NewzIntel.com

    • Checkout Page
    • Contact Us
    • Default Redirect Page
    • Frontpage
    • Home-2
    • Home-3
    • Lost Password
    • Member Login
    • Member LogOut
    • Member TOS Page
    • My Account
    • NewzIntel Alert Control-Panel
    • NewzIntel Latest Reports
    • Post Views Counter
    • Privacy Policy
    • Public Individual Page
    • Register
    • Subscription Plan
    • Thank You Page

Category: Technology

  • MIL-OSI USA: A Star Like No Other

    Source: NASA

    An unusual star (circled in white at right) behaving like no other seen before and its surroundings are featured in this composite image released on May 28, 2025. A team of astronomers combined data from NASA’s Chandra X-ray Observatory and the Square Kilometer Array Pathfinder (ASKAP) radio telescope on Wajarri Country in Australia to study the discovered object, known as ASKAP J1832−0911 (ASKAP J1832 for short).
    ASKAP J1832 belongs to a class of objects called “long period radio transients” discovered in 2022 that vary in radio wave intensity in a regular way over tens of minutes. This is thousands of times longer than the length of the repeated variations seen in pulsars, which are rapidly spinning neutron stars that have repeated variations multiple times a second. ASKAP J1832 cycles in radio wave intensity every 44 minutes, placing it into this category of long period radio transients. Using Chandra, the team discovered that ASKAP J1832 is also regularly varying in X-rays every 44 minutes. This is the first time that such an X-ray signal has been found in a long period radio transient.
    Image credit: X-ray: NASA/CXC/ICRAR, Curtin Univ./Z. Wang et al.; Infrared: NASA/JPL/CalTech/IPAC; Radio: SARAO/MeerKAT; Image processing: NASA/CXC/SAO/N. Wolk

    MIL OSI USA News –

    June 3, 2025
  • MIL-OSI: X Payments Beta Sparks Dogecoin Frenzy, PFM CRYPTO Dogecoin Mining Sees Golden Entry Opportunity

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, June 02, 2025 (GLOBE NEWSWIRE) — In 2025, cryptocurrencies are playing an increasingly important role in the payment field. Recently, the X Payments feature will soon begin limited testing, triggering a sharp surge in Dogecoin’s price. This crypto payment revolution is placing PFM CRYPTO’s Dogecoin cloud mining services in the spotlight. According to platform data, inquiries into Dogecoin cloud mining contracts surged by 40% following the announcement.

    Payment Revolution Activates Dogecoin Mining Demand
    As X Payments gradually secures money transmitter licenses in 41 U.S. states (with New York’s BitLicense still pending), the CEO of PFM CRYPTO stated:

    “The implementation of payment use cases will significantly enhance DOGE’s real-world value. Traditional mining is challenged by hardware upgrades and regulatory pressure, while cloud mining enables users to receive pure tokens daily without exposure to secondary market volatility — making it the optimal path for retail users to participate in ecosystem growth.”

    PFM CRYPTO’s Dogecoin Cloud Mining Offers Three Strategic Advantages

    • Instant Access to Market Trends

    If X Payments successfully integrates cryptocurrency, the payment demands of its 5.5 million users will ignite massive on-chain Dogecoin activity. PFM CRYPTO’s cloud mining requires no mining rig configuration or wait time. Users can register and start mining immediately, with no need for technical expertise or expensive hardware.

    • Hedge Against Dogecoin Price Volatility

    As the market reacts dramatically to the X Payments Beta launch, PFM CRYPTO’s AI-powered cloud mining system offers multi-currency profit optimization. It automatically switches to high-potential coins, effectively minimizing risks associated with Dogecoin market fluctuations.

    • Smart Earnings and Real-Time Settlement

    PFM CRYPTO utilizes a proprietary earnings calculation engine that monitors Dogecoin hash rate and price movements in real time. It automatically adjusts income allocation strategies, settles earnings daily, and charges no hidden fees.

    To Prepare for the Expected Demand Surge, PFM CRYPTO Has Upgraded Its Dogecoin Mining Services:

    1、Launched a $10 new user welcome bonus, available upon registration;

    2、Provides 24/7 human customer support to ensure seamless global user connectivity;

    3、Introduced 1-day, 2-day, and 5-day short-term cloud mining contracts, ideal for trial investments and rapid arbitrage.

    About PFM CRYPTO
    As a leading digital asset management platform, PFM CRYPTO delivers revolutionary cloud mining solutions for major cryptocurrencies including BTC, ETH, and DOGE. Through its patented hash power leasing technology, users can earn steady digital asset returns without owning mining hardware. Visit [ https://pfmcrypto.net ] now to claim your $10 welcome bonus.

    Media contact:

    Amelia Elspeth      

    info@pfmcrypto.net      

    https://pfmcrypto.net

    Attachment

    The MIL Network –

    June 3, 2025
  • MIL-OSI Economics: Cyshield uses Thales technology to launch Egypt’s first connectivity service for eSIM devices

    Source: Thales Group

    Headline: Cyshield uses Thales technology to launch Egypt’s first connectivity service for eSIM devices

    02 Jun 2025

    Share this article

    Cyshield, a leading digital solutions company, selected Thales a world leader in secure advanced technologies to launch Egypt’s first-ever eSIM (embedded SIM) connectivity services for consumer and IoT devices. Based in Cairo, Cyshield is supporting Egypt’s four mobile network operators in connecting eSIM devices in the country, optimising the user experience and enabling flexible subscription services for eSIM-enabled smartphones, smartwatches and other IoT devices.

    Thales provides Cyshield with its leading eSIM Management platform, to enable fast and secure over-the-air downloads of mobile subscriptions to devices, leveraging proven expertise and capabilities to address sovereignty challenges. In addition, it ensures compliance with the latest consumer and M2M/IoT specifications1 for eSIM solutions, guaranteeing profiles and communication are interoperable and secure.

    This new milestone in the development and digitalisation of mobile connectivity allows millions of Egyptians to enjoy the growing range of eSIM-enabled devices. Moreover, because Cyshield supports all the country’s mobile operators, it can take full advantage of the eSIM’s ability to host several mobile subscriptions. For the consumer market, end users can switch between operators and select their preferred subscription package with a single click on their phone. For the M2M/IoT market, Cyshield is becoming the national connectivity hub for smart metering in Egypt and other markets, while also preparing to meet evolving industry standards2 and requirements (GSMA SGP.32 standards).

    Within less than five months of its launch, by December 5th, 2024, Cyshield had already completed over 400,000 end-user subscription downloads. Building on this success, the service will be extended to industrial IoT (Internet of Things) applications throughout 2025 and is already fully certified by Egypt’s National Telecom Regulatory Authority (NTRA). ​

    “Khaled Taher, Products Director at Cyshield, praised Thales for delivering a secure, GSMA-certified solution that meets both current and future operational needs, while maximizing eSIM technology to enhance user experience and create new commercial opportunities for mobile operators. Likewise, Waleed Ragab, Products Director at Cyshield, highlighted Thales’ expertise and guidance in successfully securing GSMA SAS-SM certification on the first attempt, ensuring swift regulatory compliance and enabling Cyshield to provide a reliable, innovative eSIM connectivity service with exceptional flexibility and convenience for customers.”

    “Egypt’s first eSIM service is a truly collaborative and sovereign project, bringing together not just Cyshield and Thales, but also the GSMA, NTRA, and all the country’s mobile network operators” said Sherif Barakat, Country Director for Egypt, Thales. “This marks another major leap forward for the eSIM ecosystem, which is expanding at pace in north Africa and across the globe.”

    1Respectively: GSMA SGP.22 and GSMA SGP.02.

    MIL OSI Economics –

    June 3, 2025
  • MIL-OSI USA: Congresswoman María Elvira Salazar Announces 2025 Service Academy Appointments

    Source: United States House of Representatives – Congresswoman María Elvira Salazar’s (FL-27)

    span>Miami, FL – Congresswoman María Elvira Salazar (FL-27) proudly announced the appointment of four outstanding students from Florida’s 27th Congressional District to the United States Service Academies. These exceptional young men and women were nominated by the Congresswoman and accepted by their respective academies for the Class of 2029.

    “It is an incredible honor to nominate such talented and patriotic young leaders to our nation’s prestigious service academies,” said Rep. Salazar. “I was deeply impressed by their passion to serve our country and defend America’s values around the world. I have no doubt they will represent South Florida with pride, strength, and excellence—and make our community proud.”

    The appointed students are: 

    • Lucia Castillo-Rios – U.S. Naval Academy

    Palmetto Bay | Our Lady of Lourdes Academy

    • Austin Nelson – U.S. Air Force Academy

    Palmetto Bay | Cutler Bay Senior High

    Miami | Palmetto Senior High School

    • Natan Rowand – U.S. Military Academy at West Point

    Cutler Bay | Westminster Christian School

    These appointments reflect the students’ academic achievements, leadership skills, and commitment to serving our country. Each service academy offers a rigorous education and military training, preparing cadets and midshipmen to become the next generation of officers in the United States Armed Forces.

    Background

    Our nation’s service academies represent the gold standard of excellence, leadership, and integrity for America’s armed forces, making acceptance into these institutions an extraordinary honor and achievement. The honor of attending a U.S. service academy comes with a solemn obligation: graduates must serve at least five years in the U.S. military. Each year, the nomination process is highly competitive. Congresswoman María Elvira Salazar interviews many exceptional applicants from across the district, evaluating academic performance, leadership, character, and dedication to service.

    Each congressional office may nominate up to fifteen individuals per academy vacancy. 

    To request a nomination from Congresswoman Salazar, you can start by visiting Rep. Salazar’s website or by emailing FL27.ACADEMY@MAIL.HOUSE.GOV.

    MIL OSI USA News –

    June 3, 2025
  • MIL-OSI Europe: Answer to a written question – Tackling barriers to collecting road traffic fines and parking charges from foreign motorists – E-001123/2025(ASW)

    Source: European Parliament

    Parking policy and enforcement is primarily a municipal matter falling under Member States’ competence.

    Technical barriers to be addressed at national level in the future could include for example the use of the latest digital and technical interoperable solutions for parking to scan licence plates.

    As regards parking fees levied by city authorities, there is currently no EU legislation for the cross-border data transfer of vehicle- or vehicle holder-data to follow up parking offences, unless such offences constitute road safety related traffic offences (such as, dangerous parking).

    If so, Directive (EU)2015/413 as amended[1] will be applicable in the future and the EU-wide information exchange system (e.g. based on EUCARIS[2]) will be available for cross-border data exchange for enforcement purposes.

    For parking fees levied by private companies, the European Small Claims Procedure[3] to collect unpaid fees may be used.

    Council Framework Decision 2005/214/JHA on the application of the principle of mutual recognition to financial penalties[4] can be applied in cross-border cases for non-payment of financial penalties in case its strict conditions are met.

    The procedure applies to all offences for which financial penalties can be imposed, including road traffic offences. The final decision imposing the financial penalty must be issued by a criminal court or an administrative authority.

    In the latter case the law has to provide for the person concerned the opportunity to have their case tried by a court having jurisdiction in particular in criminal matters[5].

    Only the most severe parking offences (dangerous parking or stopping) meet these criteria. Member States can refuse to recognise and execute the decision, if the financial penalty is below EUR 70.

    • [1] https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L_202403237.
    • [2] https://www.eucaris.net/.
    • [3] https://europa.eu/youreurope/business/dealing-with-customers/solving-disputes/european-small-claims-procedure/index_en.htm. The procedure covers claims up to EUR 5 000 (excluding expenses) in any EU country except for Denmark.
    • [4] OJ L 076 22.3.2005, p. 16.
    • [5] See Article 1 (a) (ii) and (iv) of Council Framework Decision 2005/214/JHA.
    Last updated: 2 June 2025

    MIL OSI Europe News –

    June 3, 2025
  • MIL-OSI USA: FDA Launches Agency-Wide AI Tool to Optimize Performance for the American People

    Source: US Department of Health and Human Services – 3

    For Immediate Release:
    June 02, 2025

    [embedded content]

    The U.S. Food and Drug Administration (FDA) today launched Elsa, a generative Artificial Intelligence (AI) tool designed to help employees—from scientific reviewers to investigators—work more efficiently. This innovative tool modernizes agency functions and leverages AI capabilities to better serve the American people.
    “Following a very successful pilot program with FDA’s scientific reviewers, I set an aggressive timeline to scale AI agency-wide by June 30,” said FDA Commissioner Marty Makary, M.D., M.P.H. “Today’s rollout of Elsa is ahead of schedule and under budget, thanks to the collaboration of our in-house experts across the centers.”
    Built within a high-security GovCloud environment, Elsa offers a secure platform for FDA employees to access internal documents while ensuring all information remains within the agency. The models do not train on data submitted by regulated industry, safeguarding the sensitive research and data handled by FDA staff.
    “Today marks the dawn of the AI era at the FDA with the release of Elsa, AI is no longer a distant promise but a dynamic force enhancing and optimizing the performance and potential of every employee,” said FDA Chief AI Officer Jeremy Walsh. “As we learn how employees are using the tool, our development team will be able to add capabilities and grow with the needs of employees and the agency.”
    The agency is already using Elsa to accelerate clinical protocol reviews, shorten the time needed for scientific evaluations, and identify high-priority inspection targets.
    Elsa is a large language model–powered AI tool designed to assist with reading, writing, and summarizing. It can summarize adverse events to support safety profile assessments, perform faster label comparisons, and generate code to help develop databases for nonclinical applications. These are just a few examples of how Elsa will be used across the enterprise to improve operational efficiency.
    The introduction of Elsa is the initial step in the FDA’s overall AI journey. As the tool matures, the agency has plans to integrate more AI in different processes, such as data processing and generative-AI functions to further support the FDA’s mission.
    Prioritizing efficiency and responsibility, the FDA launched Elsa ahead of schedule using an all-center approach. Leaders and technologists across the agency collaborated, demonstrating the FDA’s ability to transform its operations through AI.

