud (TX), Chuck Edwards (NC), Gabe Evans (CO), Chuck Fleischmann (TN), Michael Guest (MS), Nicole Malliotakis (NY), Andy Ogles (TN), Michael Rulli (OH), Mike Simpson (ID), Pete Stauber (NY), Elise Stefanik (NY), Scott DesJarlais (TN), and Claudia Tenney (NY).

     

    The SAFER at The Border Act is supported by the Immigration Accountability Project, Federation for American Immigration Reform (FAIR), and America First Policy Institute (AFPI).

     

    While the country is no longer facing the mass release of illegal aliens into the country under the guise of ‘humanitarian parole’, Congress must act to prevent this kind of abuse from happening again. In light of reports that the Biden Administration released suspected terrorists into the interior during the border crisis, Congress must change the law so that no known or suspected terrorists can ever be granted humanitarian parole. The SAFER at the Border Act prioritizes safeguarding American communities by prohibiting parole for individuals deemed dangerous, including those associated with espionage, sabotage, terrorism, or serious criminal activities. The Immigration Accountability Project applauds Senator Daines and Congressman Langworthy for this effort to help bring sanity and security back to the immigration system,”saidGrant Newman, Director of Government Relations, Immigration Accountability Project.

     

    “For the last four years, suspected terrorists were encountered at our borders in record numbers and special interest aliens flooded into the country, putting the interests of illegal aliens over protecting our national security. As a result of the Biden Administration’s catch-and-release policies and abuse of parole, dangerous aliens were more likely than ever before to slip through the cracks. Limiting the DHS Secretary from paroling aliens designated as terrorists, suspected terrorists, or special interest aliens is a commonsense step. FAIR is proud to support this crucial bill to help ensure the safety of American citizens and protect against the abuse of our immigration laws,”said Joe Chatham, Director of Government Relations, FAIR.

     

    “Border security is national security, and our open southern border has significantly increased our Nation’s vulnerability to terrorist attacks. An unprecedented number of terrorists, special interest aliens, and cartel members have exploited the Biden Administration’s failed border strategy and been released into American communities. We must reverse course from these disastrous policies, secure our border, and stop these national security and public safety threats from entering our Nation. The Safeguarding Americans from Extremist Risk (SAFER) at the Border Act empowers the Department of Homeland Security to protect American families,” said Chad Wolf, former acting Secretary of the Department of Homeland Security and Executive Director of the America First Policy Institute.

     

    Read the exclusive here.

      

    ###

    MIL OSI USA News

  • MIL-OSI: Little Pepe Surpasses $3,000,000 Presale Milestone, Ignites Hype Across EVM Layer 2 Meme Space

    Source: GlobeNewswire (MIL-OSI)

    DUBAI, United Arab Emirates, July 01, 2025 (GLOBE NEWSWIRE) — Viral meme token LILPEPE has already raised over $3 million and is currently in its 4th presale stage, priced at just $0.0013. It’s shaking up the EVM Layer 2 space by merging meme culture with serious blockchain utility—offering lightning-fast transactions, ultra-low fees, and full Ethereum compatibility through the Little Pepe Chain. This innovative blend of virality and infrastructure positions $LILPEPE as a standout project in the next generation of meme space.

    Little Pepe: A New Era of Meme Token Beyond the Hype

    Meme coins have long been viewed as novelty acts—fun, speculative assets with little intrinsic value. But times are changing, and Little Pepe is leading that transformation. Designed from the ground up as a high-speed, low-cost Layer 2 blockchain, the Little Pepe sets a new technical standard while embracing the energy and virality of meme culture.

    Where most meme coins rely solely on community-driven momentum, Little Pepe fuses utility and scalability, making $LILPEPE a token with a real role to play. Built as an ERC-20 token on the Little Pepe, $LILPEPE is more than just a meme fun—it’s the token of a growing ecosystem.

    EVM-Compatible Layer 2: Speed Meets Scalability

    The Layer 2 ecosystem has gained major traction in recent years, especially as Ethereum continues to face scalability and gas fee challenges. Little Pepe addresses those concerns head-on with a network engineered for efficiency. EVM compatibility ensures seamless integration with existing Ethereum-based dApps and wallets, making it easy for developers and users alike to migrate or interact without friction.

    This design choice positions the Little Pepe not just as another Layer 2 solution, but as a meme-powered blockchain that doesn’t sacrifice performance. Its lightning-fast transactions and near-zero gas fees mean users can transact, play, mint, or trade without ever worrying.

    $LILPEPE Presale: Over $3 Million Raised

    $LILPEPE’s presale performance can be a strong indicator of long-term growth. Little Pepe has already crossed the $3 million mark in presale funding, currently sitting in Stage 4. This surge of capital has come from many crypto whales.

    More so, the presale is exclusively available via littlepepe.com, giving investors a chance to get in early before listing on the exchanges. With four stages already underway and a growing community behind it, the momentum is clear.

    Viral Meme Token $LILPEPE

    Timing in crypto is everything, and $LILPEPE arrives at a critical inflection point. Meme coins like PEPE, SHIB, and DOGE have shown that massive gains are possible, but also highlighted the volatility of hype-driven assets. By building real infrastructure beneath the meme, Little Pepe is aiming for something more sustainable.

    The crypto world is hungry for innovation, but also for culture—and Little Pepe provides both. Its blend of humor, decentralization, and technical performance may well mark the arrival of the next big crypto narrative: meme coins with purpose.

    Furthermore, whether you’re a meme enthusiast, a DeFi investor, or someone scouting the next big altcoin breakout, Little Pepe offers something rare in this market: a reason to believe that fun, function, and finance can coexist. With over $3 million raised, a powerful utility token, and a purpose-built Layer 2 chain, $LILPEPE may be early—but it’s already unstoppable.

    About Little Pepe

    Little Pepe is a next-gen Layer 2 blockchain designed to merge meme culture with high-speed, low-cost decentralized infrastructure. Built for scalability, security, and accessibility, Little Pepe supports EVM-compatible applications and is powered by means of the $LILPEPE token. The project’s mission is to create a meme coin environment wherein utility meets virality, empowering users through cutting-edge technology and lightning-fast transactions.

    For more information:
    Website: https://littlepepe.com/
    Telegram: https://t.me/littlepepetoken
    Twitter: https://x.com/littlepepetoken

    Contact Details:
    COO-James Stephen
    media@littlepepe.com

    Disclaimer: This content is provided by Little Pepe. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice. Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed. Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. GlobeNewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/4cbb184f-d963-4852-a67a-486c5bb4b5bb

    The MIL Network

  • MIL-OSI Video: Secretary-General/Financing for Development & other topics – Daily Press Briefing | United Nations

    Source: United Nations (video statements)

    Noon Briefing by Stéphane Dujarric, Spokesperson for the Secretary-General.

    ———————————

    Highlights:
    Secretary-General / Financing for Development
    Deputy Secretary-General
    Occupied Palestinian Territory
    Syria
    Humanitarian Syria
    Sudan
    Sudan Humanitarian
    Democratic Republic of the Congo
    Haiti
    Briefing
    ———————————
    SECRETARY-GENERAL/ FINANCING FOR DEVELOPMENT
    This morning, in Sevilla, Spain, the Secretary-General had a closed meeting with the Heads of the Multilateral Development Banks (MDBs). He then had a bilateral meeting with Juan Manuel Moreno Bonilla, President of the regional government of Andalusia and the First Vice-President of the European Committee of the Regions.
    The Secretary-General left Sevilla in the afternoon. We expect to announce his next travel in the coming days.

    DEPUTY SECRETARY-GENERAL
    The Deputy Secretary-General, Amina Mohammed, was also present at the Fourth International Conference on Financing for Development (FFD4) in Sevilla, where she delivered remarks at the High-Level session of the International Business Forum. She called for a shift from international assistance to investments in sustainable development and underscored the private sector’s role in delivering impact at scale.
    She also participated in a G20-Spain high-level special event on debt sustainability in developing countries alongside Prime Minister Pedro Sanchez, and she highlighted the need to break the cycle of debt and welcomed the growing attention from policymakers.
    This evening, she will travel to Vienna to address the 68th session of the Committee on the Peaceful Uses of Outer Space, organized by the United Nations Office for Outer Space Affairs (UNOOSA).
    During her time, there she will meet with Member States, senior government officials and the UN system. She will then return to Seville on Thursday for the closing of FFD4.

