Category: Technology

  • MIL-OSI Security: Registered Sex Offender Charged with Sex Trafficking Children by Force

    Source: US FBI

    WASHINGTON – Linwood Barnhill, 59, a registered sex offender living in the District of Columbia, was arrested on May 1, 2025, and federally charged with sex trafficking children by force and related counts. The alleged offenses occurred between April 1, 2024, and April 29, 2025.

    The criminal complaint was announced today by U.S. Attorney Edward R. Martin Jr., FBI Special Agent in Chief Sean Ryan of the Washington Field Office Criminal and Cyber Division, and Chief Pamela Smith of the Metropolitan Police Department (MPD).

    Barnhill, a former officer with the Metropolitan Police Department, is charged with sex trafficking by force, fraud, or coercion; sex trafficking of children; coercion and enticement; transportation with intent to engage in criminal sexual activity; and interstate travel or transportation in aid of racketeering enterprises. According to the complaint, the defendant allegedly recruited a series of minor children to engage in commercial sex acts and financially profited from those commercial sex acts.

    This case is being investigated by FBI’s Child Exploitation and Human Trafficking Task Force. It is being prosecuted by Assistant U.S. Attorney Caroline Burrell.

    This case was brought as part of the Department of Justice’s Project Safe Childhood initiative. In February 2006, the Attorney General created Project Safe Childhood, a nationwide initiative designed to protect children from online exploitation and abuse. Led by the U.S. Attorney’s Offices, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet, as well as identify and rescue victims. For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    MIL Security OSI

  • MIL-OSI Security: Man Arraigned in Federal Court on Multiple Charges of Sexual Exploitation of Children

    Source: US FBI

    HUNTSVILLE, Ala. – A Lawrence County man was arraigned in federal court last week on multiple child sexual exploitation charges, announced U.S. Attorney Prim F. Escalona and FBI Special Agent in Charge Carlton Peeples.

    A 13-count indictment filed in U.S. District Court charges David Edward Collier, 46, with four counts of sexual exploitation of children, eight counts of transportation of child pornography, and one count of possession of child pornography.

    According to the indictment, between January 2017 and August 2022, Collier used, induced, or coerced minor children to engage in sexually explicit conduct for the purpose of producing any visual depiction of that conduct.  Between October 2022 and September 2023, Collier transported the child pornography.  Collier was also charged with possession of child pornography.  

    FBI North Alabama Violent Crime Task Force and Cybercrime Squad investigated the case along with the assistance of the Lawrence County Sheriff’s Office, Moulton Police Department, Madison County Sheriff’s Office, Huntsville Police Department, and Limestone County Sheriff’s Office. Assistant United States Attorney R. Leann White is prosecuting the case.

    The U.S. Attorney’s Office (USAO) and the National Children’s Advocacy Center (NCAC) have partnered and released a digital series to educate parents and caretakers about sextortion and how they can help prevent kids and teens from being victims. This series offers three-to-five-minute videos about current online safety topics and provides essential information about the true dangers of online activities.

    The videos can be accessed from the following locations:

    nationalcac.org/sextortion-prevention/

    https://www.youtube.com/@nationalcac

    The case was brought as part of Project Safe Childhood, a nationwide initiative launched by the Department of Justice in May 2006 to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    MIL Security OSI

  • MIL-OSI Security: Kentucky Man Sentenced to 25 Years in Prison Related to Sextortion Scheme

    Source: US FBI

    BIRMINGHAM, Ala. – A Kentucky man was sentenced today on a charge of sexual exploitation of children, announced U.S. Attorney Prim F. Escalona and Federal Bureau of Investigation Special Agent in Charge Carlton L. Peeples.

    U.S. District Court Judge L. Scott Coogler sentenced Aden Willis Yeager, 22, of Louisville, Kentucky, to 300 months in prison, followed by a life term of supervised release.  As part of his sentence, Yeager was ordered to pay $92,620 in restitution to the victims and a $50,000 special assessment under the Amy, Vicky, and Andy Act. In March, Yeager pleaded guilty to one count of production of child pornography. 