    Consumer:888-INFO-FDA

    ###

    Boilerplate

    The FDA, an agency within the U.S. Department of Health and Human Services, protects the public health by assuring the safety, effectiveness, and security of human and veterinary drugs, vaccines and other biological products for human use, and medical devices. The agency also is responsible for the safety and security of our nation’s food supply, cosmetics, dietary supplements, radiation-emitting electronic products, and for regulating tobacco products.

    Content current as of:
    06/02/2025

    Follow FDA

    MIL OSI USA News –

    June 3, 2025
  • MIL-OSI USA: Barnwell County man arrested on Child Sexual Abuse Material* chargesRead More

    Source: US State of South Carolina

    (COLUMBIA, S.C.) – South Carolina Attorney General Alan Wilson announced the arrest of Steven Jeffrey Lynch, 62, of Blackville, S.C., on three charges connected to the sexual exploitation of minors. Internet Crimes Against Children (ICAC) Task Force investigators with the Barnwell County Sheriff’s Office made the arrest. Investigators with the Attorney General’s Office, also a member of the state’s ICAC Task Force, assisted with the investigation.

     

    Investigators received a CyberTipline report from the National Center for Missing and Exploited Children (NCMEC), which led them to Lynch. Investigators state Lynch possessed files of child sexual abuse material.

     

    Lynch was arrested on May 28, 2025. He is charged with three counts of sexual exploitation of a minor, third degree (§16-15-410), a felony offense punishable by up to 10 years imprisonment on each count.

     

    This case will be prosecuted by the Attorney General’s Office.

     

    Attorney General Wilson stressed all defendants are presumed innocent unless and until they are proven guilty in a court of law.

     

     

     

    * Child sexual abuse material, or CSAM, is a more accurate reflection of the material involved in these heinous and abusive crimes. “Pornography” can imply the child was a consenting participant.  Globally, the term child pornography is being replaced by CSAM for this reason.

    MIL OSI USA News –

    June 3, 2025
  • MIL-OSI Europe: Answer to a written question – Emergence and monitoring of DeepSeek – E-000712/2025(ASW)

    Source: European Parliament

    The Commission assesses on an ongoing basis possible security concerns associated with DeepSeek artificial intelligence (AI) models.

    Open-source general-purpose AI (GPAI) models, such as DeepSeek, placed on the EU market must comply with the GPAI obligations of the EU AI Act[1] if the models present systemic risks.

    These include technical documentation, model evaluations, assessment and mitigation of systemic risks, and cybersecurity protection. These rules enter into application on 2 August 2025 and will ensure that GPAI models available to EU users are safe and trustworthy.

    Moreover, any transfer of personal data to China by DeepSeek needs to take place in compliance with the EU’s General Data Protection Regulation (GDPR), which safeguards the fundamental right to privacy and personal data protection. The enforcement of the GDPR is the competence of the national data protection authorities in the Member States.

    The Commission also observes relevant developments in Member States and third countries . DeepSeek is banned on devices used in the Australian government and the Danish Parliament, while the Italian data protection authority blocked DeepSeek, as the model provider failed to comply with privacy rules. Taiwan advises against its use by government officials, and the United States are considering a government device ban.

    • [1] https://eur-lex.europa.eu/eli/reg/2024/1689/oj/eng.
    Last updated: 2 June 2025

    MIL OSI Europe News –

    June 3, 2025
  • MIL-OSI Europe: Answer to a written question – Risks of the Meta AI tool – E-001460/2025(ASW)

    Source: European Parliament

    The Commission is aware that certain aspects of Meta’s new Meta artificial intelligence (AI) feature fall within the scope of the Digital Services Act (DSA)[1] and is closely monitoring its deployment.

    Under the DSA, providers of designated Very Large Online Platforms, such as Facebook and Instagram, are required to diligently identify, analyse, assess, and mitigate systemic risks presented by their services in the EU.

    These risk assessments are mandated at least annually and must also occur prior to deploying any functionalities that could significantly impact a platform’s risk profile[2].

    The Commission’s DSA enforcement team is in continuous dialogue with Meta concerning the launch of their Meta AI feature. Meta is currently proactively cooperating with the Commission’s inquiries and is expected to submit to the Commission the related risk assessment report shortly.

    Upon its receipt, the Commission will carefully analyse all relevant documentation to verify compliance with the DSA and follow-up accordingly as appropriate.

    • [1] Regulation (EU) 2022/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market For Digital Services and amending Directive 2000/31/EC (Digital Services Act), OJ L 277, 27.10.2022, p. 1.
    • [2] Article 34(1) of the DSA.
    Last updated: 2 June 2025

    MIL OSI Europe News –

    June 3, 2025
  • MIL-OSI Europe: Answer to a written question – Transformation of the EU – from peace project to war economy – E-001164/2025(ASW)

    Source: European Parliament

    The European Union was founded as a peace project — and it remains one. But peace is not self-sustaining. In an era of rising threats, the Union and its Member States must be prepared to defend themselves and to deter any actor that seeks to challenge EU security or weaken EU democracies.

    The Union and its Member States need to be ready, even for the most extreme military contingencies such as armed aggression. This is the goal of the ReArm Europe Plan and the White Paper on European Defence — Readiness 2030[1].

    The Commission proposal for the Security Action for Europe (SAFE) instrument is fully in line with the Treaty. Once adopted, it will provide loans to Member States to help them boost their defence capabilities through common procurement. This will reinforce the competitiveness and readiness of the European defence industry.

    While defence remains firmly within national competence, and Member States retain full sovereignty over their armed forces — from doctrine to deployment — the EU plays a complementary role. The evolving security landscape requires enhanced cooperation among Member States, including in the field of defence.

    The Treaty on European Union, particularly Article 42, provides a legal basis for developing a Common Security and Defence Policy, which respects the specific character of national defence policies.

    Recent defence related initiatives aim to support and enhance national efforts, particularly by reinforcing the European Defence Technological and Industrial Base, which is a critical pillar of the EU’s overall defence readiness.

    • [1] https://commission.europa.eu/document/download/e6d5db69-e0ab-4bec-9dc0-3867b4373019_en?filename=White%20paper%20for%20European%20defence%20%E2%80%93%20Readiness%202030.pdf.
    Last updated: 2 June 2025

    MIL OSI Europe News –

    June 3, 2025
  • MIL-OSI Economics: Introducing Bing Video Creator: Create videos with your words for free

    Source: Microsoft

    Headline: Introducing Bing Video Creator: Create videos with your words for free

    Questions deserve answers, ideas beg for realization, and curiosity seeks satisfaction. Two years ago, we brought this belief forward with Bing Image Creator, helping users everywhere create whatever they can imagine through words—for free. Last month, we continued the next evolution of search with Copilot Search in Bing, blending the best of traditional and generative search to meet you where you are at in your discovery journey.

    Today we’re taking the next leap with Bing Video Creator, allowing you to turn your ideas into videos, for free. Powered by Sora, Bing Video Creator transforms your text prompts into short videos. Just describe what you want to see and watch your vision come to life. 

    [embedded content]
    Bing, as your AI-powered search and answer engine, not only helps you find what you need, but gives you the freedom to create exactly what you’re looking for. 

    Bing Video Creator is free and is rolling out starting today on the Bing Mobile App and coming soon to desktop and within Copilot Search. To get started, download the Bing Mobile app.

    Bringing creation to your fingertips

    Bing Video Creator represents our efforts to democratize the power of AI video generation. We believe creativity should be effortless and accessible to help you satisfy your answer-seeking process.

    Whether you’re letting your imagination run wild, bringing a story to life, or looking for that perfect video to communicate what you’re thinking, Bing Video Creator puts the power of video creation at your fingertips. We’re excited to empower anyone to turn their words into wonder through an AI-generated video.

    How to use Bing Video Creator

    Getting started with Bing Video Creator is easy. Open Video Creator within the Bing Mobile app by clicking on the menu in the bottom right corner and selecting “Video Creator.” You can also type directly into the Bing mobile app search bar “Create a video of…” for quick access to video creation. Once Bing Video Creator becomes available on desktop, you can visit Bing.com/create.

    Open the Bing app and click on the menu in the bottom right corner, then select “Video Creator.”

    Then, simply type in a description of the video you want to create in the prompt box. The best prompts provide additional context, description, and detail. Click “Create” and let AI generate your video. Feel free to continue dreaming up new videos – you’ll receive a notification when your video is ready to view. 

    Check out this fun prompt below: “In a busy Italian pizza restaurant, a small otter works as a chef and wears a chef’s hat and an apron. He kneads the dough with his paws and is surrounded by other pizza ingredients.”

    Videos are 5 seconds long and can be created in 9:16 format with 16:9 format coming soon. You can also queue up to three video generations at a time. If all three slots are in use, you’ll need to wait for one to finish before starting another.

    Once your video is done generating, you’ll receive a convenient notification informing you your video is ready. You can choose to download the video, share it via email or via your favorite social media platforms, or copy and a share a direct link to the video.

    Your creations are stored for up to 90 days, giving you plenty of time to download, share, or refine your prompts. 

    Video creation is free to all users, with the ability to choose between Fast and Standard generation speeds. Start with 10 Fast creations to let your imagination come to life in seconds. After that, keep the creative juices flowing uninterrupted by redeeming 100 Microsoft Rewards points for each Fast creation or continue with Standard creation speeds.*

    Bing Video Creator is rolling out starting today Worldwide (Excluding China and Russia).

    Use cases and inspiration

    Bing Video Creator is for anyone with a story to tell. Here are some ways you can use it:

    1. Special moments: Need a quick, compelling visual to commemorate a special moment? Generate a short video that brings it to life!

    2. Communication: Turn your idea into something easy to understand, a joke into a lasting memory, or add a customized experience to your everyday conversations. Or stand out in the scroll by sharing your creation to social media.

    3. Discover: Brainstorming is now easier than ever with the ability to test creative directions, explore different styles, bring to life objects, build mood boards, and more. It’s a great way to let your curiosity roam free and discover what you can imagine.

    Tips and tricks

    Whether you’re just starting out or looking to refine your AI-generated videos, these tips will help you unlock the full potential of Bing Video Creator.

    1. Be Descriptive with Your Prompts 
    The more vivid and specific your prompt, the better the results. Instead of “a person walking,” try “a young woman in a red coat walking through a snowy forest at sunrise.” The more detail, the better. Including camera angles and lighting also helps the model deliver what you are looking for.

    2. Use Action-Oriented and Scene-setting Language 
    Verbs like “dancing,” “exploring,” or “transforming” help the AI understand motion and intent, resulting in more dynamic visuals. Adjectives like “cinematic,” “sunny,” or “dreamy,” help craft the overall feeling of the video.

    3. Experiment with Tone and Style 
    Want something cinematic? Add “in the style of a movie trailer.” Looking for something playful? Try “animated like a cartoon.” Prompt modifiers can dramatically shift the aesthetic

    Responsible AI

    At Microsoft, our teams are guided by our Responsible AI principles and the Responsible AI Standard to help them develop and deploy AI systems responsibly. To curb the potential misuse of Video Creator, we have utilized OpenAI’s existing Sora safeguards and incorporated additional protections to deliver an experience that encourages responsible use of Video Creator. For example, we have put controls in place that aim to limit the generation of harmful or unsafe videos. When our system detects that a potentially harmful video could be generated by a prompt, it blocks the prompt and warns the user. For each video created using Bing Video Creator we have implemented content credentials and provenance based on the C2PA standard to help users identify AI generated videos. 

    Try Bing Video Creator today

    We’re excited to see what you create with Bing Video Creator. We’re continuing to refine and evolve the experience as we bring video generation to more users. Try Bing Video Creator today: https://aka.ms/TryBingVideoCreator

    The Bing team

    *Up to 10 Fast creations per user. Thereafter, creations will be processed at the Standard speed. To continue using Fast creations, users may redeem 100 Microsoft Rewards points for each video. Learn more about earning Rewards points here.

    MIL OSI Economics –

    June 3, 2025
  • MIL-OSI Economics: Researcher and Analyst now generally available in Microsoft 365 Copilot

    Source: Microsoft

    Headline: Researcher and Analyst now generally available in Microsoft 365 Copilot

    We’re excited to announce the general availability of Researcher and Analyst, two first-of-their-kind reasoning agents designed specifically for work.