    OCCUPIED PALESTINIAN TERRITORY
    Turning to the situation in the Gaza Strip, the Israeli military operations have further intensified in northern Gaza since the issuance of the displacement order on Sunday by the Israeli authorities. In the time since that directive was announced, our partners on the ground say that at least 1,500 families have been displaced from North Gaza, as well as eastern parts of Gaza governorate, towards the central and western parts of Gaza governorate.
    Over the past 48 hours, five school buildings sheltering displaced families in North Gaza were reportedly hit, with deaths and injuries reported. Initial assessments by partners indicate that many families who fled from the schools that were hit have returned to North Gaza, largely due to the lack of alternatives and limited shelter space elsewhere.
    Healthcare also continues to come under attack. The World Health Organization says that in central Gaza yesterday, a tent sheltering displaced people in the courtyard of Al-Aqsa Hospital in Deir al Balah was reportedly hit, injuring five people. The agency added that the hospital’s internal medicine department also sustained some damage, and its oxygen supply line was affected.
    Since October 2023, WHO has documented 734 attacks on healthcare in Gaza. WHO reiterated its call for the protection of civilians and healthcare facilities. OCHA reiterates that under international humanitarian law, civilians and civilian infrastructure must be protected, not targeted.
    Regarding aid operations on the ground, OCHA tells us that movement restrictions remain a major challenge, preventing partners from predictably and sustainably providing critical services and assistance.

    Full Highlights:
    https://www.un.org/sg/en/content/ossg/noon-briefing-highlight?date%5Bvalue%5D%5Bdate%5D=01+July+2025

    https://www.youtube.com/watch?v=kggmKeR7k-k

    MIL OSI Video

  • MIL-OSI Video: Secretary-General/Financing for Development & other topics – Daily Press Briefing | United Nations

    Source: United Nations (video statements)

    Noon Briefing by Stéphane Dujarric, Spokesperson for the Secretary-General.

    ———————————

    Highlights:
    Secretary-General / Financing for Development
    Deputy Secretary-General
    Occupied Palestinian Territory
    Syria
    Humanitarian Syria
    Sudan
    Sudan Humanitarian
    Democratic Republic of the Congo
    Haiti
    Briefing
    ———————————
    SECRETARY-GENERAL/ FINANCING FOR DEVELOPMENT
    This morning, in Sevilla, Spain, the Secretary-General had a closed meeting with the Heads of the Multilateral Development Banks (MDBs). He then had a bilateral meeting with Juan Manuel Moreno Bonilla, President of the regional government of Andalusia and the First Vice-President of the European Committee of the Regions.
    The Secretary-General left Sevilla in the afternoon. We expect to announce his next travel in the coming days.

    DEPUTY SECRETARY-GENERAL
    The Deputy Secretary-General, Amina Mohammed, was also present at the Fourth International Conference on Financing for Development (FFD4) in Sevilla, where she delivered remarks at the High-Level session of the International Business Forum. She called for a shift from international assistance to investments in sustainable development and underscored the private sector’s role in delivering impact at scale.
    She also participated in a G20-Spain high-level special event on debt sustainability in developing countries alongside Prime Minister Pedro Sanchez, and she highlighted the need to break the cycle of debt and welcomed the growing attention from policymakers.
    This evening, she will travel to Vienna to address the 68th session of the Committee on the Peaceful Uses of Outer Space, organized by the United Nations Office for Outer Space Affairs (UNOOSA).
    During her time, there she will meet with Member States, senior government officials and the UN system. She will then return to Seville on Thursday for the closing of FFD4.

    OCCUPIED PALESTINIAN TERRITORY
    Turning to the situation in the Gaza Strip, the Israeli military operations have further intensified in northern Gaza since the issuance of the displacement order on Sunday by the Israeli authorities. In the time since that directive was announced, our partners on the ground say that at least 1,500 families have been displaced from North Gaza, as well as eastern parts of Gaza governorate, towards the central and western parts of Gaza governorate.
    Over the past 48 hours, five school buildings sheltering displaced families in North Gaza were reportedly hit, with deaths and injuries reported. Initial assessments by partners indicate that many families who fled from the schools that were hit have returned to North Gaza, largely due to the lack of alternatives and limited shelter space elsewhere.
    Healthcare also continues to come under attack. The World Health Organization says that in central Gaza yesterday, a tent sheltering displaced people in the courtyard of Al-Aqsa Hospital in Deir al Balah was reportedly hit, injuring five people. The agency added that the hospital’s internal medicine department also sustained some damage, and its oxygen supply line was affected.
    Since October 2023, WHO has documented 734 attacks on healthcare in Gaza. WHO reiterated its call for the protection of civilians and healthcare facilities. OCHA reiterates that under international humanitarian law, civilians and civilian infrastructure must be protected, not targeted.
    Regarding aid operations on the ground, OCHA tells us that movement restrictions remain a major challenge, preventing partners from predictably and sustainably providing critical services and assistance.

    Full Highlights:
    https://www.un.org/sg/en/content/ossg/noon-briefing-highlight?date%5Bvalue%5D%5Bdate%5D=01+July+2025

    https://www.youtube.com/watch?v=kggmKeR7k-k

    MIL OSI Video

  • MIL-OSI Security: Chicago Man Convicted of Conspiring to Provide Material Support to Foreign Terrorist Organization

    Source: US FBI

    CHICAGO — A Chicago man was convicted in federal court today of conspiring to provide material support to the Islamic State of Iraq and al-Sham (ISIS) by using social media to encourage attacks on ISIS’s enemies and recruit new ISIS members.

    ASHRAF AL SAFOO was a leader of Khattab Media Foundation, a sophisticated online organization that swore allegiance to ISIS and created and disseminated threats and ISIS propaganda on social media and other online platforms.  Al Safoo and other members of Khattab created and posted pro-ISIS videos, articles, essays, and infographics at the direction of, and in coordination with, ISIS.  Much of Khattab’s propaganda promoted violent jihad on behalf of ISIS, which has been designated by the United States government as a foreign terrorist organization.  In one posting, Al Safoo encouraged Khattab members to post pro-ISIS information “to cause confusion and spread terror within the hearts of those who disbelieved.”  In another posting, Al Safoo wrote, “Work hard, brothers, edit the issue into short clips, take the pictures out of it and publish the efforts of your brothers in the pages of the apostates.  Participate in the war, and spread terror, the [Islamic] State does not want you to watch it only, rather, it incites you, and if you are unable to, use it to incite others.”

    Many of Khattab’s postings included images of violence, celebrations of terrorist attacks and mass shootings in the United States, and encouragement for “lone wolf” attacks in western countries.

    Al Safoo, 41, was arrested in Chicago in 2018.  After a bench trial in U.S. District Court in Chicago in 2025, U.S. District Judge John Robert Blakey today announced his verdicts, finding Al Safoo guilty of one count of conspiracy to provide material support to a foreign terrorist organization, one count of conspiracy to transmit threats in interstate commerce, one count of conspiracy to intentionally access a protected computer without authorization, four counts of intentionally accessing a protected computer without authorization, and four counts of providing material support to a foreign terrorist organization.

    The convictions carry a maximum sentence of 130 years in federal prison.  Judge Blakey set sentencing for Oct. 9, 2025.

    The convictions were announced by Andrew S. Boutros, United States Attorney for the Northern District of Illinois, John A. Eisenberg, Assistant Attorney General for National Security at the Department of Justice, and Douglas S. DePodesta, Special Agent-in-Charge of the Chicago Field Office of the FBI.  The government is represented by Assistant U.S. Attorneys Melody Wells, Barry Jonas, and Thomas P. Peabody of the Northern District of Illinois, and Trial Attorney Andrew J. Dixon of the National Security Division’s Counterterrorism Section.

    “Today’s conviction demonstrates that the safety and security of the American public is always a top priority for me and my entire Office,” said U.S. Attorney Boutros.  “The prosecution of Ashraf Al Safoo is a testament to the vigilance and dedication of our prosecutors and law enforcement partners who stand watch to disrupt and prevent dangerous threats before they materialize.  We will vigorously pursue and bring to justice those who provide material support–in whatever form–to terrorist organizations.”

    “The conviction of Al Safoo affirms the FBI’s strong commitment to protecting and defending the United States from anyone who seeks to harm our citizens,” said FBI Chicago SAC DePodesta.  “Those who willingly associate with terrorist organizations or support violent extremism will be investigated, disrupted, and held accountable.  It is thanks to the FBI Chicago Joint Terrorism Task Force and its partner agencies that our community is safe from those who pose a fundamental threat to our nation.”