    According to the plea agreement, in November 2020, the West Alabama Human Trafficking Task Force received a CyberTipline report from the National Center for Missing and Exploited Children related to acts of sextortion committed by Yeager towards a minor female. Yeager coerced and enticed the minor to send him nude photos of herself, and then he sold the photos online.  When the minor would refuse to send more pictures, Yeager would threaten to send her nude photos to everyone in her contact list on social media. Further investigation revealed over 60 individual folders in Yeager’s Dropbox account that were labeled by female names and contained sexually explicit images and videos. FBI agents were able to positively identify and locate 19 minor females who had been contacted by Yeager to send pornographic photos.

    FBI Birmingham’s Child Exploitation and Human Trafficking Task Force investigated the case along with FBI Louisville, Kentucky; the West Alabama Human Trafficking Task Force; and the University of Alabama Police Department. Assistant U.S. Attorney R. Leann White prosecuted the case.

    The U.S. Attorney’s Office (USAO) and the National Children’s Advocacy Center (NCAC) have partnered and released a digital series to educate parents and caretakers about sextortion and how they can help prevent kids and teens from being victims. This series offers three-to-five-minute videos about current online safety topics and provides essential information about the true dangers of online activities.

    The videos can be accessed from the following locations:

    nationalcac.org/sextortion-prevention/

    https://www.youtube.com/@nationalcac

    If you suspect or become aware of possible sexual exploitation of a child, please contact law enforcement. To alert the FBI Birmingham Office, call 205-326-6166. Reports can also be filed with the National Center for Missing & Exploited Children (NCMEC) or online at www.cybertipline.org.

    The case was brought as part of Project Safe Childhood, a nationwide initiative launched by the Department of Justice in May 2006 to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    MIL Security OSI

  • MIL-OSI Security: Delta Junction Man Sentenced for “Bud and Breakfast” Fraud Scheme

    Source: US FBI

    FAIRBANKS, Alaska – A Delta Junction man was sentenced today to two years in prison and is required to pay over $580,000 in restitution for running a years’ long scheme to defraud nearly two-dozen investors out of over $600,000.

    According to court documents, from January 2017 to January 2020, Brian Corty, 53, was the organizer and manager of a conspiracy to use false and fraudulent claims to gain investments for a potential business and use the investments for personal gain. As part of the scheme, Corty sold investors units in Ice Fog Holdings LLC to raise capital for a “Bud and Breakfast” which was described as a marijuana theme park, where they would grow, cultivate and sell marijuana, and allow customers to use marijuana on site.

    Corty purchased a building on the Richardson Highway near Salcha, Alaska, as the proposed location of the business. Corty falsely told investors that they were already growing marijuana and generating income and that the business would make millions of dollars in annual sales. Based on these misrepresentations, at least 22 people invested over $600,000 into the fraudulent scheme and the defendant used the money for personal gain, including to refinance his home and pay off debt.

    Corty pleaded guilty in January to one count of conspiracy to commit wire fraud. Corty is also required to serve three years’ supervised release as part of his sentence.

    “Mr. Corty manipulated unknowing investors by promising millions in proceeds and used their money for his personal gain,” said U.S. Attorney S. Lane Tucker for the District of Alaska. “Ensuring that white collar criminals, like Mr. Corty, are held accountable is a priority for my office. No one is above the law. We will continue work with our law enforcement partners to pursue prosecutions against individuals who choose to exploit unknowing victims through fraudulent means.”

    “Mr. Corty lured investors with promises of prosperity and guaranteed returns, when in truth, he diverted the investor money to fund his own lifestyle,” said Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office. “Those who engage in fraudulent schemes at the expense of others will be investigated and held accountable.”

    The FBI Anchorage Field Office, Fairbanks Resident Agency, with assistance from the Alaska Department of Law, investigated the case.