    Today, we’re excited to announce the general availability of Researcher and Analyst, two first-of-their-kind reasoning agents designed specifically for work. Since these agents debuted in April through the Frontier program, early users are increasingly turning to them to complete complex, analytical work in minutes—saving time and resources.1 Now, these powerful agents are available to everyone with a Microsoft 365 Copilot license.

    Researcher helps you tackle multi-step research at work—delivering insights with greater quality and accuracy than previously possible. It combines OpenAI’s deep research model with Microsoft 365 Copilot’s advanced orchestration and deep search capabilities. Early adopters have used Researcher to quickly assess the impact of tariffs on business lines, prepare for vendor negotiations, and gather client insights ahead of sales calls.

    Analyst thinks like a skilled data scientist, so you can go from raw data to insights in minutes. Built on OpenAI’s o3-mini reasoning model and optimized to do advanced data analysis at work, Analyst uses chain-of-thought reasoning to progress through problems iteratively, taking as many steps as necessary to refine its reasoning and provide a high-quality answer that mirrors human analytical thinking. It can run Python to tackle your most complex data queries—and you can view the code it’s running in real time and check its work. Early adopters have used Analyst to assess how discounts affect customer behavior, identify top customers who aren’t fully using products they’ve purchased, and visualize product sentiment and usage trends to inform go-to-market decisions.

    How to get started with Researcher and Analyst

    With built-in access, flexible usage, and growing language support, reasoning agents are now easy to find and use in the Microsoft 365 Copilot app. Researcher and Analyst are pre-pinned in the app, and any user with a Microsoft 365 Copilot license can run up to 25 combined queries per month. Researcher supports 37 languages, while Analyst is available in eight—with more coming soon.

    Whether you’re an end user or an admin, getting started is simple. Copilot administrators can manage Researcher and Analyst by following these instructions. And users can get started and see value fast by using the sample prompts in each agent—no need to start from scratch.

    Of course, you can also tailor your own prompts to fit specific needs. For example, here’s one that Steve Clayton, Vice President for Communications Strategy at Microsoft, gave to Researcher: Help me build a list of 200 important, impactful, or notable Microsoft product releases chronologically. Please provide this as a table. The headings should be 1) product name 2) year released 3) category—such as game, operating system, developer language or tool, hardware. Please be sure to only use authoritative sources for this research and triple check the answers, especially the dates. The timeline is 1975 to 2025.

    Based on Researcher’s response, Steve and his team created this periodic table for our new company magazine, Signal:

    Try Researcher and Analyst today in Microsoft 365 Copilot Chat

    This announcement furthers our ambition to empower every employee with a Copilot and transform every business process with agents. With Researcher and Analyst, expertise is right at your fingertips. If you have a Microsoft 365 Copilot license, try them today in Copilot Chat.

    Try Copilot Chat today

    1The Frontier program gives customers with a Microsoft 365 Copilot license early access to new Copilot innovations while they’re still in development.

    MIL OSI Economics –

    June 3, 2025
  • MIL-OSI Russia: IMF Executive Board Concludes 2025 Article IV Consultation with Cyprus

    Source: IMF – News in Russian

    June 2, 2025

    • Growth is expected to decelerate to 2.5 percent in 2025 and stabilize at 3 percent in the medium term as Cyprus shifts towards more investment-driven growth.
    • The fiscal surplus reached an impressive 4.3 percent of GDP in 2024, while public debt declined to 65 percent of GDP. Fiscal policy should continue to prioritize debt reduction to further build buffers against potential shocks.
    • The banking sector boasts substantial capital and liquidity buffers, with financial risks appearing well-contained. The recent tightening of the macroprudential policy stance, will further enhance these financial buffers.

    Washington, DC: The Executive Board of the International Monetary Fund (IMF) completed the Article IV Consultation for Cyprus and endorsed the staff appraisal without a meeting.[1] The authorities have consented to the publication of the Staff Report prepared for this consultation.[2]

    In 2024, Cyprus’s growth accelerated to 3.4 percent—one of the highest rates in the euro area (EA)—driven by a strong tourism season, continued Information and Communication Technology (ICT) sector expansion, and robust public and private consumption. While inflation has remained volatile, it has generally decreased, with headline inflation falling to 2.1 percent by March 2025. Fiscal performance continues to be very strong, with the fiscal surplus increasing to 4.3 percent of GDP in 2024, supported by robust tax revenues. As a result, public debt has declined to 65 percent of GDP by the end of 2024, while cash buffers remain large. Financial conditions remain tight, accompanied by subdued credit growth. Nevertheless, the banking sector possesses sizable capital and liquidity buffers, and overall banking sector risks appear contained.

    Growth is expected to moderate to 2.5 percent in 2025 before reaching 3 percent in the medium term, driven by higher investment and structural reforms. Inflation is anticipated to hit the 2 percent target later this year, supported by moderating growth and lower oil prices. Near-term risks are tilted to the downside, including from elevated uncertainty from global trade tensions. In contrast, longer-term risks are more balanced, with risks on insufficient progress on structural reforms acting against the upside potential of Cyprus’s evolving business model.

    Executive Board Assessment

    In concluding the 2025 Article IV consultation with Cyprus, Executive Directors endorsed staff’s appraisal, as follows:

    Cyprus has demonstrated remarkable economic resilience, with growth among the highest in the EA. This strong performance is underpinned by robust service exports and domestic consumption. The labor market remains tight, characterized by a declining unemployment rate and elevated job vacancy levels. While uncertainties persist, there are indications of potential overheating in the economy. This, along with tariff-related trade disruption, will lead growth to moderate this year. While volatile, inflation is projected to stabilize around 2 percent by the end of the year. The current account deficit is estimated to have moderated in 2024, but the external position is assessed to be weaker than the level implied by fundamentals.

    The immediate outlook presents downside risks, while longer-term risks appear more balanced. An escalation of trade conflicts—particularly if this broadened to include services trade and FDI—poses an important downside risk. An escalation of regional tensions, and possible new energy price shocks, could affect FDI, tourism, and inflation. Domestically, there are concerns about further overheating, which may arise from a more accommodative fiscal policy. In the medium-to-long term, investment-driven growth will rely on continuous progress in structural reforms. On the upside, Cyprus’s agile and dynamic economy offers substantial potential for growth.

    Cyprus’s strong fiscal position has reduced vulnerabilities. In 2024, the primary fiscal surplus reached 5.6 percent, fueled by significant revenue growth that more than compensated for increased public wages and social transfers. As a result, public debt decreased to 65 percent of GDP by the end of 2024, with substantial cash reserves supporting liquidity. This further increased resilience, built policy space for future shocks, and improved investor sentiment.

    Fiscal policy should continue to prioritize debt reduction. Given overheating risks, it is crucial to avoid new discretionary measures that would ease fiscal policy and add to inflationary pressures. Instead, efforts should focus on reducing debt well below 60 percent of GDP, thereby ensuring a robust buffer against potential shocks. The authorities’ commitment to maintaining fiscal surpluses through 2028, as specified in the MTFSP under the new EU economic governance framework, supports this goal.

    As spending pressures increase, careful management of fiscal space is essential. The financial commitments required for achieving climate and digital transitions will persist beyond the end of EU RRP funding. Additionally, an aging population will necessitate higher expenditures on pensions and healthcare, alongside other long-term expenditures. As a result, the scope for fiscal loosening in the medium term is constrained.

    Public spending should emphasize investment while retaining flexibility in response to economic shocks. Capital expenditures should take precedence to enhance potential growth and facilitate the climate transition. At the same time, expanding current spending—such as increasing public wages, broadening subsidies, or introducing untargeted social programs—should be avoided. Specifically, the authorities should resist further increases to the COLA indexation or new ad-hoc salary increases to contain the existing substantial public-private wage gap and prevent additional pressure on real wage growth.

    The banking sector boasts substantial capital and liquidity buffers, with financial risks appearing well-contained. Profitability metrics have reached record highs for the second consecutive year, and capitalization levels are now among the highest in Europe. Despite elevated interest rates, asset quality continues to improve, supported by strong economic growth. Nonetheless, ongoing vigilance is essential, particularly concerning the real estate sector.

    Recent tightening of the macroprudential policy stance will enhance financial buffers further. The announced increase in the CCyB will bolster resilience by securing already high capital buffers without adversely affecting credit availability or economic growth. In the future, careful calibration of macroprudential policies should continue to strike a balance between financial stability and effective credit intermediation.

    Although legacy NPLs continue to decrease, they remain at elevated levels. Most NPLs have been successfully transitioned away from the banking sector and do not pose a significant issue for financial stability. The ongoing resolution of legacy NPLs is expected to accelerate, given the full operationalization of the foreclosure framework and a strong uptake of the mortgage-to-rent scheme. Resolving legacy NPLs is expected to help mobilize domestic capital.

    Structural reforms aimed at enhancing judicial efficiency and boosting labor productivity are vital for fostering long-term growth. With employment levels already high, capital deepening will increasingly drive growth. Consequently, policies must create a stable and streamlined business environment conducive to investment. Additional efforts are required in the judicial sector to strengthen the institutional framework for insolvency and creditor rights and to improve court efficiency. Labor policies should focus on addressing skill gaps and mismatches and engaging remaining segments of the labor force, particularly among youth and the long-term unemployed.

    Key energy projects and reforms must be expedited to reduce energy costs, enhance energy security, and fulfill climate commitments. Completing the LNG terminal and improving electricity interconnectedness would represent significant progress toward these objectives. Additionally, increasing competition in the electricity market would help lower costs and emissions through market forces. The planned introduction of green taxation would further facilitate the energy transition.

    Maintaining a strong AML framework is vital for mitigating reputational risks and business uncertainty. Ongoing efforts to broaden the definition of obliged entities for AML supervision are commendable. Furthermore, the proposed establishment of the National Sanctions Implementation Unit at the Ministry of Finance will enhance clarity for reporting entities regarding compliance with sanctions.

    Table 1. Cyprus: Selected Economic Indicators, 2021–2030

     

    2021

    2022

    2023

    2024

    2025

    2026

    2027

    2028

    2029

    2030

     

     

     

     

     

    Projections

    Real Economy

    (Percent change, unless otherwise indicated)

       Real GDP

    11.4

    7.2

    2.8

    3.4

    2.5

    2.7

    3.0

    3.0

    3.0

    3.0

     Domestic demand

    5.6

    8.5

    5.2

    0.7

    4.6

    3.6

    3.6

    3.5

    3.4

    3.2

       Consumption

    5.7

    8.5

    4.8

    3.3

    3.2

    2.6

    2.8

    2.9

    2.8

    2.8

         Private consumption

    4.7

    9.8

    5.9

    3.8

    2.8

    2.9

    3.2

    3.2

    3.2

    3.1

         Public consumption

    8.9

    4.7

    1.2

    1.5

    4.4

    1.4

    1.2

    1.7

    1.7

    1.7

    Gross capital formation

    5.0

    8.5

    6.6

    -9.5

    10.5

    7.8

    7.0

    6.0

    5.5

    4.5

     Foreign balance 1/

    5.8

    -1.1

    -2.3

    3.0

    -1.9

    -0.9

    -0.7

    -0.5

    -0.4

    -0.3

       Exports of goods and services

    27.2

    27.1

    -2.8

    5.3

    4.0

    4.1

    4.0

    4.0

    4.0

    4.0

       Imports of goods and services

    19.6

    29.7

    -0.7

    2.4

    6.1

    5.1

    4.6

    4.5

    4.4

    4.2

    Potential GDP growth

    5.5

    6.1

    4.4

    3.3

    3.0

    2.9

    2.9

    3.0

    3.0

    3.0

    Output gap (percent of potential GDP)

    0.9

    2.0

    0.4

    0.6

    0.2

    -0.1

    0.0

    0.0

    0.0

    0.0

    HICP (period average, seasonally-adjusted)

    2.3

    8.1

    3.9

    2.3

    2.2

    2.0

    2.0

    2.0

    2.0

    2.0

    HICP (end of period, seasonally-adjusted)

    4.8

    7.6

    1.9

    3.1

    2.0

    2.0

    2.0

    2.0

    2.0

    2.0

    GDP deflator

    3.0

    6.7

    3.8

    3.5

    4.7

    1.6

    1.5

    1.5

    1.5

    1.6

    Unemployment rate (percent, period average)

    7.2

    6.3

    5.8

    4.9

    4.8

    5.0

    5.0

    5.0

    5.0

    5.0

    Employment growth (percent, period average)

    3.5

    5.0

    2.8

    1.5

    0.9

    0.8

    0.9

    0.8

    0.8

    0.8

    Labor force

    3.0

    4.0

    2.3

    0.4

    0.8

    1.0

    0.9

    0.8

    0.8

    0.8

    Public Finance

    (Percent of GDP, unless otherwise indicated)