    MIL Security OSI

  • MIL-OSI: Banco Santander Chile: Second Quarter 2025 Analyst and Investor Webcast / Conference Call

    Source: GlobeNewswire (MIL-OSI)

    SANTIAGO, Chile, July 01, 2025 (GLOBE NEWSWIRE) — You are cordially invited to participate in Banco Santander Chile’s (NYSE: BSAC) conference call-webcast on Tuesday August 5, 2025, at 11.00 AM (ET time) where we will discuss 2Q 2025 financial results. The Bank’s Officers participating in the conference call are: Patricia Pérez, CFO, Cristian Vicuña, Chief Strategy Officer & Head of IR and Andrés Sansone, Chief Economist. A question and answer session will follow the presentation.

    The Management Commentary report will be published on July 31, 2025, before the market opens. The quiet period begins on July 17.

    To participate, the webcast presentation can be viewed at: https://mm.closir.com/slides?id=720987

    Or please dial in using any of the below numbers:
    United Kingdom +44 203 984 9844
    USA +1 718 866 4614
    Austria +43 720 022981
    Brazil +556120171549
    Canada +1 587 855 1318
    Chile +56228401484
    Czech Republic +420 910 880101
    Estonia +372 609 4102
    Finland +35 8753 26 4477
    France +33 1758 50 878
    Germany +49 30 25 555 323
    Hong Kong +852 3001 6551
    Mexico +52 55 1168 9973
    Peru +51 1 7060950
    Poland +48 22 124 49 59
    Russia +7 495 283 98 58
    Singapore +65 3138 6816
    South Africa +27872500455
    South Korea +82 70 4732 5006
    Sweden +46 10 551 30 20
    Turkey +90 850 390 7512
    Ukraine +380 89 324 0624

    Participant Passcode: 720987
    Please dial in approximately 10 minutes prior to the starting time of the conference.

    If you have any questions, please contact Cristian Vicuña at Banco Santander Chile at Cristian.vicuna@santander.cl, Rowena Lambert at Rowena.lambert@santander.cl or María Magdalena Rosende at Maria.rosende@santander.cl

    CONTACT INFORMATION

    Cristian Vicuña
    Investor Relations
    Banco Santander Chile
    Bandera 140, Floor 20
    Santiago, Chile
    Email: irelations@santander.cl
    Website: www.santander.cl

    Banco Santander Chile is one of the companies with the highest risk classifications in Latin America with an A2 rating from Moody’s, A- from Standard and Poor’s, A+ from Japan Credit Rating Agency, AA- from HR Ratings and A from KBRA. All our ratings as of the date of this report have a Stable Outlook.

    As of March 31, 2025, the bank had total assets of Ch$67,059,423 million (US$70,284 million), total gross loans (including those owed by banks) at amortized cost of Ch$41,098,666 million (US$43,075 million), total deposits of Ch$30,607,715 million (US$32,080 million), and bank owners’ equity of Ch$4,400,233 million (US$4,612 million). The BIS capital ratio was 16.9%, with a core capital ratio of 10.7%. As of March 31, 2025, Santander Chile employed 8,712 people and had 237 branches throughout Chile.

    The MIL Network

  • MIL-OSI Africa: Iran Egypt Foreign Ministers hold telephone conversation


    Download logo

    Seyed Abbas Araghchi, the Foreign Minister of the Islamic Republic of Iran, and Badr Abdelatty, the Foreign Minister of Egypt, held a telephone conversation on Monday, to discuss the latest regional developments following the cessation of the Zionist regime’s military aggression against Iran.

    In the conversation, Araghchi pointed to the widespread condemnation of the Zionist regime’s aggression against Iran by the international community—especially Islamic countries and key regional organizations.

    He criticized the failure of two responsible international bodies, namely the UN Security Council and the International Atomic Energy Agency, to condemn the attacks, and emphasized the Islamic Republic of Iran’s firm pursuit of identifying the aggressor and obtaining reparations.

    The Egyptian Foreign Minister welcomed the end of the Zionist regime’s aggression and stressed his country’s continued efforts to help de-escalate tensions in the region, including efforts to establish a ceasefire in Gaza.

    Distributed by APO Group on behalf of Ministry of Foreign Affairs – Islamic Republic of Iran.

    MIL OSI Africa

  • MIL-OSI Africa: The 2025 Food and Agriculture Organization of the United Nations (FAO) Awards honour organizations from Colombia, Egypt, and the Philippines for their contributions to agrifood systems transformation


    Download logo

    The Food and Agriculture Organization of the United Nations (FAO) announced the winners of the 2025 FAO Awards, recognizing organizations from Colombia, Egypt, and the Philippines, whose work has led to outstanding progress in building more efficient, inclusive, resilient and sustainable agrifood systems.

    On Monday, FAO Director-General QU Dongyu presented the Champion Award and Partnership Award during the 44th FAO Ministerial Conference held in Rome.

    “These Awards are more than an acknowledgment of achievements – they represent FAO’s core values and aspirations. The ceremony is a celebration of possibility and hope of what happens when commitment and innovation meet the urgent call to transform global agrifood systems,” he said.

    The FAO Champion Award, the Organization’s highest corporate award, which carries a prize of USD 50,000 and recognizes significant and outstanding contributions towards advancing FAO’s overall goals, was conferred to la Confederación Mesa Nacional de Pesca Artesanal de Colombia (COMENALPAC), for its tangible results across organizational, social, economic and environmental dimensions, including championing social protection measures for fishers and played a key role in drafting laws against illegal fishing, thereby improving the welfare and rights of fishing communities.

    Since 2017, COMENALPAC has represented over 800 groups of marine and freshwater fishers across Colombia. Its work has contributed to the design and implementation of key legislation, including Law 2268 of 2022, which guarantees social benefits for commercial and subsistence fishers.

    Through an FAO–COMENALPAC partnership, the organization has strengthened fisher communities in Tumaco by eliminating intermediaries, increasing incomes, and promoting inclusive market opportunities. It has also led to the restoration of 83 wetlands, contributing to aquatic biodiversity and more sustainable food systems. The organization was further praised for helping secure the legal recognition of more than 120,000 fishers and for its role in incorporating the concept of “Aquatic Agrifood Ecosystems” into Colombia’s National Development Plan.

    In addition, within the same category, a Special Mention was also awarded to Youth Uprising, a Philippine-based non-profit organization recognized for its intense engagement of young people in transforming agrifood systems.

    The FAO Partnership Award — valued at USD 10,000 and recognizing outstanding cooperation with FAO in advancing the Organization’s work by its Members — was presented to The Egyptian Food Bank (EFB), the first Egypt NGO focused on addressing food insecurity, providing support to over 24 million people through comprehensive food assistance, nutrition, and empowerment programs.

    Among the EFB’s most notable initiatives are the Community Nutrition Programme, the Ramadan Food Loss Initiative, and the Resilience Index Measurement and Analysis (RIMA). EFB’s programs have benefited over 150,000 families and more than 60,000 schoolchildren. Its work also includes capacity-building for small-scale producers and support to 1,200 farmers — particularly women — promoting sustainable agricultural practices and economic inclusion.

    The FAO Director-General bestowed the awards to representatives of the organizations who attended the ceremony in person.

    Adriana Rocío Cadena Cancino, Director of la Confederación Mesa Nacional de Pesca Artesanal de Colombia (COMENALPAC), received the Champion Award on behalf of the organization.

    Mohsen Sarhan Ali Gamal Ali, Chief Executive Officer of The Egyptian Food Bank (EFB), accepted the Partnership Award on behalf of his organization.

    “These awardees remind us that transformation is already happening and must accelerate. Let us continue working hand in hand for the transformation of global agrifood systems to be more efficient, more inclusive, more resilient and more sustainable,” Qu added in his closing remarks, with a reference to the FAO Four Betters – better production, better nutrition, a better environment and a better life, leaving no one behind.

    Distributed by APO Group on behalf of Food and Agriculture Organization (FAO).

    MIL OSI Africa

  • MIL-OSI Global: Why is Islamophobia so hard to define?

    Source: The Conversation – UK – By Julian Hargreaves, Lecturer, Department of Sociology and Criminology, City St George’s, University of London

    The UK government wants a new definition of Islamophobia and has created a working group of politicians, academics and independent experts to provide one. It aims to settle long-running political debates over the term.

    The concept of Islamophobia describes anti-Muslim and anti-Islamic prejudices and their impact on Muslim communities. The term became familiar in the UK following publication of the Runnymede Trust report, Islamophobia: A Challenge for Us All, in 1997.

    The concept is now used to discuss negative public opinion towards Muslims and Islam, biased media reporting, verbal and physical assaults and online attacks. It is also used when discussing social and economic inequalities, discrimination within various institutional settings and unfair treatment from the police and security services.

    Previous definitions have been controversial, failing to unite politicians, academics and British Muslims, and leading to charged debates over free speech.