    Assistant U.S. Attorneys Tom Bradley and Ryan Tansey prosecuted the case.

    MIL Security OSI

  • MIL-OSI Security: Ketchikan Man Sentenced to 13 Years and Four Months for Running Child Pornography Distribution Group Chat

    Source: US FBI

    JUNEAU, Alaska – A Ketchikan man was sentenced today to 13 years and 4 months in prison for distributing child pornography through a group messaging platform.

    According to court documents, Walter William Onstad, 46, was an administrator of a messaging group known as “Anything Goes.” The chat was used exclusively to exchange child pornography, with some of the visuals depicting the sexual abuse of pre-pubescent minors.

    Court documents say investigators with the National Center for Missing and Exploited Children received a tip in April 2022 that an individual, later identified as Onstad, sent at least 12 images and videos of child pornography to another user through the messaging platform.

    An investigation revealed that Onstad solicited images depicting child sexual abuse from those wanting to enter the “Anything Goes” group chat. The defendant would personally verify the images, upload the images to the group chat and grant access to people who provided them.

    As the investigation continued, the defendants cell phone was taken by law enforcement and over 300 images and 40 videos of child sexual abuse were in his possession on the phone. The defendant admitted to being responsible for the possession and distribution of over 600 images. Some of the images he possessed and distributed included the sexual abuse of minors as young as infants and toddlers.

    “Mr. Onstad contributed to the victimization of children by running a child sexual abuse material distribution chat and was responsible for sharing hundreds of images of innocent children,” said U.S. Attorney S. Lane Tucker for the District of Alaska. “We will continue to work with law enforcement to relentlessly pursue, arrest and prosecute individuals who traffic images of child sexual abuse and hold them responsible for the incalculable damage they’ve caused.”

    “Innocent children are revictimized each time CSAM is distributed,” said Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office. “As an administrator of a CSAM distribution operation, Walter Onstad fueled a market that preys on our most vulnerable. No matter how they commit their crimes, those who sexually exploit children will be pursued and held accountable by the FBI and law enforcement partners, for justice and the safety of our children.”

    The Juneau Resident Agency of the FBI Anchorage Field Office, with assistance from the Ketchikan Police Department and North Carolina’s Internet Crimes Against Children (ICAC) Task Force, investigated the case.

    Assistant U.S. Attorney Jack Schmidt prosecuted the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: Chicago Man, Woman Charged in Fraud Scheme Targeting North Pole Business

    Source: US FBI

    FAIRBANKS, Alaska – A federal grand jury in Alaska returned an indictment charging a Chicago man and woman with allegedly running a scheme to defraud a North Pole restaurant of over $128,000.

    According to court documents, from July to August 2022, Jacob Centeno, 39, and Amber Davila, 35, allegedly illegally obtained banking and identification information for the restaurant and restaurant owner by gaining access to their email. The defendants used this information and access to misrepresent themselves as the owner and divert proceeds from the owner’s bank account to a different account registered under a false identity that the defendants created and had access to.

    In total, roughly $128,246 was diverted to the defendants’ fraudulent bank account between Aug. 4 and Aug. 9, 2022.

    As part of the scheme, Centeno and Davila allegedly purchased over $41,000 worth of money orders from the fraudulent bank account over the course of multiple days in Chicago. They then deposited the money orders into their various personal and business accounts in aggregate amounts of less than $10,000. Finally, to further conceal their scheme, they withdrew money from a business account registered in their names and deposited it into their personal accounts.

    Centeno and Davila were arrested in Chicago on June 4 and are charged with one count of aggravated identity theft in violation of 18 U.S.C. §1028A(a)(1), one count of conspiracy to commit wire fraud in violation of 18 U.S.C. §1349, five counts of wire fraud in violation of 18 U.S.C. §1343, one count conspiracy to commit money laundering in violation of 18 U.S.C. §1956(h), 18 U.S.C. §1956(a)(1)(B)(i), and eight counts of money laundering in violation of 18 U.S.C. §1956(a)(1)(B)(i). The defendants will make their initial court appearance on a later date. If convicted, they face a mandatory minimum of two years for aggravated identity theft, which is served consecutive to any other sentence for their alleged crimes. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    U.S. Attorney S. Lane Tucker of the District of Alaska and Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office made the announcement.