       General government balance

    -1.6

    2.7

    1.7

    4.3

    3.8

    3.5

    2.4

    2.1

    1.9

    1.6

          Revenue

    41.0

    40.6

    43.7

    44.3

    44.7

    44.3

    43.3

    43.2

    43.2

    43.2

          Expenditure

    42.6

    38.0

    42.0

    40.0

    40.9

    40.8

    40.8

    41.1

    41.4

    41.6

       Primary Fiscal Balance

    0.1

    4.0

    3.0

    5.6

    5.2

    4.8

    3.8

    3.4

    3.1

    2.9

       General government debt

    96.5

    81.1

    73.6

    65.1

    60.2

    54.9

    49.7

    44.5

    41.2

    38.3

    Balance of Payments

       Current account balance

    -5.4

    -5.4

    -9.7

    -6.1

    -7.1

    -7.7

    -8.2

    -8.7

    -9.1

    -9.4

          Trade Balance (goods and services)

    4.7

    3.6

    1.0

    3.6

    2.5

    1.8

    1.1

    0.5

    0.2

    0.0

             Exports of goods and services

    90.8

    105.6

    97.2

    96.7

    95.8

    97.4

    98.4

    99.5

    100.5

    101.5

             Imports of goods and services

    86.1

    102.0

    96.1

    93.1

    93.2

    95.6

    97.3

    98.9

    100.3

    101.6

          Goods balance

    -16.9

    -19.7

    -23.7

    -20.4

    -20.4

    -21.4

    -22.4

    -23.3

    -24.2

    -24.9

          Services balance

    21.6

    23.3

    24.7

    24.0

    22.9

    23.2

    23.5

    23.9

    24.4

    24.9

          Primary income, net

    -8.9

    -7.9

    -9.6

    -8.9

    -8.6

    -8.5

    -8.4

    -8.3

    -8.3

    -8.3

          Secondary income, net

    -1.2

    -0.7

    -1.1

    -0.8

    -1.0

    -1.0

    -1.0

    -1.0

    -1.0

    -1.0

    Capital account, net

    0.2

    0.1

    -0.1

    0.2

    0.2

    0.2

    0.1

    0.1

    0.1

    0.1

    Financial account, net

    -7.6

    -6.2

    -8.7

    -5.9

    -6.9

    -7.5

    -8.2

    -8.6

    -9.1

    -9.3

       Direct investment

    -3.3

    -27.2

    -21.0

    -18.0

    -18.0

    -18.1

    -18.3

    -18.3

    -18.5

    -18.6

       Portfolio investment

    3.9

    3.9

    11.0

    4.9

    5.8

    3.6

    4.2

    3.5

    1.5

    2.6

       Other investment and financial derivatives

    -9.6

    16.8

    1.2

    7.2

    5.3

    7.0

    5.9

    6.2

    7.9

    6.7

       Reserves ( + accumulation)

    1.4

    0.3

    0.0

    0.0

    0.0

    0.0

    0.0

    0.0

    0.0

    0.0

    Program financing 2/

    0.0

    0.0

    0.0

    0.0

    -1.0

    -2.7

    -2.5

    -2.4

    -2.4

    -2.0

    Errors and omissions

    -2.5

    -0.9

    1.1

    0.0

    0.0

    0.0

    0.0

    0.0

    0.0

    0.0

    Saving-Investment Balance

    National saving

    13.8

    14.9

    11.8

    14.4

    13.7

    13.6

    13.4

    13.3

    13.2

    13.1

      Government

    1.8

    5.8

    6.7

    7.9

    7.8

    7.3

    6.3

    6.1

    6.1

    5.8

      Non-government

    12.0

    9.0

    5.1

    6.5

    5.9

    6.3

    7.1

    7.2

    7.1

    7.3

    Gross capital formation

    19.2

    20.3

    21.4

    20.5

    20.8

    21.3

    21.7

    22.1

    22.4

    22.5

      Government

    3.5

    3.2

    5.0

    3.6

    3.9

    3.8

    3.9

    4.1

    4.2

    4.2

      Private

    15.8

    17.1

    16.4

    16.9

    16.9

    17.4

    17.7

    18.0

    18.1

    18.2

    Foreign saving

    -5.4

    -5.4

    -9.7

    -6.1

    -7.1

    -7.7

    -8.2

    -8.7

    -9.1

    -9.4

    Memorandum Item:

       Nominal GDP (billions of euros)

    25.7

    29.4

    31.3

    33.6

    36.0

    37.6

    39.3

    41.1

    42.9

    44.9

       Structural primary balance

    -0.4

    3.3

    2.6

    5.3

    5.2

    4.8

    3.8

    3.4

    3.1

    2.9

    External debt

    994.1

    879.7

    828.3

    767.6

    706.8

    669.0

    631.4

    595.8

    564.1

    534.0

    Net IIP

    -105.7

    -95.2

    -92.7

    -98.5

    -99.3

    -102.6

    -106.9

    -111.7

    -114.6

    -118.8

    Sources: Cystat, Eurostat, Central Bank of Cyprus, and IMF staff estimates.

    1/ Contribution to real GDP growth

    2/  Program financing (+ purchases, – repurchases) is included under the Financial Account, with consistent sign conversion

    [1] Under Article IV of the IMF’s Articles of Agreement, the IMF holds bilateral discussions with members, usually every year. A staff team visits the country, collects economic and financial information, and discusses with officials the country’s economic developments and policies. On return to headquarters, the staff prepares a report, which forms the basis for discussion by the Executive Board. The Executive Board takes decisions under its lapse-of-time procedure when the Board agrees that a proposal can be considered without convening formal discussions.

    [2] Under the IMF’s Articles of Agreement, publication of documents that pertain to member countries is voluntary and requires the member consent. The staff report will be shortly published on the www.imf.org/cyprus page.

    IMF Communications Department
    MEDIA RELATIONS

    PRESS OFFICER: Boris Balabanov

    Phone: +1 202 623-7100Email: MEDIA@IMF.org

    @IMFSpokesperson

    https://www.imf.org/en/News/Articles/2025/06/02/pr-25171-cyprus-imf-concludes-2025-art-iv-consultation

    MIL OSI

    MIL OSI Russia News –

    June 3, 2025
  • MIL-OSI Global: What are Canada’s governing Liberals going to do about AI?

    Source: The Conversation – Canada – By Jake Pitre, PhD Candidate in Film & Moving Image Studies, Concordia University

    Fresh off his election victory, Prime Minister Mark Carney has been focused on standing up to Donald Trump’s claims on Canada as the 51st state and American tariffs. But while that political drama unfolds, one topic that seems to have quietly slipped under the radar is the rise of artificial intelligence.

    Despite its transformative impact on everything from jobs to national security, AI received surprisingly little attention during the campaign and in the first weeks following Carney’s victory. The consequences of that lack of attention are already starting to show, as emissions and electricity costs continue unabated without a clear vision of where AI fits in.




    Read more:
    Anxious over AI? One way to cope is by building your uniquely human skills


    Although Carney has appointed former journalist Evan Solomon as Canada’s first-ever AI minister, it’s not yet clear what action the Liberal government plans to take on AI.

    The Liberals’ “Canada Strong” plan outlining the prime minister’s proposals is scarce on details. Still, it provides some clues on how the Liberals see AI and what they believe it offers to the Canadian economy — and also what they seem to have misunderstood.

    Economy of the future?

    First, the plan includes some robust initiatives for improving Canada’s digital infrastructure, which lags behind other leading countries, especially in terms of rural broadband and reliable cell service.

    To accomplish these goals, the Liberals say they’ll incentivize investment by “introducing flow-through shares to our Canadian startup ecosystem…to raise money faster” for AI and other technologies.

    In other words, they will reuse the model of mining and oil companies whereby investors can claim a tax deduction for the same amount as their investment. A major question is whether Canada’s investment ecosystem has enough big players willing to take these risks.

    The plan gets less promising as it comes to the implementation of AI within “the economy of tomorrow.”

    The Liberals say they plan to build more data centres, improve computing capacity and create digital supply chain solutions “to improve efficiency and reduce costs for Canadians.”

    All that that sounds OK — so far. But how will they do this?

    Connecting AI with Armed Forces

    The Liberals plan to establish the Bureau of Research, Engineering and Advanced Leadership in Science (BOREALIS), linking AI development directly to the Canadian Armed Forces and the Communications Security Establishment Canada, which provides the federal government with information technology security and foreign signals intelligence.

    This approach to AI is focused on what it offers to Canada’s defence, whether by manufacturing semiconductors or improving intelligence gathering, so that it can rely less on the U.S. Similarly, Canadian defence tech firms will access funding to help reduce dependence on American suppliers and networks.

    The Liberals are pledging sovereignty and autonomy for Canada’s defence and security, all enabled by “the construction and development of AI infrastructure.”

    What goes unsaid is the intense power needs of data centres, and the consequences for emissions and climate action of “building the next generation of data centres” in Canada.

    Climate concerns

    New data centres cannot be built without also constructing more renewable energy infrastructure, and none of this addresses emissions or climate change.

    If the centres crop up in big numbers as planned, Canadians could also see their electricity costs go up or become less reliable.

    That’s because finding space within the existing grid is not as easy as it may sound when AI data centres require over 100 megawatts (MW) of electricity demand versus five to 10 MW for a regular centre.

    With the rapidly evolving market for AI-based data centres, Canadian policymakers need to provide clear guidance to utilities in terms of their current decisions on competing industrial-scale demands. As the Canadian Climate Institute points out: “Anything less risks higher rates, increased emissions, missed economic opportunities — or all of the above.”

    So far, the Liberal plan fails to address any of these concerns.

    A Canadian department of efficiency?

    What else does the “economy of tomorrow” hold?

    Apparently, it means more efficient government. According to the Liberal plan, AI “is how government improves service delivery, it is how government keeps up with the speed of business, and it is how government maximizes efficiency and reduces cost.”

    Despite otherwise clashing with the Trump administration, this language is reminiscent of Elon Musk’s Department of Government Efficiency (DOGE), which has also centred its use of AI.




    Read more:
    DOGE’s AI surveillance risks silencing whistleblowers and weakening democracy


    The Liberals will open an Office of Digital Transformation, which aims to get rid of red tape and “reduce barriers for businesses to operate in Canada.”

    They don’t seem to really know what this would actually look like, however. They say: “This could mean using AI to address government service backlogs and improve service delivery times, so that Canadians get better services, faster.”

    Their fiscal plan points out that this frame of thinking applies to every single expenditure: “We will look at every new dollar being spent through the lens of how AI and technology can improve service and reduce costs.”

    The economy will also benefit, the government argues, from AI commercialization, with $46 million pegged over the next four years to connect AI researchers with businesses.

    This would work alongside a tax credit for small and medium-sized businesses to “leverage AI to boost their bottom lines, create jobs, and support existing employees.”

    But a new report by Orgvue, the organizational design and planning software platform, shows that over half of businesses that rushed to impose AI just ended up making their employees redundant without clear gains in productivity.

    Creating a tax credit for smaller companies to introduce AI seems like a recipe for repeating the same mistake.

    Protect Canadians with good AI policy

    Much of the Liberal plan seems to involve taking risks. There’s a shortsightedness on this rapidly advancing technology that requires significant guardrails.

    The government seem to view AI as a solutions machine, buying into the hype around it without taking the time to understand it.

    As policy is properly hashed out in the weeks and months to come, the Liberals’ feet will have to be held to the fire on the issue of AI. Canadians must benefit from its limited uses and be protected from its abuses.

    Jake Pitre does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. What are Canada’s governing Liberals going to do about AI? – https://theconversation.com/what-are-canadas-governing-liberals-going-to-do-about-ai-257537

    MIL OSI – Global Reports –

    June 3, 2025
  • MIL-OSI Banking: Cyberthreat names to align and get more clarity with new industry collaboration

    Source: Microsoft

    Headline: Cyberthreat names to align and get more clarity with new industry collaboration

    In today’s cyberthreat landscape, even seconds of delay can mean the difference between stopping a cyberattack or falling victim to ransomware. One major cause of delayed response is understanding threat actor attribution, which is often slowed by inaccurate or incomplete data as well as inconsistencies in naming across platforms. This, in turn, can reduce confidence, complicate analysis, and delay response. As outlined in the National Institute of Standards and Technology’s (NIST) guidance on threat sharing (SP 800-1501), aligning how we describe and categorize cyberthreats can improve understanding, coordination, and overall security posture.

    That’s why we are excited to announce that Microsoft and CrowdStrike are teaming up to create alignment across our individual threat actor taxonomies. By mapping where our knowledge of these actors align, we will provide security professionals with the ability to connect insights faster and make decisions with greater confidence.

    Read about Microsoft and Crowdstrike’s joint threat actor taxonomy

    Names are how we make sense of the threat landscape and organize insights into known or likely cyberattacker behaviors. At Microsoft, we’ve published our own threat actor naming taxonomy to help researchers and defenders identify, share, and act on our threat intelligence, which is informed by the 84 trillion threat signals that we process daily. But the same actor that Microsoft refers to as Midnight Blizzard might be referred to as Cozy Bear, APT29, or UNC2452 by another vendor. Our mutual customers are always looking for clarity. Aligning the known commonalities among these actor names directly with peers helps to provide greater clarity and gives defenders a clearer path to action.