    Some academics have argued that the word “Islamophobia” – which suggests a phobia or fear of Islam – is an inaccurate label for a prejudice which often targets skin colour, ethnicity and culture.

    Many Muslim-led organisations accept that the term is imperfect and interchangeable with others such as “anti-Muslim hatred”. However, they maintain the term “Islamophobia” is needed to focus attention on a growing problem.

    Definitions and controversy

    The 1997 Runnymede Trust report defined Islamophobia as an “unfounded hostility towards Islam”, “the practical consequences of such hostility in unfair discrimination against Muslim individuals and communities” and “the exclusion of Muslims from mainstream political and social affairs”.

    The Runnymede Trust revised its definition in a follow-up report published in 2017. The report defines Islamophobia in two ways.

    The first is “anti-Muslim racism”. A longer, second version amends the United Nation’s 1965 definition of “racial discrimination”. These revised definitions are important because they re-framed Islamophobia as a product of racist thinking rather than religious prejudices.

    Other attempts to define Islamophobia include British academic Chris Allen’s 200-word definition. Allen defined it as an ideology like racism that spreads negative views of Muslims and Islam, influencing social attitudes and leading to discrimination and violence. US political scientist Erik Bleich defined it more succinctly as “indiscriminate negative attitudes or emotions directed at Islam or Muslims”.

    In 2018, the all-party parliamentary group on British Muslims published another definition linking Islamophobia to racism. According to the APPG, “Islamophobia is rooted in racism and is a type of racism that targets expressions of Muslimness or perceived Muslimness.” The APPG called for its definition to be legally binding.

    The APPG definition was adopted by various organisations including local authorities, UK universities and the Labour party while in opposition. But it was rejected by the then Conservative government and later by the current Labour government, which argued it was seeking “a more integrated and cohesive approach”.

    This lack of consensus over previous definitions led Angela Rayner, the deputy prime minister, to announce the working group in March 2025. The group’s aim is to provide a new definition of “anti-Muslim hatred and Islamophobia” which is “reflective of a wide range of perspectives and priorities for British Muslims”.

    Former Conservative MP and attorney general Dominic Grieve was appointed to chair the group, evidence of Labour’s ambition to build consensus.

    A march in London against Islamophobia, racism and anti-migrant views.
    Shutterstock

    Some are concerned that use of the term “Islamophobia”, and particularly the APPG definition, stifles legitimate criticism of Islam. Free speech campaigners have argued that it is “blasphemy via the back door”.

    The centre-right thinktank Policy Exchange published a report claiming that the term is used in bad faith to divert attention away from serious social problems within some Muslim communities – specifically, discussion of the grooming gangs scandal.

    These debates bear resemblance to those surrounding the term “antisemitism” and the adoption of a definition proposed by the International Holocaust Memorial Alliance. The term is widely accepted, although critics have argued this specific definition stifles legitimate criticism of the Israeli state.

    A new approach

    A new definition of “Islamophobia” must balance the protection of Muslim communities and freedoms of religion, expression and assembly for all Muslims and non-Muslims in the UK. It must be clear enough for everyday use, specific enough for academic and policy research, and capable of generating support across the UK’s diverse Muslim population.

    A proposed definition by an emerging thought leader on British Islam addresses these challenges. Mamnun Khan is a writer whose work explores the social integration of Muslims in contemporary British society. Khan is associated with Equi, a thinktank which describes its work as “drawing on Muslim insight”. Other members of Equi are members of the government’s working group.

    Khan sets out three tests that a definition must pass, based on Islamic law, moral teachings within Islam and other more universal values. First, a definition must serve the public interest. Second, it must be just and balanced and preserve freedom of expression. Third, it must uphold the dignity of Muslim communities.

    For Khan, “Islamophobia, also known as anti-Muslim hatred, is an irrational fear, hostility, or prejudice toward Muslims that leads to discrimination, unequal treatment, exclusion, social and political marginalisation, or violence.”

    Khan’s definition has many good qualities. It brings together stronger elements of previous definitions – for, example, the separation of negative attitudes and outcomes – without being weakened by jargon or strong political ideology. On the other hand, some social scientists may question whether defining something as “irrational” is a matter of preference rather than academic research.

    The working group also needs to decide whether Islamophobia and anti-Muslim hatred are closely related or exactly the same. Failure to do so will cause confusion and inconsistency among those wishing to apply the term precisely. Regardless, Khan’s example is a strong step in the right direction. A better definition of Islamophobia is needed, and now within reach.

    Julian Hargreaves is an Affiliated Researcher at the Prince Alwaleed bin Talal Centre of Islamic Studies, University of Cambridge.

    ref. Why is Islamophobia so hard to define? – https://theconversation.com/why-is-islamophobia-so-hard-to-define-258522

    MIL OSI – Global Reports

  • MIL-OSI USA: Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes

    Source: US State of North Dakota

    Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers

    The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.

    According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.

    As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.

    “These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”

    “North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”

    “North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”

    Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts

    Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme. 

    “The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”

    According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).

    Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.

    IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files  containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.

    Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.

    Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.

    The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.

    Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.

    Kim Kwang Jin et al. Indictment – Northern District of Georgia

    Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.

    “The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”

    According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

    After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

    To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.

    The FBI Atlanta Field Office is investigating the case.

    Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.

    21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District

    Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.

    Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.

    ***

    The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.

    As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.

    Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.

    The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.

    The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI USA: Smuggling Leader and Top Coordinator Will Spend Remainder of Their Lives in Prison Following Their Sentencing on Third Anniversary of Deadly Tractor-Trailer Smuggling Conspiracy

    Source: US State of California

    Two convicted human smugglers were sentenced in a federal court in San Antonio today for their prominent roles in the 2022 mass casualty human smuggling conspiracy that resulted in the deaths of 47 adults and six children.

    U.S. District Judge Orlando Garcia for the Western District of Texas sentenced Orduna-Torres to life in prison and a $250,000 fine, and Gonzales-Ortega to 83 years in prison and a $250,000 fine. Both defendants were found guilty by a federal jury in March for three counts related to the transportation of aliens within the United States resulting in death, causing serious bodily injury, and placing lives in jeopardy. Following the jury’s verdict at the trial, Judge Garcia set the sentencing date, noting that it would be three years to the day from when the 53 migrants perished as a result of the defendants’ smuggling scheme.

    “These criminals will spend the rest of their lives in prison because of their cruel choice to profit off of human suffering,” said Attorney General Pamela Bondi. “Today’s sentences are a powerful message to human smugglers everywhere: we will not rest until you are behind bars.”

    “Three years to the day after these two smugglers and their co-conspirators left dozens of men, women, and children locked in a sweltering tractor-trailer to die in the Texas summer heat, they learned that they will spend the rest of their lives locked away in a federal prison,” said U.S. Attorney Justin R. Simmons for the Western District of Texas. “We recognize the justice handed down by Judge Garcia and thank our law enforcement partners for their great work that led to today’s outcome. At the same time, we reinforce the message that these criminal organizations will not place the lives of the desperate and vulnerable above their own financial enrichment. My office remains focused on prosecuting smugglers and their networks, and ultimately eradicating transnational criminal organizations.”

    “Today’s sentences are the result of a far-reaching investigation and a tireless commitment by HSI and our law enforcement partners to dismantle the deadliest human smuggling operation in U.S. history,” said Special Agent in Charge Craig Larrabee for U.S. Immigration and Customs Enforcement (ICE) Homeland Security Investigations (HSI) San Antonio. “This case serves as a stark reminder: human smuggling is not a service — it is a deadly criminal enterprise. HSI will pursue smugglers relentlessly, wherever they operate. No one, who participates in the smuggling of human beings, will escape the reach of justice.”

    According to court documents and evidence presented at trial, Felipe Orduna-Torres, also known as Cholo, Chuequito/Chuekito, and Negro, 30, was a leader and organizer, and Armando Gonzales-Ortega, also known as El Don and Don Gon, 55, was a coordinator in the human smuggling organization (HSO) which illegally brought adults and children from Guatemala, Honduras, and Mexico into the United States between December 2021 and June 2022.

    Court documents and evidence presented at the trial revealed that Orduna-Torres and Gonzales-Ortega worked in concert to transport and facilitate the transportation of the migrants, sharing routes, guides, stash houses, trucks, trailers, and transporters in order to consolidate costs, minimize risks, and maximize profit. The HSO maintained a variety of tractors and trailers for their smuggling operations, some of which were stored at a private parking lot in San Antonio.