    The FBI Anchorage Field Office, FBI Fairbanks Resident Agency, FBI Chicago Field Office and North Pole Police Department are investigating the case.

    Assistant U.S. Attorneys Carly Vosacek and Michael Heyman are prosecuting the case. The U.S. Attorney’s Office, Northern District of Illinois provided significant legal support in this case.

    If you or someone you know might be a victim of fraud or other crime, you can report it to the FBI at tips.fbi.gov or through the Internet Crime Complaint Center (IC3) at ic3.gov.

    An indictment is merely an allegation, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    ###

    UPDATE: This release has been updated to no longer state that the indictment came back “today” and correct the year in paragraph three from “2024” to “2022” in the text. 

    MIL Security OSI

  • MIL-OSI Security: CEO of CardReady LLC Sentenced to Seven Years in Prison for $19 Million Credit Card Laundering Scheme

    Source: US FBI

    Defendant Created Phony Merchant Accounts to Obtain Credit Card Processing for Fraudulent Telemarketing Scheme

    Matthew Podolsky, the Acting United States Attorney for the Southern District of New York, announced that BRANDON BECKER, the former CEO of CardReady, LLC (“CardReady”), was sentenced today to seven years in prison for operating a credit card laundering scheme in which BECKER and his co-conspirators stole over $19 million based on false promises that they could reduce thousands of customers’ debt burdens. As part of this scheme, BECKER and his co-conspirators created dozens of sham merchant accounts and false merchant applications, defrauding a credit card processing company and federally insured bank into processing victim payments. BECKER previously pled guilty before U.S. District Judge Loretta A. Preska, who also imposed today’s sentence.

    Acting U.S. Attorney Matthew Podolsky said: “Over a two-year period, Brandon Becker and his co-conspirators preyed on nearly 20,000 victims who were trying to reduce their debt burdens. Becker tasked co-conspirators at CardReady to recruit straw owners for shell companies, and deceived credit card payment processors into fraudulently processing more than $19 million in stolen funds. With today’s sentence, Becker faces the consequences of this massive fraud, sending the clear message that corporate executives who facilitate fraud will be held accountable for their crimes.”

    According to the Superseding Indictment, court filings, and statements made in Court:

    BECKER was the CEO of CardReady, a Los-Angeles based company acting as a sales agent in the credit card processing industry.  As part of its business as a sales agent, CardReady found merchants who wanted credit card processing services, and submitted merchant applications on behalf of those merchants to an Independent Sales Organization (“ISO”), referred to in the Indictment as the “New York ISO.”  The New York ISO then evaluated the merchant applications, and referred acceptable merchant accounts for processing up the chain to Payment Processor-1 and to Bank-1.  Bank-1 and Payment Processor-1, in turn, processed payments to merchants for purchases by customers who had used credit cards.

    In or about 2012, BECKER negotiated a deal with co-defendant STEVEN SHORT, the former head of Florida-based E.M. Systems & Services LLC and affiliated companies (collectively, “E.M. Systems”).  Under this deal, CardReady would retain approximately one-third of E.M. Systems’ credit card sale transactions in exchange for providing E.M. Systems access to the credit card processing network.  For roughly the next two years, SHORT and telemarketers working in boiler rooms for E.M. Systems cold-called customers and offered services, including debt consolidation and interest-rate reduction, which were prohibited by the applicable guidelines from Bank-1 and other associated processing entities (the “Guidelines”), and which – as BECKER knew – would produce chargebacks from dissatisfied customers far in excess of the number and rate of chargebacks permitted under the Guidelines.