    Introducing a collaborative reference guide to threat actors

    Microsoft and CrowdStrike are publishing the first version of our joint threat actor mapping. It includes:

    • A list of common actors tracked by Microsoft and CrowdStrike mapped by their respective taxonomies.
    • Corresponding aliases from each group’s taxonomy.

    This reference guide serves as a starting point, a way to translate across naming systems so defenders can work faster and more efficiently, especially in environments where insights from multiple vendors are in play. This reference guide helps to:

    • Improve confidence in threat actor identification.
    • Streamline correlation across platforms and reports.
    • Accelerate defender action in the face of active cyberthreats.

    This effort is not about creating a single naming standard. Rather, it’s meant to help our customers and the broader security community align intelligence more easily, respond faster, and stay ahead of threat actors.

    Looking ahead

    This initial taxonomy mapping is a collaboration between Microsoft and CrowdStrike. Google/Mandiant and Palo Alto Networks Unit 42 will also be contributing to this effort. We look forward to sharing updates from those collaborations in the near future. Security is a shared responsibility, requiring community-wide efforts to improve defensive measures. We are excited to be teaming up with CrowdStrike and we look forward to others joining us on this journey.

    Read the taxonomy mapping from Microsoft and Crowdstrike

    To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (Microsoft Security) and X (@MSFTSecurity) for the latest news and updates on cybersecurity.



    1SP 800-150, Guide to Cyber Threat Information Sharing, NIST Computer Security Research Center. October 2016.

    MIL OSI Global Banks –

    June 3, 2025
  • MIL-OSI Security: JOHN P. HEEKIN SWORN IN AS U. S. ATTORNEY FOR THE NORTHERN DISTRICT OF FLORIDA

    Source: Office of United States Attorneys

    TALLAHASSEE, FLORIDA – John P. “Jack” Heekin took the oath of office this morning from Chief District Judge Mark E. Walker to become the 42nd U.S. Attorney for the Northern District of Florida.  Mr. Heekin was appointed by Attorney General Pam Bondi as the interim United States Attorney for the Northern District of Florida on May 6, 2025, and was nominated to that office by President Donald Trump that same day. Mr. Heekin succeeds Michelle Spaven, who was named Acting U.S. Attorney in early February of 2025.

    U.S. Attorney Heekin said: “I am deeply honored to serve as the U.S. Attorney for the Northern District of Florida, and look forward to working alongside our outstanding prosecutors, support staff, and law enforcement partners to keep our communities safe. Together, we will fulfill the commitment to public safety advanced by President Donald J. Trump and Attorney General Pam Bondi, and we will make the Northern District of Florida the safest place in America to live, work, and raise a family.”

    As U.S. Attorney, Mr. Heekin is the top-ranking federal law enforcement official in the Northern District of Florida, which includes Florida’s 23 panhandle counties, from Escambia in the west to Alachua in the east.  The district has offices in Pensacola, Tallahassee, and Gainesville.  The office is responsible for prosecuting federal crimes in the district, including crimes related to terrorism, public corruption, child exploitation, human trafficking, financial fraud, health care fraud, firearms, and narcotics.  The office also defends the United States in civil cases and collects debts owed to the United States.

    U.S. Attorney Heekin recently served as the Deputy Chief of Staff and General Counsel to U.S. Senator Rick Scott (FL) in Washington, D.C., covering a legislative policy portfolio related to the federal judiciary, immigration, law enforcement & criminal justice, and constitutional issues, and advising the Senator on judicial and executive nominations.

    Prior to that, USA Heekin served in the administration of Governor Rick Scott as his Chief Deputy General Counsel, and later as Deputy Chief of Staff, overseeing the Governor’s criminal justice agencies, including the Florida Department of Corrections, the Department of Juvenile Justice, the Florida Department of Law Enforcement, the Department of Highway Safety and Motor Vehicles, and the Commission on Offender Review.  He also served as the Governor’s Executive Clemency Advisor and oversaw the execution of death warrants for Florida’s death row inmates.  He acted as Chief Counsel to the Governor’s Financial Emergency Board for Opa-locka and served as the General Counsel to the Governor and Florida Cabinet sitting as the Administration Commission and the Florida Land and Water Adjudicatory Commission.  He began his legal career as an Assistant State Attorney prosecuting criminal offenses for the 15th Judicial Circuit of Florida in Palm Beach County.

    He earned a Bachelor’s degree from Bucknell University, and his Juris Doctor with a certificate in Comparative and International Law from the Columbus School of Law, Catholic University of America, where he graduated cum laude.  While in law school, he authored two published works: “Leashing the Internet Watchdog: Legislative Restraints on Electronic Surveillance in the U.S. and U.K.,” published in The American Intelligence Journal (Vol. 28, No. 1 (Fall 2010)), and “ADHD and the New Americans with Disabilities Act: Expanded Legal Recognition for Cognitive Disorders,” published in The William & Mary Policy Review (Vol. II, No. 1 (Fall 2010)).

    He is a member of the Florida Bar, the District of Columbia Bar, the U.S. Supreme Court Bar, the Federalist Society, and the Republican National Lawyers Association.

    U.S. Attorney Heekin recognized Ms. Spaven for her exemplary service to the U.S. Attorney’s Office for the Northern District of Florida and North Florida communities.  Ms. Spaven will continue her career with the U.S. Attorney’s Office as First Assistant U.S. Attorney.

    His primary office will be in Tallahassee.

    The United States Attorney’s Office for the Northern District of Florida is one of 94 offices that serve as the nation’s principal litigators under the direction of the Attorney General.  To access public court documents online, please visit the U.S. District Court for the Northern District of Florida website.  For more information about the United States Attorney’s Office, Northern District of Florida, visit http://www.justice.gov/usao/fln/index.html.

    MIL Security OSI –

    June 3, 2025
  • MIL-OSI Security: Topeka farmer indicted for defrauding federal government

    Source: Office of United States Attorneys

    TOPEKA, KAN. – A federal grand jury in Topeka returned an indictment charging a Kansas man with defrauding the federal government, by selling crops that he used as collateral for a federal government loan.

    According to court documents, Steven W. Porubsky, 48, of Topeka is charged with one count of conversion of mortgaged collateral.

    Porubsky is accused of intentionally defrauding the Farm Service Agency, which is part of the U.S. Department of Agriculture (USDA), by converting to his own use agricultural products that were mortgaged to the USDA.

    The U.S. Department of Agriculture is investigating the case.

    Assistant U.S. Attorney Lindsey Debenham is prosecuting the case.

    OTHER INDICTMENTS

    Jesse J. Rivera, 43, of Topeka was indicted on one count of theft of government property. The Railroad Retirement Board is investigating the case. Assistant U.S. Attorney Lindsey Debenham is prosecuting the case.

    An indictment is merely an allegation, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    ###

    MIL Security OSI –

    June 3, 2025
  • MIL-OSI: Quantum eMotion Closes Brokered LIFE Financing of $12,000,000

    Source: GlobeNewswire (MIL-OSI)

    NOT FOR DISTRIBUTION TO THE U.S. NEWSWIRE SERVICES OR DISSEMINATION IN THE UNITED STATES

    MONTREAL, June 02, 2025 (GLOBE NEWSWIRE) — Quantum eMotion Corp. (“QeM” or the “Corporation”) (TSX.V: QNC; OTCQB: QNCCF; F: 34Q0) is pleased to announce that it has closed its previously announced best efforts brokered private placement for total gross proceeds of $12,000,000 (the “Offering”), consisting of the issuance of 8,000,000 units of the Corporation (each a “Unit”) at a price of $1.50 per Unit (the “Offering Price”), pursuant to the listed issuer financing exemption (the “LIFE Exemption”) under Part 5A of National Instrument 45-106 – Prospectus Exemptions (“NI 45-106”). A.G.P. Canada Investments ULC (the “Agent”) acted as sole bookrunner for the Offering and A.G.P./Alliance Global Partners acted as the sole U.S. agent to the Corporation in connection with the Offering.

    Each Unit consists of (i) one common share in the capital of the Corporation (a “Share”), and (ii) one common share purchase warrant (a “Warrant”). Each Warrant entitles its holder to acquire one additional common share (a “Warrant Share”) of the Corporation at a price of $1.82 for a period of 3 years from the date of issuance.

    The Corporation intends to use the net proceeds raised from the Offering to accelerate the pace of its research and development (“R&D”) efforts, expand the R&D team, hire staff for the commercialization initiatives underway and for general working capital purposes.

    Subject to compliance with applicable regulatory requirements and in accordance with NI 45-106, the securities issued pursuant to the LIFE Exemption are expected to be immediately freely tradeable and will not be subject to a hold period under applicable Canadian securities laws.

    There is an offering document related to the Offering that can be accessed under the Corporation’s profile at www.sedarplus.ca and on the Corporation website at https://www.quantumemotion.com/.

    As consideration for their services, the Agent has received an aggregate cash fee equal to 6.0% of the gross proceeds of the Offering. In addition, the Corporation issued to the Agent non-transferable warrants (the “Agent Warrants”) representing 4.0% of the aggregate number of Units issued pursuant to the Offering. Each Agent Warrant entitles its holder to purchase one common share of the Corporation at price of $1.66 for a 30-month period from the date of issuance.

    This news release does not constitute an offer to sell or a solicitation of an offer to buy nor shall there be any sale of any of the securities in any jurisdiction in which such offer, solicitation or sale would be unlawful, including any of the securities in the United States. The securities have not been and will not be registered under the U.S. Securities Act or any state securities laws and may not be offered or sold within the United States unless registered under the U.S. Securities Act and applicable state securities laws, or an exemption from such registration requirements is available.

    About QeM

    The Corporation’s mission is to address the growing demand for affordable hardware and software security for connected devices. QeM has become a pioneering force in classical and quantum cybersecurity solutions thanks to its patented Quantum Random Number Generator, a security solution that exploits the built-in unpredictability of quantum mechanics and promises to provide enhanced protection for high-value assets and critical systems.

    The Corporation intends to target highly valued Financial Services, Healthcare, Blockchain Applications, Cloud-Based IT Security Infrastructure, Classified Government Networks and Communication Systems, Secure Device Keying (IOT, Automotive, Consumer Electronics) and Quantum Cryptography.

    For further information, please visit our website at https://www.quantumemotion.com/ or contact us at: info@quantumemotion.com

    Marc Rousseau, Chief Financial Officer
    Tel: (514) 886-0045
    Email: info@quantumemotion.com
    Website: www.quantumemotion.com

    Cautionary Note regarding Forward-Looking Statements

    This news release contains “forward-looking information” within the meaning of applicable securities laws, which is based upon the Corporation’s current internal expectations, estimates, projections, assumptions and beliefs. Such forward-looking statements and forward-looking information include, but are not limited to, statements concerning the Corporation’s expectations with respect to the use of proceeds and the use of the available funds following completion of the Offering, and the completion of the Corporation’s business objectives, and the timing, costs, and benefits thereof. Forward-looking statements or forward-looking information relate to future events and future performance and include statements regarding the expectations and beliefs of management based on information currently available to the Corporation. Such forward-looking statements and forward-looking information often, but not always, can be identified by the use of words such as “plans”, “expects”, “potential”, “is expected”, “anticipated”, “is targeted”, “budget”, “scheduled”, “estimates”, “forecasts”, “intends”, “anticipates”, or “believes” or the negatives thereof or variations of such words and phrases or statements that certain actions, events or results “may”, “could”, “would”, “might” or “will” be taken, occur or be achieved. Forward-looking statements or forward-looking information are subject to a variety of risks and uncertainties which could cause actual events or results to differ materially from those reflected in the forward-looking statements or forward-looking information, including, without limitation, risks and uncertainties relating risks inherent to the cybersecurity industry, the value of the Corporation’s intangible assets, completing proof of concept studies, protecting intangible assets rights, timing and availability of external financing on acceptable terms or at all, the possibility that future results will not be consistent with the Corporation’s expectations, increases in costs, changes in legislation and regulation, changes in economic and political conditions and other risks involved in the cybersecurity industry and inherent to new technologies, such as risk of obsolescence, slow adoption and competing technological advances; and those risks set out in the Corporation’s public documents filed on SEDAR+ at www.sedarplus.ca.

    Should one or more of these risks and uncertainties materialize, or should underlying assumptions prove incorrect, actual results may vary materially from those described in forward-looking statements or forward-looking information. Although the Corporation has attempted to identify important factors that could cause actual results to differ materially, there may be other factors that could cause results not to be as anticipated, estimated or intended. For more information on the Corporation and the risks and challenges of its business, investors should review the Corporation’s annual filings that are available at www.sedarplus.ca. The Corporation provides no assurance that forward-looking statements or forward-looking information will prove to be accurate, as actual results and future events could differ materially from those anticipated in such statements and information. Accordingly, readers should not place undue reliance on forward-looking statements and forward-looking information. Any forward-looking statement speaks only as of the date on which it is made and, except as may be required by applicable securities laws, the Corporation disclaims any intent or obligation to update any forward-looking information.