    In the days leading up to June 27, 2022, Orduna-Torres and others exchanged the names of illegal aliens who would be smuggled in an upcoming tractor-trailer load. Gonzales-Ortega traveled to Laredo to meet the tractor-trailer, where at least 64 undocumented individuals, including eight children and one pregnant woman, were loaded for smuggling.

    Some of the defendants, including Orduna-Torres, were aware that the trailer’s reefer unit was malfunctioning and was not blowing any cool air to the migrants inside. When members of the organization met the tractor-trailer at the end of its approximately three-hour journey to San Antonio, they opened the doors to find 48 of the migrants were either already dead or had died on site, including the pregnant woman. Sixteen of the undocumented individuals were transported to hospitals — five of whom died.

    In addition to their sentences described above, the court also ordered Orduna-Torres to pay a $96,000 money judgment and ordered the forfeiture of the following assets: one 2008 Volvo semi-tractor; one 1995 Phoenix trailer; one 2015 Cadillac Escalade; one 2017 Ford F-350 Super Duty Truck; and $59,445.50.

    Five other defendants in this case have pleaded guilty for their involvement in the smuggling event. Riley Covarrubias-Ponce, also known as Rrili and Rilay, 32, is scheduled to be sentenced Nov. 6; Luis Alberto Rivera-Leal, 39, is scheduled to be sentenced on Nov. 13; Christian Martinez, 31, is scheduled to be sentenced on Nov. 20; and Homero Zamorano Jr., 48, is scheduled to be sentenced Dec. 4. Juan Francisco D’Luna Bilbao, 51, is indicted separately and is also scheduled to be sentenced Dec. 4.

    In a related case, Rigoberto Ramon Miranda-Orozco, 48, allegedly worked with the HSO to smuggle aliens into the United States on the same fatal journey orchestrated by Orduna-Torres and his co-conspirators. He made his initial appearance in San Antonio on March 17, seven months after he was arrested in Guatemala, and is currently scheduled for a jury trial Sept. 29.

    HSI investigated the case with the assistance of the FBI and the Bureau of Alcohol, Tobacco, Firearms and Explosives, and has received tremendous support from Customs and Border Protection; Border Patrol; ICE’s Enforcement and Removal Operations; the San Antonio Police Department; the Bexar County Sheriff’s Office; the San Antonio Fire Department; the Marshall Police Department; and the Palestine Police Department.

    Assistant U.S. Attorneys Eric Fuchs, Sarah Spears and Ray Gattinella for the Western District of Texas are prosecuting the case.

    These convictions are the result of the coordinated efforts of Joint Task Force Alpha (JTFA). JTFA, a partnership with the Department of Homeland Security (DHS), has been elevated and expanded by the Attorney General with a mandate to target cartels and other transnational criminal organizations to eliminate human smuggling and trafficking networks operating in Mexico, Guatemala, El Salvador, Honduras, Panama, and Colombia that impact public safety and the security of our borders. JTFA currently comprises detailees from U.S. Attorneys’ Offices along the southwest border. Dedicated support is provided by numerous components of the Justice Department’s Criminal Division, led by the Human Rights and Special Prosecutions Section and supported by the Money Laundering and Asset Recovery Section; Office of Enforcement Operations; and the Office of International Affairs, among others. JTFA also relies on substantial law enforcement investment from DHS, FBI, the Drug Enforcement Administration (DEA), and other partners. To date, JTFA’s work has resulted in more than 385 domestic and international arrests of leaders, organizers, and significant facilitators of alien smuggling; more than 345 U.S. convictions; more than 300 significant jail sentences imposed; and forfeitures of substantial assets.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations, and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhoods (PSN).

    MIL OSI USA News

  • MIL-OSI USA: Chicago Man Convicted of Conspiring to Provide Material Support to ISIS

    Source: US State of California

    A Chicago man was convicted today of conspiring to provide material support to the Islamic State of Iraq and al-Sham (ISIS) by using social media to encourage attacks on ISIS’s enemies and recruit new ISIS members.

    According to court documents, Ashraf Al Safoo, 41, was a leader of Khattab Media Foundation, a sophisticated online organization that swore allegiance to ISIS and created and disseminated threats and ISIS propaganda on social media and other online platforms. Al Safoo and other members of Khattab created and posted pro-ISIS videos, articles, essays, and infographics at the direction of, and in coordination with, ISIS. Much of Khattab’s propaganda promoted violent jihad on behalf of the terrorist group.

    In one posting, Al Safoo encouraged Khattab members to post pro-ISIS information “to cause confusion and spread terror within the hearts of those who disbelieved.” In another posting, Al Safoo wrote, “Work hard, brothers, edit the issue into short clips, take the pictures out of it and publish the efforts of your brothers in the pages of the apostates. Participate in the war, and spread terror, the [Islamic] State does not want you to watch it only, rather, it incites you, and if you are unable to, use it to incite others.”

    Many of Khattab’s postings included images of violence, celebrations of terrorist attacks and mass shootings in the United States, and encouragement for “lone wolf” attacks in western countries.

    Al Safoo was arrested in Chicago in 2018. After a bench trial in U.S. District Court in Chicago, U.S. District Judge John Robert Blakey found Al Safoo guilty of one count of conspiracy to provide material support to a foreign terrorist organization, one count of conspiracy to transmit threats in interstate commerce, one count of conspiracy to intentionally access a protected computer without authorization, four counts of intentionally accessing a protected computer without authorization, and four counts of providing material support to a foreign terrorist organization.

    The convictions carry a maximum penalty of 130 years in prison. Sentencing is scheduled for Oct. 9. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    Assistant Attorney General John A. Eisenberg of the Justice Department’s National Security Division, U.S. Attorney Andrew S. Boutros for the Northern District of Illinois, and Assistant Director Donald M. Holstead of the FBI’s Counterterrorism Division made the announcement.

    The FBI Chicago Field Office is investigating the case.

    Assistant U.S. Attorneys Melody Wells, Barry Jonas, and Thomas P. Peabody for the Northern District of Illinois, and Trial Attorney Andrew J. Dixon of the National Security Division’s Counterterrorism Section are prosecuting the case.

    MIL OSI USA News

  • MIL-OSI USA: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: US State of California

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: United States Attorneys General

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: United States Attorneys General

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes

    Source: United States Attorneys General

    Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers

    The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.

    According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.

    As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.

    “These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”

    “North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”

    “North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”

    Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts

    Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme. 

    “The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”

    According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).

    Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.

    IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files  containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.

    Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.

    Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.

    The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.

    Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.

    Kim Kwang Jin et al. Indictment – Northern District of Georgia

    Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.

    “The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”

    According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

    After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

    To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.

    The FBI Atlanta Field Office is investigating the case.

    Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.

    21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District

    Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.

    Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.

    ***

    The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.

    As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.

    Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.

    The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.

    The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Chicago Man Convicted of Conspiring to Provide Material Support to ISIS

    Source: United States Attorneys General 7

    A Chicago man was convicted today of conspiring to provide material support to the Islamic State of Iraq and al-Sham (ISIS) by using social media to encourage attacks on ISIS’s enemies and recruit new ISIS members.

    According to court documents, Ashraf Al Safoo, 41, was a leader of Khattab Media Foundation, a sophisticated online organization that swore allegiance to ISIS and created and disseminated threats and ISIS propaganda on social media and other online platforms. Al Safoo and other members of Khattab created and posted pro-ISIS videos, articles, essays, and infographics at the direction of, and in coordination with, ISIS. Much of Khattab’s propaganda promoted violent jihad on behalf of the terrorist group.

    In one posting, Al Safoo encouraged Khattab members to post pro-ISIS information “to cause confusion and spread terror within the hearts of those who disbelieved.” In another posting, Al Safoo wrote, “Work hard, brothers, edit the issue into short clips, take the pictures out of it and publish the efforts of your brothers in the pages of the apostates. Participate in the war, and spread terror, the [Islamic] State does not want you to watch it only, rather, it incites you, and if you are unable to, use it to incite others.”

    Many of Khattab’s postings included images of violence, celebrations of terrorist attacks and mass shootings in the United States, and encouragement for “lone wolf” attacks in western countries.

    Al Safoo was arrested in Chicago in 2018. After a bench trial in U.S. District Court in Chicago, U.S. District Judge John Robert Blakey found Al Safoo guilty of one count of conspiracy to provide material support to a foreign terrorist organization, one count of conspiracy to transmit threats in interstate commerce, one count of conspiracy to intentionally access a protected computer without authorization, four counts of intentionally accessing a protected computer without authorization, and four counts of providing material support to a foreign terrorist organization.