    In securing payment card processing for E.M. Systems, BECKER concealed that E.M. Systems was the true underlying merchant.  Instead, BECKER and his subordinates and co-conspirators, created approximately 26 sham merchant companies, each headed by a “signer” (the “Sham Merchants” and the “Sham Merchant Accounts”).  The 26 signers for the 26 Sham Merchants typically had no business of their own, and lacked knowledge of E.M. Systems’ business.  In return for signing the paperwork provided to them, the signers were paid a nominal fee from CardReady. 

    BECKER and his co-conspirators prepared and coordinated fraudulent merchant applications for each of the Sham Merchants, through merchant applications that falsely described the Sham Merchants to make them look like legitimate independent businesses and to make it more likely that the associated Sham Merchant Account would be approved for processing by the New York ISO, Payment Processor-1, and Bank-1.  The merchant application for each Sham Merchant also concealed the Sham Merchant’s true association with E.M. Systems.

    By steering E.M. Systems’s payment processing through these Sham Merchant Accounts, BECKER accomplished a number of fraudulent purposes.  First, the use of these Sham Merchant Accounts made it possible for E.M. Systems and other high-risk merchants to conceal their identities from Payment Processor-1 and Bank-1 and to maintain payment card processing.  This was particularly relevant, as Payment Processor-1 repeatedly required CardReady to close individual Sham Merchant Accounts because of excessive chargebacks and reports of sales of prohibited services.  BECKER then caused CardReady to quickly replace the closed Sham Merchant Accounts with new Sham Merchant Accounts, precluding Payment Processor-1 from shutting down its processing of E.M. Systems and other high-risk merchants.  Second, the fraudulent processing scheme enabled E.M. Systems and other high-risk merchants to spread out their charges, refunds, and chargebacks across multiple Sham Merchant Accounts.  This enabled them to evade chargeback monitoring programs operated by Bank-1, Payment Processor-1, and the New York ISO.

    BECKER’s use of signers to deceive payment processors was not limited to the E.M. Systems scheme. BECKER and his agents and employees at CardReady systematized the recruitment of over 270 signers and the creation of over 800 Sham Merchant Accounts to be used by more than 30 high risk clients other than E.M. Systems between approximately 2012 and 2016, both before and after the E.M. Systems scheme.

    *                *                *

    BECKER, 53, of Los Angeles, California, pled guilty on August 30, 2024, to one count of conspiracy to commit wire fraud and bank fraud.  In addition to the prison sentence, BECKER was sentenced to three years of supervised release and ordered to pay restitution in the amount of $1,910,600.05, and forfeiture of $11,405,964.00.

    STEVEN SHORT, 48, of Tampa, Florida, pled guilty on August 16, 2022, to one count of conspiracy to commit wire fraud and bank fraud.  On May 2, 2023, SHORT was sentenced to 78 months in prison and three years of supervised release and ordered to pay restitution in the amount of $1,910,600.05 and forfeiture of $8,833,889.69.

    Mr. Podolsky praised the work of the Federal Bureau of Investigation and thanked the Federal Trade Commission for its assistance.

    This case is being handled by the Office’s Complex Frauds and Cybercrime Unit.  Assistant U.S. Attorneys Vladislav Vainberg and Timothy Capozzi are in charge of the prosecution.

    MIL Security OSI

  • MIL-OSI Security: Yellville Man Sentenced to 30 Years in Federal Prison for Online Sexual Enticement of a Minor

    Source: US FBI

    FayettevilleIsaac James Melder, age 42, of Yellville was sentenced on February 13, 2024, to 360 months in prison without the possibility of parole after being found guilty of communicating with a minor through the internet to entice the minor to engage in illegal sexual activity.  The Honorable Judge Timothy L. Brooks presided over the sentencing hearing in the U.S. District Court in Fayetteville.