    Neither TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

    The MIL Network –

    June 3, 2025
  • MIL-OSI United Kingdom: Strategic Defence Review oral statement

    Source: United Kingdom – Government Statements

    Oral statement to Parliament

    Strategic Defence Review oral statement

    Statement from Defence Secretary John Healey on the Strategic Defence Review.

    With permission, Mr Speaker, I would like to make a statement on the Strategic Defence Review.

    And I have laid the full 130-page review report first before this house. I am grateful to be able to make this statement on the first day back from recess.

    Mr Speaker, the world has changed, and we must respond.

    The SDR is our Plan for Change for Defence.

    A plan to meet the threats we face.

    A plan to step up on European Security and lead in NATO.

    A plan that learns the lessons from Ukraine.

    A plan to seize the defence dividend from our record increase in defence investment, to boost jobs and growth throughout the United Kingdom.

    And a plan to put the men and women of our Armed Forces at the heart of our defence plans: better pay, better kit, better housing.

    Through the SDR will make our Armed Forces stronger, and the British people safer.

    I’d like to thank those who led the SDR… Lord Robertson of Port Ellen, General Barrons and Dr Fiona Hill.

    “The politician, the soldier, and a foreign policy expert”, as they say themselves in their forward. Thye have put in a huge effort, alongside others.

    This is a first-of-its-kind, externally led review.

    A process, in which we received 8 000 submissions from experts, individuals, organisations, and MPs from across the House, including the Shadow Defence Secretary.

    I thank them all – and I thank those in the MOD who have contributed to this SDR.

    This is not just the government’s review it is Britain’s defence review.

    And so, the government endorses the SDR’s vision, accepts its 62 recommendations, which will be implemented.

    Mr Speaker, the threats we face is now more serious and less predictable than at any time since the of Cold War.

    We face war in Europe, growing Russian aggression, new nuclear risks, and daily cyber-attacks at home. 

    Our adversaries are working more in alliance with one another, while technology is changing the way war is fought.

    We are in a new era of threat, which demands a new era for UK Defence.

    Mr Speaker, since the General Election we have demonstrated that we are a government dedicated to delivering for defence.

    Committing the largest sustained increase in defence spending since the end of the Cold War… £5 billion extra this year, 2.5% in 2027, the ambition to 3% in the next parliament.

    Mr Speaker, there can be no investment without reform.

    And so we are already driving also the deepest reforms to defence in 50 years.

    And these will ensure clearer responsibilities, better delivery, stronger budget control and new efficiencies, worth £6 billion in this parliament, money all of which will be reinvested directly into defence.

    Mr Speaker, our Armed Forces will always do what’s needed to keep the nation safe –24/7, in more than 50 countries around the world.

    But in a more dangerous world, the SDR confirms that we must move to warfighting readiness.

    Warfighting readiness means stronger deterrence.

    We need stronger deterrence to avoid the huge costs, human and economic that wars create.

    And we prevent wars by being strong enough to fight and win them. And that is what has made NATO the most successful defence alliance in history, over the last 75 years.

    So Mr Speaker, we will establish a “New Hybrid Navy” by:

    … building Dreadnought, AUKUS submarines, cutting-edge warships and new autonomous vessels.

    Our carriers will carry the first hybrid airwings in Europe.

    We will develop the next generation RAF with:

    F35s, upgraded Typhoons, 6th Gen GCAP and autonomous fighters, to defend Britain’s skies and be able to strike anywhere in the world.

    And we will make the British Army 10 times more lethal by:

    Combining the future technology of drones, autonomy and AI with the heavy metal tanks and artillery.

    Mr Speaker for too long, our Army has been asked to do more with less.

    We inherited a long run recruitment crisis – [political content removed].

    Reversing this decline will take time but we are acting to stem the loss now and aiming to increase the British Army to at least 76,000 full time soldiers in the next parliament.

    Mr Speaker, for the first time in a generation, we are a government who want the number of regular soldiers to rise.

    In our homeland, Mr Speaker, this a government that will protect our island home, we’ll do so by:

    Committing £1bn in new funding to homeland air and missile defences,  by creating a new CyberEM Command to defend Britain in the grey zone and by preparing legislation to improve defence readiness.

    Mr. Speaker, as Ukraine shows a country’s armed forces are only as strong as the industry that stands behind them.

    So this SDR begins a new partnership with industry, with innovators and with investors, we will make engine. We will make defence an engine for growth, an engine for growth to create jobs and increase prosperity in every nation and every region of the UK.

    Take our nuclear enterprise.

    We will commit 15 billion pounds in investment into the sovereign warhead programme in this Parliament, supporting over 9000 jobs. We will establish continuous submarine production through investments in Barrow and in Derby, that will allow us to produce a submarine every 18 months, allowing us to grow our nuclear attack submarine fleet to up to 12 submarines, supporting more than 20,000 jobs.

    And on munitions, we will invest 6 billion pounds in this Parliament, including for six new munitions factories and up to 7000 new long-range weapons, supporting nearly 2000 jobs.

    Mr. Speaker, the lives of workers in Barrow or Derby or Govan, where I was with the Prime Minister this morning, are being transformed, not just by this defence investment, but by the pride and purpose that comes with work that comes with defence work. And in the coming years, more communities and more working people will benefit from the defence dividend that this brings.

    Mr. Speaker Ukraine also tells us that whoever gets new technology into the hands of their armed forces fastest will have the advantage. So we will place Britain at the leading edge of innovation in NATO.

    We will double investment into autonomous systems this parliament. We will invest more than a billion pounds to integrate our armed forces through a new digital targeting web, and we will finance a £400 million UK Defence Innovation organization.

    Mr. Speaker, to ensure that Britain gains the maximum benefit from what we invent and what we produce in this country, we will create a new defence exports office in the MOD, driving exports to our allies and driving growth at home.

    Mr. Speaker, the SDR sets a new vision, a new framework for defence investment.

    The work to confirm a new defence investment plan, superseding the last government’s defence equipment plan, will be completed in the autumn.

    It will ensure our frontline forces get what they need when they need it.

    The plan will be deliverable. It will be affordable. It will consider infrastructure alongside capabilities. It will seize the opportunities of advanced tech, and it will seize the opportunities to grow the British economy.

    And Mr. Speaker, as we lose the national service generation, fewer families across this country have a direct connection to the armed forces. And so we must do more to reconnect the nation with those who defend us.

    And so as the SDR recommends, we will increase the number of cadets by 30%, we will introduce a voluntary Gap Year scheme for school and college leavers, and we will develop a new strategic reserve by 2030.

    Mr. Speaker, we must also renew the nation’s contract with those who serve. We’ve already awarded the biggest pay increase in over 20 years, an inflation busting increase this year. And now I’ve announced we will invest 7 billion pounds of funding this parliament for military accommodation, including 1.5 billion of new money for rapid work to deal with the scandal of military family homes.

    Mr. Speaker, this SDR is the first defence review in a generation for growth and for transformation in UK defence. It will end 14 years of hollowing out in our armed forces, and instead, we will see investment increased, the Navy expanded, the army grown, the Air Force upgraded, war fighting readiness, restored, NATO strengthened, the nuclear deterrent, guaranteed advanced technology developed and jobs, jobs created. Jobs created in every nation, and region of this country. Mr. Speaker. Mr. Strategic Defence Review will make Britain, safer, more secure, at home, and stronger abroad.

    Updates to this page

    Published 2 June 2025

    MIL OSI United Kingdom –

    June 3, 2025
  • MIL-OSI USA: Justice Department Requires Keysight to Divest Assets to Proceed with Spirent Acquisition

    Source: US Justice – Antitrust Division

    Headline: Justice Department Requires Keysight to Divest Assets to Proceed with Spirent Acquisition

    The Justice Department’s Antitrust Division announced today that it will require Keysight Technologies Inc. (Keysight) to divest Spirent Communications plc.’s (Spirent) high-speed ethernet testing, network security testing, and RF channel emulation businesses to resolve antitrust concerns arising from their proposed $1.5 billion merger.

    MIL OSI USA News –

    June 3, 2025
  • MIL-OSI Security: Justice Department Requires Keysight to Divest Assets to Proceed with Spirent Acquisition

    Source: United States Attorneys General

    The Proposed Settlement Requires a Substantial Divestiture Package That Will Preserve Competition for Specialized Communications Test and Measurement Equipment

    The Justice Department’s Antitrust Division announced today that it will require Keysight Technologies Inc. (Keysight) to divest Spirent Communications plc.’s (Spirent) high-speed ethernet testing, network security testing, and RF channel emulation businesses to resolve antitrust concerns arising from their proposed $1.5 billion merger.

    The Antitrust Division filed a civil antitrust lawsuit in the U.S. District Court for the District of Columbia to block the proposed transaction. At the same time, the Division filed a proposed settlement that, if approved by the court, would resolve the Division’s competitive concerns.

    “This structural solution preserves competition for key testing equipment used to ensure that data moves quickly and securely across the world. The proposed divestiture to Viavi, an established and innovative test and measurement company, ensures that American consumers and businesses will continue to benefit from competition that promotes innovation, and which allows American companies to maintain global leadership,” said Assistant Attorney General Abigail Slater of the Antitrust Division. “This consent decree proceeding secures enforceable commitments from the merging parties, provides transparency into the Antitrust Division’s efforts to resolve merger investigations, and gives the public an opportunity to comment as provided by statute.”

    According to the complaint, Keysight and Spirent dominate the markets in the United States for high-speed ethernet testing, network security testing, and RF channel emulators. High-tech companies – including chipset manufacturers, cloud computing providers, mobile network operators, government labs, and large enterprises – rely on the Defendants’ products to validate that their networks and network equipment are functional, secure, and integrating the latest technology. The parties together account for 85% of the market for high-speed ethernet testing, more than 60% of the market for network security testing, and more than 50% of the market for RF channel emulators. Keysight and Spirent are each other’s closest competitors in these markets and compete head-to-head to develop and sell this crucial test equipment. Without the proposed divestiture, Keysight’s acquisition of Spirent would likely result in higher prices, lower quality, and reduced innovation to the detriment of customers and American consumers.

    The proposed settlement requires Keysight to divest Spirent’s high-speed ethernet testing, network security testing, and RF channel emulation businesses to Viavi, including all tangible and intangible assets necessary to produce and sell these products. Together, these three business lines account for about 40% of Spirent’s total revenues. Viavi is expected to hire certain key Spirent employees that today support the divested business lines.

    Keysight is an American company incorporated in Delaware with its principal office in Santa Rosa, California. Keysight offers design, emulation, and test solutions across a range of industries, including commercial communications; aerospace, defense, and government; and electronic industrial. In 2024, Keysight had global revenue of approximately $4.97 billion.   

    Spirent is a global company incorporated in the United Kingdom with its principal office in Crawley, England. Spirent offers automated test and assurance solutions for networks, cybersecurity, and satellite positioning. In 2024, Spirent had global revenue of approximately $460.2 million.

    As required by the Tunney Act, the proposed settlement, along with the Department’s competitive impact statement, will be published in the Federal Register. Any person may submit written comments concerning the proposed settlement within 60 days of its publication to Jared Hughes, Assistant Chief, Media, Entertainment, and Communications Section, Antitrust Division, U.S. Department of Justice, 450 Fifth Street, NW, Suite 7000, Washington, D.C. 20530 or via email at ATR.MEC.Information@usdoj.gov. At the conclusion of the 60-day comment period, the court may enter the final judgment upon a finding that it serves the public interest.

    MIL Security OSI –

    June 3, 2025
  • MIL-OSI Global: Is a quantum-cryptography apocalypse imminent?

    Source: The Conversation – UK – By Keith Martin, Professor, Information Security Group, Royal Holloway University of London

    Be afraid, be very … FOTOKITA

    Will quantum computers crack cryptographic codes and cause a global security disaster? You might certainly get that impression from a lot of news coverage, the latest of which reports new estimates that it might be 20 times easier to crack such codes than previously thought.

    Cryptography underpins the security of almost everything in cyberspace, from wifi to banking to digital currencies such as bitcoin. Whereas it was previously estimated that it would take a quantum computer with 20 million qubits (quantum bits) eight hours to crack the popular RSA algorithm (named after its inventors, Rivest–Shamir–Adleman), the new estimate reckons this could be done with 1 million qubits.

    By weakening cryptography, quantum computing would present a serious threat to our everyday cybersecurity. So is a quantum-cryptography apocalypse imminent?


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    Quantum computers exist today but are highly limited in their capabilities. There is no single concept of a quantum computer, with several different design approaches being taken to their development.

    There are major technological barriers to be overcome before any of those approaches become useful, but a great deal of money is being spent, so we can expect significant technological improvements in the coming years.

    For the most commonly deployed cryptographic tools, quantum computing will have little impact. Symmetric cryptography, which encrypts the bulk of our data today (and does not include the RSA algorithm), can easily be strengthened to protect against quantum computers.