    The convictions carry a maximum penalty of 130 years in prison. Sentencing is scheduled for Oct. 9. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    Assistant Attorney General John A. Eisenberg of the Justice Department’s National Security Division, U.S. Attorney Andrew S. Boutros for the Northern District of Illinois, and Assistant Director Donald M. Holstead of the FBI’s Counterterrorism Division made the announcement.

    The FBI Chicago Field Office is investigating the case.

    Assistant U.S. Attorneys Melody Wells, Barry Jonas, and Thomas P. Peabody for the Northern District of Illinois, and Trial Attorney Andrew J. Dixon of the National Security Division’s Counterterrorism Section are prosecuting the case.

    MIL Security OSI

  • MIL-OSI Africa: Every five seconds, a child is displaced, injured, or killed in the Middle East and North Africa’s conflicts


    Download logo

    At least 12.2 million children have reportedly been killed, maimed or displaced in conflicts in the Middle East and North Africa (MENA) in less than 2 years, the equivalent of one child displaced every five seconds, and one child killed or maimed every fifteen minutes.

    Reports indicate over 12 million children have been displaced, more than 40,000 maimed, and almost 20,000 killed.

    “A child’s life is being turned upside down the equivalent of every five seconds due to the conflicts in the region,” said UNICEF Regional Director for the Middle East and North Africa Edouard Beigbeder. “Already, half of the region’s 220 million children live in conflict-affected countries. We cannot allow this number to rise. Ending hostilities – for the sake of children – is not optional; it is an urgent necessity, a moral obligation, and it is the only path to a better future.”

    Today, nearly 110 million children in MENA live in countries affected by conflict. Violence continues to disrupt nearly every aspect of their lives. Homes, schools, and health facilities are being destroyed. Children are regularly exposed to life-threatening situations, extreme distress, and displacement, stripped of safety and often left with psychological scars that can last a lifetime.

    In 2025, UNICEF estimates that 45 million children across the region will require humanitarian assistance due to continued life-threatening risks and vulnerabilities, up from 32 million in 2020 – a 41 per cent increase in just five years.

    Meanwhile, UNICEF is experiencing major funding shortfalls across its operations in the MENA region. For instance, as of May, Syria faces a 78 per cent funding gap, the State of Palestine a 68 per cent gap for their 2025 appeals, and our regional programmes are under increasing financial strain.

    Looking ahead, the outlook remains bleak. By 2026*, UNICEF’s funding in MENA is projected to decline by 20 to 25 per cent, potentially resulting in a loss of up to US$370 million – jeopardizing life-saving programmes across the region, including treatment for severe malnutrition, safe water production in conflict zones, and vaccinations against deadly diseases.

    “As the plight of children in the region worsens, the resources to respond are becoming sparser,” said Beigbeder. “Conflicts must stop. International advocacy to resolve these crises must intensify. And support for vulnerable children must increase, not decline.”

    UNICEF urges all parties to conflict in the region to end hostilities and uphold international law, including international humanitarian law and human rights law. Member States with influence over parties to conflict must use their leverage to advocate for peace and the protection of children and the essential infrastructure they rely on for survival.

    UNICEF also urges donors to maintain or increase their support for children and calls on new donors to stand with the region’s most vulnerable children.

    Distributed by APO Group on behalf of UNICEF, Middle East and North Africa.

    MIL OSI Africa

  • MIL-OSI United Nations: Entrepreneurship in Motion: IOM Exhibition Highlights the Power of Migration to Transform Lives

    Source: International Organization for Migration (IOM)

    Geneva, 1 July 2025 – The International Organization for Migration (IOM) is proud to announce the opening of a new exhibition along Geneva’s iconic Quai Wilson, titled Strengthening Resilience, Transforming Lives. Open to the public from 1 July to 3 August 2025, the exhibition features a virtual platform and is presented by the IOM Development Fund, with contributions from the Enterprise Development Fund and IOM Goodwill Ambassador Paul Choy.

    “Migration is not just about crossing borders. It is about the determination to rebuild, to contribute and to thrive,” said IOM Director General Amy Pope. “The people featured in this exhibition have faced real challenges, yet they have found ways to turn ideas into businesses and businesses into opportunities, not just for themselves, but for those around them. Their stories remind us what is possible when people are given the chance to start over.”

    Displayed across 30 large-scale double-sided panels, the exhibition focuses on how entrepreneurship can support recovery, strengthen communities, and offer durable solutions for displaced people. It sheds light on the ways in which host communities, potential migrants, migrants, and returnees are building businesses, creating jobs, and contributing to local development.

    The people featured come from a wide range of countries and contexts, each bringing a story of resilience and initiative. Visitors are invited to discover the personal journeys of entrepreneurs from Bangladesh, Cabo Verde, Ecuador, Ethiopia, Georgia, Ghana, Iraq, Lebanon, the Marshall Islands, Pakistan, Paraguay and Türkiye.

    Each of them received support through the IOM Development Fund and IOM’s Enterprise Development Fund. The former backed pilot initiatives designed for scale, while the latter provides financial and technical assistance to help small and medium-sized businesses grow. Their experiences are documented through striking visuals and interviews captured by IOM missions worldwide and professional photographers, including IOM Goodwill Ambassador Paul Choy.

    The exhibition is part of a broader effort by IOM to support sustainable development through migration-focused initiatives. Since its establishment in 2001, the IOM Development Fund has supported more than 1,000 projects in over 125 countries. It provides seed funding to help governments strengthen migration management and pilot innovative ideas.

    Complementing this work, IOM’s Enterprise Development Fund is an innovative programme that supports livelihoods at the community level through private sector revitalization and economic development by targeting small and medium-sized enterprises, with the objective of post-conflict economic recovery and inclusive economic development.

    The exhibition is open to the public along the lakeside between the Bains des Pâquis and Parc Mon Repos, directly across from the Palais Wilson. All panel content is available in English and French, with QR codes linking to a virtual platform where visitors can access videos, photographs, and extended stories, also available in Spanish.

    Visit the exhibition: Quai Wilson, Geneva – 1 July to 3 August 2025

    Explore online:

    For more information, please visit IOM’s Media Centre. 

    MIL OSI United Nations News

  • Trump to discuss Gaza, Iran with Netanyahu at Monday meeting

    Source: Government of India

    Source: Government of India (4)

    U.S. President Donald Trump said on Tuesday he will discuss the situations in Gaza and Iran when he meets with Israeli Prime Minister Benjamin Netanyahu at the White House next week, adding that he hopes to achieve a ceasefire in Gaza soon.

    Trump plans to meet Netanyahu on Monday. A senior Israeli official, Ron Dermer, has been in Washington this week holding talks ahead of the meeting.

    Trump and Netanyahu worked together on a military operation against Iran’s nuclear sites in June that culminated with American B-2 bombing raids. Trump said the strikes “obliterated” Tehran’s nuclear capability, although there remains a debate about the degree of damage done to the Iranian nuclear program.

    Trump said he is hopeful that a ceasefire-for-hostages agreement can be achieved next week between Israel and Iran-backed Hamas militants in Gaza.

    “We hope it’s going to happen. And we’re looking forward to it happening sometime next week,” he told reporters as he departed the White House for a day trip to Florida. “We want to get the hostages out.”

    Hamas has said it is willing to free remaining hostages in Gaza under any deal to end the war, while Israel says it can only end if Hamas is disarmed and dismantled. Hamas refuses to lay down its arms.

    The war in Gaza was triggered when Hamas-led militants attacked Israel on October 7, 2023, killing 1,200 people and taking 251 hostages, according to Israeli tallies.

    Gaza’s health ministry says Israel’s post-Oct. 7 military assault has killed over 56,000 Palestinians. The assault has also caused a hunger crisis, internally displaced Gaza’s entire population and prompted accusations of genocide at the International Court of Justice and of war crimes at the International Criminal Court. Israel denies the accusations.

    A White House official, asked about Dermer’s scheduled meetings and agenda, said: “Ron Dermer visits the White House regularly.”

    “This will continue as President Trump pursues a path to peace for Israel and Gaza,” the official added. The official did not immediately identify the Trump aides Dermer would see during his visit.

    -REUTERS

  • MIL-OSI Video: Gaza: “Level of suffering and brutality is unbearable” – Briefing to the UN Security Council

    Source: United Nations (video statements)

    Briefing by Khaled Khiari, Assistant Secretary-General for the Middle East, Asia and the Pacific, on the situation in the Middle East, including the Palestinian question.

    Assistant Secretary-General Khaled Khiari today (30 Jun) told the Security Council that “the level of suffering and brutality in Gaza is unbearable,” and “the continued collective punishment of the Palestinian people is unjustifiable.”