    Quantum computing might have more significant impact on public-key cryptography, which is used to set up secure connections online. For example this is used to support online shopping or secure messaging, traditionally using the RSA algorithm, though increasingly an alternative called elliptic curve Diffie-Hellman.

    Public key cryptography is also used to create digital signatures such as those used in bitcoin transactions, and uses yet another type of cryptography called the elliptic curve digital signature algorithm.

    If a sufficiently powerful and reliable quantum computer ever exists, processes that are currently only theoretical might become capable of breaking those public-key cryptographic tools. RSA algorithms are potentially more vulnerable because of the type of mathematics they use, though the alternatives could be vulnerable too.

    Such theoretical processes themselves will inevitably improve over time, as the paper about RSA algorithms is the latest to demonstrate.

    What we don’t know

    What remains extremely uncertain is both the destination and timelines of quantum computing development. We don’t really know what quantum computers will ever be capable of doing in practice.

    Expert opinion is highly divided on when we can expect serious quantum computing to emerge. A minority seem to believe a breakthrough is imminent. But an equally significant minority think it will never happen. Most experts believe it a future possibility, but prognoses range from between ten and 20 years to well beyond that.

    And will such quantum computers be cryptographically relevant? Essentially, nobody knows. Like most of the concerns about quantum computers in this area, the RSA paper is about an attack that may or may not work, and requires a machine that might never be built (the most powerful quantum computers currently have just over 1,000 qubits, and they’re still very error prone).

    From a cryptographic perspective, however, such quantum computing uncertainty is arguably immaterial. Security involves worst-case thinking and future proofing. So it is wisest to assume that a cryptographically relevant quantum computer might one day exist. Even if one is 20 years away, this is relevant because some data that we encrypt today might still require protection 20 years from now.

    Experience also shows that in complex systems such as financial networks, upgrading cryptography can take a long time to complete. We therefore need to act now.

    What we should do

    The good news is that most of the hard thinking has already been done. In 2016, the US National Institute for Standards and Technology (Nist) launched an international competition to design new post-quantum cryptographic tools that are believed to be secure against quantum computers.

    In 2024, Nist published an initial set of standards that included a post-quantum key exchange mechanism and several post-quantum digital signature schemes. To become secure against a future quantum computer, digital systems need to replace current public-key cryptography with new post-quantum mechanisms. They also need to ensure that existing symmetric cryptography is supported by sufficiently long symmetric keys (many existing systems already are).

    The US NIST published post-quantum cryptographic standards in 2024.
    PeopleImages.com – Yuri A

    Yet my core message is don’t panic. Now is the time to evaluate the risks and decide on future courses of action. The UK’s National Cyber Security Centre has suggested one such timeline, primarily for large organisations and those supporting critical infrastructure such as industrial control systems.

    This envisages 2028 as a deadline for completing a cryptographic inventory and establishing a post-quantum migration plan, with upgrade processes to be completed by 2035. This decade-long timeline suggests that NCSC experts don’t see a quantum cryptography apocalypse coming anytime soon.

    For the rest of us, we simply wait. In due course, if deemed necessary, the likes of our web browsers, wifi, mobile phones and messaging apps will gradually become post-quantum secure either through security upgrades (never forget to install them) or steady replacement of technology.

    We will undoubtedly read more stories about breakthroughs in quantum computing and upcoming cryptography apocalypses as big technology companies compete for the headlines. Cryptographically relevant quantum computing might well arrive one day, most likely far into the future. If and when it does, we’ll surely be ready.

    Keith Martin receives funding from EPSRC.

    – ref. Is a quantum-cryptography apocalypse imminent? – https://theconversation.com/is-a-quantum-cryptography-apocalypse-imminent-257993

    MIL OSI – Global Reports –

    June 3, 2025
  • MIL-OSI Banking: ICC warns trade uncertainty is undermining global business confidence 

    Source: International Chamber of Commerce

    Headline: ICC warns trade uncertainty is undermining global business confidence 

    Share this:

    Mr Denton said uncertainty surrounding US tariffs and trade policy is acting as a “tax” on international businesses.   

    “What we’re seeing on a global basis is heightened levels of uncertainty,”

    he said, adding that the lack of clear direction on trade policy is shaking business confidence and disrupting global trade planning. 

    Citing a recent Pulse survey of ICC’s global business network to assess the impact of newly announced US tariff measures, Mr Denton highlighted the growing challenges for small businesses.  

    Conducted across 68 countries the survey shows that 77% of firms report direct or knock-on risks from the tariffs, and 48% say the measures have already impacted their supply chains or market strategy. 

    “What that tells you is that small businesses are really feeling this as well, and they do not have the resources that large businesses do. It’s just problematic, and even for large business this is very complicated,” he said

    Mr Denton called for continued international cooperation citing ICC’s long-standing support for a multilateral rules-based trading system. 

    “The reason we’ve been able to see a decline in poverty globally is because we actually have rules-based trading systems operating,” he said

    Watch the interview here  

    MIL OSI Global Banks –

    June 3, 2025
  • MIL-OSI Security: Physician at VA Medical Center Indicted by Federal Grand Jury for Child Pornography Offenses

    Source: US FBI

    BOSTON – A physician employed at the Veterans Affairs (VA) Medical Center in Bedford, Mass. has been indicted by a federal grand jury for receiving and possessing child sexual abuse material (CSAM).

    Sven Knudsen Ljaamo, 70, was indicted on one count of receipt of child pornography and one count of possession of child pornography. The defendant was previously arrested and charged by criminal complaint on April 23, 2025.on April 23, 2025 He was subsequently released on conditions following a detention hearing.

    According to the charging documents, law enforcement received a CyberTip reporting that over 100 files of suspected CSAM files had allegedly been uploaded to Ljaamo’s Google account. When Ljaamo spoke to investigators, he allegedly admitted to viewing, downloading and saving pornographic material involving female minors. It is further alleged that several CSAM files, along with tens of thousands of pornography files, were found during a review of Ljaamo’s devices, including on a cell phone Ljaamo kept in his office at the VA Medical Center.

    The charge of receipt of child pornography provides for a sentence of up to 20 years in prison, at least five years and up to a lifetime of supervised release and a fine of up to $250,000. The charge of possession of child pornography provides for a sentence of up to 20 years in prison, at least five years and up to a lifetime of supervised release and a fine of up to $250,000. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

    United States Attorney Leah B. Foley; Kimberly Milka, Acting Special Agent in Charge of the Federal Bureau of Investigation, Boston Division; and Christopher Algieri, Special Agent in Charge of the U.S. Department of Veterans Affairs Office of Inspector General, Northeast Field Office made the announcement today. Valuable assistance was provided by the Billerica, Lowell and Salem Police Departments. Assistant U.S. Attorney Sandra Gonzalez Sanchez of the Criminal Division is prosecuting the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse, launched in May 2006 by the Department of Justice. Led by the U.S. Attorneys’ Offices and the DOJ’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state and local resources to locate, apprehend and prosecute individuals who exploit children, as well as identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

    The details contained in the charging documents are allegations. The defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.
     

    MIL Security OSI –

    June 3, 2025
  • MIL-OSI Security: Websites Selling Hacking Tools to Cybercriminals Seized

    Source: US FBI

    Multinational operation linked services to known ransomware groups targeting victims worldwide

    HOUSTON – A coordinated effort involving an international disruption of an online software crypting syndicate which provides services to cybercriminals to assist them with keeping their malicious software (malware) from being detected has resulted in the seizure of four domains and their associated server, announced U.S. Attorney Nicholas J. Ganjei.

    Crypting is the process of using software to make malware difficult for antivirus programs to detect. The seized domains offered services to cybercriminals, including counter-antivirus (CAV) tools. When used together, CAV and crypting services allow criminals to obfuscate malware, making it undetectable and enabling unauthorized access to computer systems.

    According to the affidavit filed in support of these seizures, authorities made undercover purchases from seized websites and analyzed the services, confirming they were designed for cybercrime. Court documents also allege authorities reviewed linked email addresses and other data connecting the services to known ransomware groups that have targeted victims both in the United States and abroad, including in the Houston area.  

    “Modern criminal threats require modern law enforcement solutions,” said Ganjei. “As cybercriminals have become more sophisticated in their schemes, they have likewise become more advanced in their efforts to avoid detection. As such, our law enforcement efforts must involve striking not just at the individual fraudster or hacker, but the enablers of these cybercriminals as well. This investigation did exactly that. With this syndicate shut down, there is one less provider of malicious tools for cybercriminals out there.”

    “Cybercriminals don’t just create malware; they perfect it for maximum destruction,” said FBI Houston Special Agent in Charge Douglas Williams. “By leveraging counter antivirus services, malicious actors refine their weapons against the world’s toughest security systems to better slip past firewalls, evade forensic analysis, and wreak havoc across victims’ systems. As part of a decisive international operation, FBI Houston helped cripple a global cyber syndicate, seize their most lethal tools, and neutralize the threat they posed to millions around the world.”

    The seizures occurred May 27 in coordination with Finnish and Dutch national police as part of Operation Endgame, a multinational law enforcement initiative targeting the dismantling of malware cybercriminal services. Participating countries include the United States, The Netherlands, France, Germany and Denmark with additional support from Ukraine and Portugal.  

    The FBI Houston Field Office is conducting the investigation with the cooperation and significant assistance of law enforcement partners in The Netherlands and Finland and U.S. Secret Service.

    Assistant U.S. Attorneys (AUSA) Shirin Hakimzadeh and Rodolfo Ramirez are prosecuting the case. AUSA Kristine Rollinson is handling the seizure aspects of the case. 

    MIL Security OSI –

    June 3, 2025
  • MIL-OSI: ConnectM Provides Update to Stockholders on Buyout Group’s Offer

    Source: GlobeNewswire (MIL-OSI)

    MARLBOROUGH, Mass., June 02, 2025 (GLOBE NEWSWIRE) — ConnectM Technology Solutions, Inc. (OTC: CNTM) (“ConnectM” or the “Company”), a high-growth technology company on the leading edge of the modern energy economy, today issued an update to its stockholders regarding the recent buyout offer by a group of longstanding stockholders.

    ConnectM received a letter from Optimax Solutions Inc., on behalf of SriSid LLC, Arumilli LLC, and Win-Light Global Co Ltd (collectively, the “Buyout Group”), informing the Company that in light of ConnectM’s recent delays filing its Form 10-K and Form 10-Q reports, the Buyout Group have decided to pause their previously submitted buyout proposal and place further acquisition discussions on hold.

    The Buyout Group expressed continued support for ConnectM and its management team, particularly in regard to the comprehensive four-month recovery plan the Company recently announced, which is aimed at regaining compliance and relisting on major stock exchange like Nasdaq or NYSE. The Buyout Group stated that they view the successful execution of this plan as critical and indicated their willingness to reengage in buyout discussions upon ConnectM’s successful relisting.

    ConnectM’s Board of Directors and management team remain focused on implementing the strategic actions necessary to restore compliance and deliver long-term value to all stockholders.

    ConnectM intends to file its 2024 Annual Report and Q1 2025 Quarterly Reports in June 2025, which will show strong performance across all its operating segments.

    The Company appreciates the support and partnership of its major stockholders during this period.

    About ConnectM Technology Solutions, Inc.

    ConnectM is a constellation of companies powering the next generation of electrified equipment, mobility, and distributed energy—thus enabling a faster, smarter transition to a modern energy economy. The Company provides residential and light commercial service providers and original equipment manufacturers with a proprietary Energy Intelligence Network platform to accelerate the transition to all-electric heating, cooling, and transportation. Leveraging technology, data, artificial intelligence, and behavioral economics, ConnectM aims to lower energy costs and reduce carbon emissions globally.

    For more information, please visit: https://www.connectm.com/

    Cautionary Note Regarding Forward-Looking Statements

    This press release contains forward-looking statements within the meaning of Section 27A of the Securities Act and Section 21E of the Securities Exchange Act of 1934, as amended (the “Exchange Act”). We have based these forward-looking statements on our current expectations and projections about future events. All statements, other than statements of present or historical fact included in this press release, regarding our future financial performance and our strategy, expansion plans, future operations, future operating results, estimated revenues, losses, projected costs, prospects, plans and objectives of management are forward-looking statements. In some cases, you can identify forward-looking statements by terminology such as “may,” “should,” “could,” “would,” “expect,” “plan,” “anticipate,” “intend,” “believe,” “estimate,” “continue,” “project” or the negative of such terms or other similar expressions. These forward-looking statements are subject to known and unknown risks, uncertainties and assumptions about us that may cause our actual results, levels of activity, performance or achievements to be materially different from any future results, levels of activity, performance or achievements expressed or implied by such forward-looking statements. Except as otherwise required by applicable law, we disclaim any duty to update any forward-looking statements, all of which are expressly qualified by the statements in this section, to reflect events or circumstances after the date of this press release. We caution you that the forward-looking statements contained herein are subject to numerous risks and uncertainties, most of which are difficult to predict and many of which are beyond our control. In addition, we caution you that the forward-looking statements regarding the Company contained in this press release are subject to the risks and uncertainties described in the “Cautionary Note Regarding Forward-Looking Statements” section of the Current Report on Form 8-K filed with the Securities and Exchange Commission on July 18, 2024. Such filing identifies and addresses other important risks and uncertainties that could cause actual events and results to differ materially from those contained in the forward-looking statements. Forward-looking statements speak only as of the date they are made. Readers are cautioned not to put undue reliance on forward-looking statements, and ConnectM is under no obligation to update or revise these forward-looking statements, whether as a result of new information, future events, or otherwise.

    Contact:

    Investor Relations
    ConnectM Technology Solutions, Inc.
    (617) 395-1333
    irpr@connectm.com

    The MIL Network –

    June 3, 2025
  • MIL-OSI USA: During AI Hearing, Trahan Blasts GOP’s Massive Giveaway to Big Tech

    Source: United States House of Representatives – Congresswoman Lori Trahan (D-MA-03)

    WASHINGTON, DC – Today, during a House Energy and Commerce Committee hearing, Congresswoman Lori Trahan (MA-03) blasted House Republicans for supporting a ten-year moratorium on state legislation to protect Americans from harms caused by artificial intelligence (AI). The ban was included in the GOP’s reconciliation package passed by the Committee last week and set to be considered on the House floor as soon as today.
    CLICK HERE or the image below to view Trahan’s remarks during the Committee’s consideration of reconciliation legislation. A transcript is embedded below.

    “Under Republican leadership, this committee has failed time and time again to protect Americans’ privacy and safeguard our children online. GOP leaders have blocked whistleblower protections for tech workers who risk their livelihoods to shine a light on their employers’ privacy abuses. They killed comprehensive privacy legislation to minimize data collection and ensure proper use. They said no to simple transparency legislation so independent auditors could make sure Big Tech companies aren’t breaking the law,” Congresswoman Trahan said. “But what Republican members of this committee did find time to do last week – in the middle of the night by the way – is force through an unprecedented giveaway to the tech industry: A ten-year ban on state laws that could make AI safer for our constituents.”
    Last week, the House Energy and Commerce Committee marked up House Republicans’ reconciliation package that will cut $715 billion from Medicaid and eliminate health coverage for at least 13.7 million Americans. Included in that bill is a provision that would ban states from creating or implementing laws to limit potential harms of AI, effectively allowing Big Tech companies to deploy a rapidly changing technology without any accountability for its negative impacts.
    During debate over the legislation, Trahan spoke in support of an amendment filed by House Energy and Commerce Committee Ranking Member Frank Pallone, Jr. (NJ-06) to strike the 10-year moratorium on state AI regulation. Every Republican on the committee voted against the amendment, preserving the provision in the bill. In response to Republicans’ ban on AI regulation and its passage out of the Committee, hundreds of civil liberties and consumer protection organizations, as well as a bipartisan group of over 40 state Attorneys General, have expressed strong opposition, describing the harmful impact the ban would have on consumers by depriving them of rights duly provided by state legislatures.
    “Make no mistake. The families who have come to this committee and begged for us to act won’t benefit from this proposal, but you know who will? The Big Tech CEOs who were sitting behind Donald Trump at his inauguration,” Congresswoman Trahan continued.
    —————————————-
    Congresswoman Lori Trahan
    Remarks As Delivered
    House Energy and Commerce Committee Hearing on “AI Regulation and the Future of US Leadership”
    May 21, 2025
    I thank the Ranking Member for yielding.
    Under Republican leadership, this committee has failed time and time again to protect Americans’ privacy and safeguard our children online.
    GOP leaders have blocked whistleblower protections for tech workers who risk their livelihoods to shine a light on their employers’ privacy abuses. They killed comprehensive privacy legislation to minimize data collection and ensure proper use. They said no to simple transparency legislation so independent auditors could make sure Big Tech companies aren’t breaking the law.
    But what Republican members of this committee did find time to do last week – in the middle of the night by the way – is force through an unprecedented giveaway to the tech industry: A ten-year ban on state laws that could make AI safer for our constituents.
    Make no mistake. The families who have come to this committee and begged for us to act won’t benefit from this proposal, but you know who will? The Big Tech CEOs who were sitting behind Donald Trump at his inauguration.
    Now, we can agree that a patchwork of various state laws is not good for innovation, for business, or consumers. But this is a bad policy because it sets another disincentive for us to act urgently or even in time. All the while, Republicans are once again ceding Congress’s duty to protect Americans’ privacy to the very companies who are perpetrating the worst abuses online.
    You’re basically inviting the fox into the hen house.
    And you’re doing so under the justification that this will somehow motivate Congress to unify the patchwork of state laws currently in existence. But that hasn’t happened yet.
    Just look at what happened to the privacy bill that we crafted together on this committee. The moment that Big Tech started lobbying against it, the Republican Speaker and the Majority Leader caved. They killed the bill. And now you turn around and try to deceive the American people into accepting this ridiculous alternative?
    Come on. Our constituents aren’t stupid. They want real action from us to rein in the abuses of tech companies, not to give them blanket immunity to abuse our most sensitive data even more.
    At the same time, our Republican colleagues are complaining about Europe’s tech laws, which we can acknowledge are imperfect. But at least they had the guts to do something – literally anything – to make the internet better for the folks they represent. Shame on us if we don’t answer the same demands from the American people.
    I urge my colleagues to reject this giveaway to the same Big Tech companies that have stymied every attempt at updating our privacy laws. I want to urge my colleagues to vote no on the partisan reconciliation bill when the same leaders who killed our bipartisan privacy legislation bring it to the floor.
    And let’s just get to work in a bipartisan way to foster innovation and protect our constituents with sensible guardrails on Big Tech. Thank you. I yield back.
    ###

    MIL OSI USA News –

    June 3, 2025
  • MIL-OSI Security: Fort Pierce Jury Convicts a Louisiana Registered Sex Offender of Various Internet Sex Crimes Involving a Martin County Minor

    Source: US FBI

    MIAMI – On May 20, a federal jury sitting in Fort Pierce, Florida convicted Nicolas James Palmisano, 45, of Destrehan, Louisiana, for attempted enticement of a minor, attempted production of visual depictions involving sexual exploitation of a minor, receipt of visual depictions involving sexual exploitation of a minor, transfer of obscene material to a minor, and offense by a registered sex offender.

    According to court records and evidence introduced during trial, in 2019, Palmisano was convicted in St. Charles Parish, Louisiana for sexual offenses involving a juvenile. Upon the completion of his four-year prison sentence, Palmisano registered as a sex offender with the St. Charles Parish Sheriff’s Office in the town in which he resided.

    In May 2024, the Martin County Sheriff’s Office (MCSO) learned that a minor had images of sexually explicit activity on her cellular phone. An MCSO computer forensic examiner recovered messages, images, and recordings from the minor’s cellular phone that were sent from Palmisano’s cellular number. Despite acknowledging that the minor was 15 years old, Palmisano wrote thousands of sexually explicit messages and sent multiple sexually explicit images, as well as audio and video recordings, of himself between February 22 and May 6, 2024. Palmisano also solicited, and obtained, sexually explicit images from the minor.

    In August 2024, members of the FBI and MCSO arrested Palmisano at the St. Charles Parish Sheriff’s Office, after he arrived for his annual Sexual Offender Registration review and update. Law enforcement executed a search warrant on Palmisano’s residence and recovered his cellular phone, which was found to contain the sexually explicit material that Palmisano and the minor exchanged.

    A sentencing hearing is scheduled for August 25, before U.S. District Judge Jose E. Martinez. Palmisano faces a mandatory minimum sentence of 35 years up to life in prison, and up to a lifetime of supervised release.

    U.S. Attorney Hayden P. O’Byrne for the Southern District of Florida, acting Special Agent in Charge Brett D. Skiles of FBI Miami, and Martin County Sheriff John Budensiek made the announcement. 

    FBI Fort Pierce investigated the case, with assistance from MCSO, FBI New Orleans, and St. Charles Parish Sheriff’s Office. 

    Fort Pierce Branch Managing Assistant U.S. Attorney Carmen M. Lineberger and Assistant U.S. Attorney Jessica Kahn Obenauf are prosecuting the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse, launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    Anyone with information relating to child sexual exploitation or abuse is encouraged to call the FBI at 1-800-CALL-FBI.

    Related court documents and information may be found on the website of the District Court for the Southern District of Florida at www.flsd.uscourts.gov or at http://pacer.flsd.uscourts.gov, under case number 24-cr-14044.

    ###

    MIL Security OSI –

    June 3, 2025
  • MIL-OSI Security: Tama Man Pleads Guilty to Distributing and Possessing Child Pornography

    Source: US FBI

    Jacob Samuel Yang, age 36, from Tama, Iowa, pled guilty today in federal court in Cedar Rapids to distributing child pornography and possessing child pornography.

    In a plea agreement, Yang admitted that in March 2024, he sent child pornography to other people.  He stored child pornography on his cellular phone and computer.  The child pornography included a depiction of an infant or toddler.  

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse.  Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.usdoj.gov/psc.  For more information about Internet safety education, please visit www.usdoj.gov/psc and click on the tab “resources.”

    Sentencing before United States District Court Chief Judge C.J. Williams will be set after a presentence report is prepared.  Yang remains in custody of the United States Marshal pending sentencing.  Yang faces a mandatory minimum sentence of 5 years’ imprisonment and a possible maximum sentence of 40 years’ imprisonment, a $250,000 fine, $62,200 in special assessments, and a lifetime term of supervised release following any imprisonment.

    The case is being prosecuted by Assistant United States Attorney Devra T. Hake and was investigated by the Federal Bureau of Investigation, the Iowa Division of Criminal Investigation, the Tama County Sheriff’s Office, the Tama Police Department, and the Marshalltown Police Department.  

    Court file information is at https://ecf.iand.uscourts.gov/cgi-bin/login.pl.  

    The case file number is 25-CR-24.  

    Follow us on X @USAO_NDIA.

    MIL Security OSI –

    June 3, 2025
  • MIL-OSI: Techcrisis Investment Guild Launches Trend Stability Scanner, Led by Roland Preston

    Source: GlobeNewswire (MIL-OSI)

    Oakland, CA, June 02, 2025 (GLOBE NEWSWIRE) — Techcrisis Investment Guild, under the direction of founder Roland Preston, has announced the launch of its latest proprietary innovation: the Trend Stability Scanner, a real-time analytical engine designed to help investors recognize unsustainable market momentum and identify trends driven primarily by short-term sentiment fluctuations.

    In today’s fast-moving digital environment, financial markets are increasingly influenced by hype cycles, speculative headlines, and social media amplification. These signals, while often attention-grabbing, rarely reflect meaningful or lasting change. The Trend Stability Scanner was developed in response to this growing mismatch between market behavior and market substance.

    By leveraging multi-layer signal analysis, the scanner evaluates several key variables, including momentum structure, news flow intensity, signal divergence across correlated assets, and rate of narrative saturation. The system then assigns a confidence score to each trend, flagging those most likely to reverse due to lack of structural support.

    “Too many investors confuse visibility with validity,” said Roland Preston. “What appears to be a strong trend may actually be a shallow ripple driven by reactive behavior. At Techcrisis Investment Guild, we want to shift the focus away from surface-level interpretation and toward a deeper understanding of underlying forces.”

    The tool supports decision-making across asset classes—equities, digital assets, commodities—and is built to adapt to diverse market conditions. It is particularly useful for discretionary investors, analysts, and institutional strategists seeking to improve signal reliability and avoid being misled by market noise.

    Unlike conventional trend analysis tools that focus on raw technical indicators, the Trend Stability Scanner integrates contextual intelligence. It not only tracks price movement but also factors in narrative momentum, velocity of crowd sentiment, and cross-channel volatility correlations. This layered perspective enables users to evaluate whether a trend is being organically formed or artificially amplified.

    The scanner is now fully integrated within Techcrisis Investment Guild’s platform interface and available to members across desktop and mobile environments. It complements the organization’s broader commitment to rational investing, cognitive empowerment, and behavioral resilience.

    The launch of this tool is part of a broader initiative led by Roland Preston to introduce judgment-based innovation into the financial space—technology that doesn’t override decision-making, but supports human reasoning in an increasingly complex environment.

    About Techcrisis Investment Guild
     Techcrisis Investment Guild is a globally oriented financial cognition platform guided by Roland Preston. The Guild develops tools and frameworks that help investors cut through information overload, build structured decision-making systems, and cultivate durable market insight grounded in logic and discipline.

    Disclaimer: The information provided in this press release is not a solicitation for investment, nor is it intended as investment advice, financial advice, or trading advice. It is strongly recommended you practice due diligence, including consultation with a professional financial advisor, before investing in or trading cryptocurrency and securities.

    https://techcrisis.com/

    The MIL Network –

    June 3, 2025
←Previous Page
1 … 350 351 352 353 354 … 423
Next Page→
NewzIntel.com

NewzIntel.com

MIL Open Source Intelligence

  • Blog
  • About
  • FAQs
  • Authors
  • Events
  • Shop
  • Patterns
  • Themes

Twenty Twenty-Five

Designed with WordPress