    Khiari expressed deep concern at “Israeli military operations in Gaza that render large areas of Gaza uninhabitable,” and rejected “the forced displacement of the Palestinian population from any part of the Occupied Palestinian Territory, which would constitute a breach of international law obligations.”

    He mourned the United Nations personnel killed in Gaza and “strongly” condemned “the killing of all health and humanitarian personnel and journalists.”

    Khiari also condemned “the loss of lives and injuries of Palestinians seeking aid in Gaza” and called for “an immediate and independent investigation into these events and for perpetrators to be held accountable.”

    He stressed that the United Nations “will not participate in any aid delivery modality that does not comply with the fundamental humanitarian principles of humanity, impartiality, independence, and neutrality.”

    https://www.youtube.com/watch?v=IuslSimvhqg

    MIL OSI Video

  • MIL-OSI Economics: Jordan: Third Review Under the Extended Arrangement Under the Extended Fund Facility, and Request for Modification of Performance Criteria, and Request for an Arrangement Under the Resilience and Sustainability Facility-Press Release; Staff Report; and Statement by the Executive Director for Jordan

    Source: International Monetary Fund

    International Monetary Fund. Middle East and Central Asia Dept. “Jordan: Third Review Under the Extended Arrangement Under the Extended Fund Facility, and Request for Modification of Performance Criteria, and Request for an Arrangement Under the Resilience and Sustainability Facility-Press Release; Staff Report; and Statement by the Executive Director for Jordan”, IMF Staff Country Reports 2025, 155 (2025), accessed July 1, 2025, https://doi.org/10.5089/9798229014342.002

    MIL OSI Economics

  • MIL-OSI Global: From Roman drains to ancient filters, these artefacts show how solutions to water contamination have evolved

    Source: The Conversation – UK – By Rosa Busquets, Associate Professor, School of Life Sciences, Pharmacy and Chemistry, Kingston University

    Thirst: In Search of Freshwater, an exhibition at Wellcome Collection. Benjamin Gilbert., CC BY-NC-ND

    A new exhibition in London (open until February 2026) called Thirst: In search of freshwater highlights how civilisations have treasured – and been intrinsically linked to – safe, clean water.

    As a chemist, I research how freshwater is polluted by modern civilisation. Common contaminants in rivers include pharmaceuticals,
    microplastics
    (which degrade further when exposed to sunlight and wave power), and forever chemicals or per- and polyfluoroalkyl substances (PFAS) (some of which are carcinogenic).

    Synthetic toxic chemicals are introduced into the environment from the products we make, use and dispose of. This wasn’t a problem centuries ago, where we had a totally different manufacturing industry and technologies.

    Some, such as PFAS from stain-resistant textiles or nonstick materials such as cookware, can be particularly difficult to remove from wastewater. PFAS don’t degrade easily, they resist conventional heat treatments and can easily pass through wastewater treatments, so they contaminate rivers or lakes that are sources of our drinking water.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    Testing for pollutants is even more critical in developing nations that lack sanitation and face drought or flooding.
    Having to protect and conserve drinking water and its sources is as relevant today as it always has been.

    For this exhibition, curator at the Wellcome Collection in London, Janice Li, has selected 125 historical objects, photographs and feats of engineering that link to drought, rain, glaciers, rivers and lakes. These three artefacts from Thirst illustrate how our relationship with water contamination has evolved:

    1. Ancient water filters

    Made from natural materials such as clay, water jug filters have been used for hundreds of years in every continent by ancient civilisations. They show that purifying water for drinking was commonplace. The sand and soil particles that naturally get suspended in water and removed by these filters would have carried microbes.

    Water jug filters with Arabic inscription, found in Egypt, dating back to 900-1,200.
    Victoria and Albert Museum London/Wellcome Collection, CC BY-NC-ND

    But in ancient times, pharmaceuticals and other drugs, pesticides, forever chemicals and microplastics would not have been a problem. Those filters could work relatively well despite being made of simple materials with wide pores.

    Today, those ancient filters would no longer be effective. Modern water filters are made using more advanced materials which typically have small pores (called micropores and mesopores). For example, filters often include activated carbon (a highly porous type of carbon that can be manufactured to capture contaminants) or membranes that filter water. Only then is it safe for people to drink.




    Read more:
    Forever chemicals are in our drinking water – here’s how to reduce them


    2. Roman water pipes

    Lead water pipes (known as fistulae) were useful parts of a relatively advanced plumbing system that distributed drinking water throughout Roman cities. They are still common in water systems in our cities today. In the US, there are about 9.2 million lead service lines in use. Exposure to lead causes severe human health problems. Lead exposure, not necessarily from drinking water only, was attributed to more than 1.5 million deaths in 2021.

    A Roman lead water pipe that dates back to 1-300CE.
    Courtesy of Wellcome Collection/Science Museum Group., CC BY-NC-ND

    It’s now understood that lead is neurotoxic and it can diffuse or spread from the pipes to drinking water. Lead from paints and batteries, including car batteries, can also contaminate drinking water.

    To protect us from lead leaching or flaking off from pipes, some government agencies are calling for the replacement of lead pipes with copper or plastic pipes. Water companies routinely add phosphates (mined powder that contains phosphorus) to drinking water to help capture potential lead contamination and make it safe to drink.

    3. The horror of unhealthy water

    One caricature titled The Monster Soup by artist William Heath (1828) is part of the Wellcome Trust’s permanent collection. The graphics read “microcosms dedicated to the London Water companies” and “Monster soup, commonly called Thames Water being a correct representation of the precious stuff doled out to us”. The cartoon shows a lady so terrified at the sight of microbes in river water from the Thames that she drops her cup of tea.

    Monster Soup by William Heath.
    Courtesy of the Wellcome Collection., CC BY-NC-ND

    Even today, many people remain shocked at the toxic contamination in rivers and sewage pollution prevents people from swimming.

    By 2030, 2 billion people will still not have safely managed drinking water and 1.2 billion will lack basic hygiene services. Drinking water will still be contaminated by bacteria such as E. coli and other dangerous pathogens that cause waterborne diseases. So advancing technologies to filter out contamination will be just as crucial in the future as it has been in the past.


    Don’t have time to read about climate change as much as you’d like?

    Get a weekly roundup in your inbox instead. Every Wednesday, The Conversation’s environment editor writes Imagine, a short email that goes a little deeper into just one climate issue. Join the 45,000+ readers who’ve subscribed so far.


    Rosa Busquets receives funding from UKRI/ EU Horizons MSCA Staff exchanges Clean Water project 101131182, DASA, project ACC6093561. She is affiliated with Kingston University, UCL, Al-Farabi Kazakh National University, UNEP EEAP.

    ref. From Roman drains to ancient filters, these artefacts show how solutions to water contamination have evolved – https://theconversation.com/from-roman-drains-to-ancient-filters-these-artefacts-show-how-solutions-to-water-contamination-have-evolved-253876

    MIL OSI – Global Reports

  • MIL-OSI Global: How Trump plays with new media says a lot about him – as it did with FDR, Kennedy and Obama

    Source: The Conversation – UK – By Sara Polak, University Lecturer in American Studies, Leiden University

    There is a strange and worrying parallel between the breakneck speed at which Donald Trump has operated in the first few months of his presidency and the ever-accelerating pace at which information moves on social media platforms. Where in his first term he used Twitter, now, the 47th US president is using his own platform, TruthSocial, to announce changes of direction that are sometimes so fundamental that they change decades of US policy.

    Social media has become a key tool of governing for Trump’s administration. He uses it both to make announcements and to drum up support for those announcements. His social media posts can move the markets and make or break careers. They can even, it seems, stop wars.

    So when he used TruthSocial to announce a ceasefire between Israel and Iran on June 23, giving the two countries a deadline to stop firing missiles, it appears that neither of the antagonists were fully aware of the situation, given they carried on attacking each other. So an all-caps message followed: “ISRAEL. DO NOT DROP THOSE BOMBS,” he posted. “BRING YOUR PILOTS HOME, NOW!” – adding, just in case anyone had any doubt he was serious: “DONALD J. TRUMP, PRESIDENT OF THE UNITED STATES.”

    Trump’s use of his TruthSocial platform began as he sought to re-establish himself from the political wilderness after the insurrection of January 6 2021. It has now become a tool of his extreme power and his willingness to use (and abuse) it – globally as well as domestically.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    He’s the latest in a string of US presidents known for their adroit use of whichever is the medium most guaranteed to connect with the greatest number of people. From Theodore “Teddy” Roosevelt’s adept cultivation of print journalists in the early 20th century through Franklin D. Roosevelt’s comforting use of radio as it gained popularity and John F. Kennedy’s mastery of the rising medium of television, presidents have expanded their reach and influence through adept use of media.

    FDR’s “fireside chats”, broadcast on the radio throughout the US in the 1930s, reached an estimated 80% of the population, showing he understood the key media principle of reach. Roosevelt would address his listeners as “my friends” and Americans came to understand them as seemingly intimate conversations with their president.

    FDR dominated the airwaves at a time when many Americans hardly understood the important role that the federal government played in their own lives – and millions of households were only just getting mains electricity (thanks to the Rural Electrification Act of 1936). But radios were becoming a common mass medium and FDR perfectly understood how to use it. If you listen to the fireside chats, FDR may sound patrician – and at times formal – but his tone is also friendly, thoughtful and reassuring.

    In Germany at around the same time, Adolf Hitler’s massive stadium speeches were very effective for people who were in the stadium and being lifted by the intensity of the crowd and all the carefully thought out visual cues. But when broadcast on radio, Hitler had nothing like Roosevelt’s ability to connect with people on a personal level.

    Roosevelt was hardly the first leader – or even the first US president – to speak on the radio. But he was the first to master the medium. He figured out how to use its potential to deliver a key implicit message: that his government should and did take on a central role in people’s lives.

    Equally, John F. Kennedy can be said to have “discovered” political television. Not just as a medium for political campaigns, debates and speeches – but also for putting across to a mass audience his role as the embodiment of American decency, beauty and masculinity: JFK’s White House as Camelot.

    JFK was considered a master of the fast-growing medium of television.

    Both Roosevelt and Kennedy were in several ways physically disabled and lived with chronic illness, yet through the “new medium” of their time were able to project an image of quintessentially American strength and trustworthiness. In part this was their own doing – but it’s also a testament to the power of the media they used for their time.

    Mastering the medium

    These possibilities of a medium used to its best advantage – for example, to be heard around the US, but still to project a sense of intimacy – have become known as the “affordances” of a medium. The medium afforded Roosevelt space to be authentic without showing his disability. Kennedy appeared young, fit and handsome – even when dependent on painkillers.

    When a new medium is introduced, people start to play around with its affordances – and this applies to politicians too. Political leaders who develop a special aptitude for using the new medium to emphasise their unique style can become particularly successful, as has Donald Trump with his use of social media.

    The US president rose to power helped by his adept use of many of Twitter’s attributes – the imposed brevity of his messages, the ease of retweeting, the tendency for other users to “pile on” (and the user anonymity, which tends to encourage pile-ons) to polarise American public debate.

    Trump was forced off Twitter after the Capitol Hill insurrection of January 6 2021. So he came back with his own platform, TruthSocial, where he can also make the rules. And now he uses the platform to make foreign policy, trumpeting his positions (which can change with bewildering speed) on TruthSocial well before they can be announced by the White House press team, which often has to scramble to catch up.

    When Canadian communication theorist Marshall McLuhan penned his famous phrase: “The medium is the message” in his groundbreaking 1964 study, Understanding Media: The Extensions of Man, he meant to say that media form and content are not as distinct from one another as one might think and that the form of a medium of communication can shape society as much as its content. In Donald Trump’s use of social media, we are seeing this idea at work.

    Sara Polak does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. How Trump plays with new media says a lot about him – as it did with FDR, Kennedy and Obama – https://theconversation.com/how-trump-plays-with-new-media-says-a-lot-about-him-as-it-did-with-fdr-kennedy-and-obama-248923

    MIL OSI – Global Reports

  • MIL-OSI: Maris-Tech Expands Asia-Pacific Reach with New Distribution Agreement in Singapore

    Source: GlobeNewswire (MIL-OSI)

    Distribution Agreement with Precision Technologies Strengthens Presence in Key Defense and Security Markets

    Rehovot, Israel, July 01, 2025 (GLOBE NEWSWIRE) — Maris-Tech Ltd. (Nasdaq: MTEK, MTEKW) (“Maris-Tech” or the “Company”), a global leader in video and artificial intelligence (“AI”)- based edge computing technology, today announced that it has entered into a distribution agreement with Precision Technologies Pte Ltd. (“Precision Technologies”), a leading Singapore-based supplier of cutting-edge defense and security solutions.

    The agreement marks an important milestone for Maris-Tech as it continues to expand its global footprint by strengthening its presence in the Asia-Pacific region. Under the terms of the agreement, Precision Technologies will promote and distribute the Company’s full range of video-based edge AI computing solutions, serving key markets including defense, homeland security, aerospace, and commercial sectors throughout Singapore.

    “Collaborating with a respected and established player like Precision Technologies is an important milestone for Maris-Tech,” said Israel Bar, Chief Executive Officer of Maris-Tech. “The Asia-Pacific region is a key growth area, and we believe that this collaboration represents a strong vote of confidence in our technology and products. We believe that customers in this region will greatly benefit from our advanced solutions for AI-powered video intelligence and edge computing.”

    About Maris-Tech Ltd.

    Maris-Tech is a global leader in video and AI-based edge computing technology, pioneering intelligent video transmission solutions that conquer complex encoding-decoding challenges. Our miniature, lightweight, and low-power products deliver high-performance capabilities, including raw data processing, seamless transfer, advanced image processing, and AI-driven analytics. Founded by Israeli technology sector veterans, Maris-Tech serves leading manufacturers worldwide in defense, aerospace, Intelligence gathering, homeland security (HLS), and communication industries. We’re pushing the boundaries of video transmission and edge computing, driving innovation in mission-critical applications across commercial and defense sectors.

    For more information, visit https://www.maris-tech.com/

    Forward-Looking Statement Disclaimer

    This press release contains “forward-looking statements” within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended, that are intended to be covered by the “safe harbor” created by those sections. Forward-looking statements, which are based on certain assumptions and describe our future plans, strategies and expectations, can generally be identified by the use of forward-looking terms such as “believe,” “expect”,” “may”, “should,” “could,” “seek,” “intend,” “plan,” “goal,” “estimate,” “anticipate” or other comparable terms. For example, the Company is using forward-looking statements when it is discussing the Company’s growth strategy and presence in the Asia-Pacific region; potential benefits of the collaboration between the Company and Precision Technologies; and that customers in the Asia-Pacific region will greatly benefit from the Company’s advanced solutions for AI-powered video intelligence and edge computing. The Company’s actual results and financial condition may differ materially from those indicated in the forward-looking statements. Therefore, you should not rely on any of these forward-looking statements. Important factors that could cause our actual results and financial condition to differ materially from those indicated in the forward-looking statements include, among others, the following: its ability to successfully market its products and services, including in the United States; the acceptance of its products and services by customers; its continued ability to pay operating costs and ability to meet demand for its products and services; the amount and nature of competition from other security and telecom products and services; the effects of changes in the cybersecurity and telecom markets; its ability to successfully develop new products and services; its success establishing and maintaining collaborative, strategic alliance agreements, licensing and supplier arrangements; its ability to comply with applicable regulations; and the other risks and uncertainties described in the Annual Report on Form 20-F for the year ended December 31, 2024, filed with the SEC on March 28, 2025, and its other filings with the Securities and Exchange Commission. The Company undertakes no obligation to publicly update any forward-looking statement, whether written or oral, that may be made from time to time, whether as a result of new information, future developments or otherwise.

    Investor Relations:

    Nir Bussy, CFO
    Tel: +972-72-2424022
    Nir@maris-tech.com

    The MIL Network

  • MIL-OSI: Check Point Software to Announce 2025 Second Quarter Financial Results on July 30, 2025

    Source: GlobeNewswire (MIL-OSI)

    TEL AVIV, Israel, July 01, 2025 (GLOBE NEWSWIRE) — Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, today announced that it will release its financial results for the second quarter ended June 30, 2025, on Wednesday, July 30, 2025, before the U.S. financial markets open. Management will host a video conference call with the investment community at 8:30 AM EST/5:30 AM PST on July 30, 2025. A live video webcast of the call will be hosted on the company’s website at http://www.checkpoint.com/ir.

    To follow this and other Check Point news visit:

    About Check Point Software Technologies Ltd.
    Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading protector of digital trust, utilizing AI-powered cyber security solutions to safeguard over 100,000 organizations globally. Through its Infinity Platform and an open garden ecosystem, Check Point’s prevention-first approach delivers industry-leading security efficacy while reducing risk. Employing a hybrid mesh network architecture with SASE at its core, the Infinity Platform unifies the management of on-premises, cloud, and workspace environments to offer flexibility, simplicity and scale for enterprises and service providers.

    ©2025 Check Point Software Technologies Ltd. All rights reserved

    The MIL Network