    According to court documents, in May of 2022, a fourteen-year-old female was reported missing after failing to get on the afternoon school bus.  An extensive search involving multiple law enforcement agencies began, during which officers discovered that Melder and the victim had communicated via the internet using an Xbox.  The messages revealed the two had planned to run away and live in a cave in the Marion County wilderness. The investigation further revealed that Melder had groomed both the victim and her family by providing groceries, money, alcohol, and marijuana and referred to the victim as his wife.

    On June 22, 2022, an informant led law enforcement to the cave where Melder and the victim had lived since their May disappearance.  Melder was immediately taken into state custody.

    Melder was indicted by a Grand Jury in the Western District in April of 2023 and entered a plea of guilty in July 2023.

    U.S. Attorney David Clay Fowlkes of the Western District of Arkansas made the announcement.

    Mountain Home Police Department, Baxter County Sheriff’s Office, Marion County Sheriff’s Office, Arkansas State Police, Flippin Police Department, Arkansas Department of Correction, the U.S. Marshal’s Service, Federal Bureau of Investigation, Harrison Police Department, Arkansas Game and Fish Commission, Arkansas State Parks, the 14th Judicial District Drug Task Force, investigated or assisted in the search in the case.

    Assistant U.S. Attorney Devon Still prosecuted the case for the United States.

    This case was prosecuted as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    Related court documents may be found on the Public Access to Electronic Records website @ www.pacer.gov

    MIL Security OSI

  • MIL-OSI Russia: Large IT businesses view Novosibirsk State University as a key university for training specialists in this industry for Siberia

    Translation. Region: Russian Federal

    Source: Novosibirsk State University – Novosibirsk State University –

    A strategic session with the participation of representatives of one of the largest Russian IT holdings, the T1 Group of Companies, was held at Novosibirsk State University. Following the meeting, the parties expressed mutual interest in deepening cooperation and announced the start of work on roadmaps for the implementation of joint projects in the educational and technological tracks.

    Opening the meeting, the rector of NSU, academician of the Russian Academy of Sciences Mikhail Fedoruk noted:

    — Cooperation with T1 is developing rapidly. This distinguishes the holding from many other companies wishing to become our industrial partners. We hope that further joint work will bring tangible and mutually beneficial results.

    According to Mikhail Knigin, head of the Integration domain of the holding, T1 plans to build systematic work on training personnel specifically in the Novosibirsk region:

    — We work all over the country, Siberia is an important region for us, and we want to see NSU as a flagship university here. Already now, about 80 NSU graduates work in our companies — the growth of this number will become one of the metrics of the partnership’s effectiveness.

    Ksenia Rumbest, Director of the Corporate Training and Talent Development Department and Head of the T1 Digital Academy, spoke about the practice of training young specialists. One of the largest projects was the T1 IT Camp, where about 1,000 participants were trained last year. The best 150 were invited to the in-person stage of the program, and some of them then became employees of the holding’s companies.

    This year, according to her, it is planned to launch regional camps based at universities. The introduction of the “open schools” format was also discussed – five-week intensive courses to develop professional competencies. About 40% of graduates of such schools get jobs at T1, the rest go to other leading Russian and international IT companies.

    “We are ready to offer these courses to the university as additional education, and also invite students for internships during the academic year,” Rumbest emphasized.

    Cooperation between NSU and the holding can develop not only in the educational, but also in the scientific and technological sphere. The session presented the project “SPHERE” – a domestic platform for managing the full cycle of software development, including tools for project management, code analysis, testing, monitoring and automation of business processes.

    An additional area of interaction may be joint work in the field of artificial intelligence. The AI Center, which develops technologies for the digitalization of the urban environment, has been operating at NSU for the second year. The head of the center, Alexander Lyulko, spoke about developments in creating platforms for managing urban infrastructure, creating intelligent systems for monitoring the environmental situation, as well as AI solutions for transport, medicine and construction. The latest projects have attracted the greatest interest from representatives of the holding.

    Reference:

     

    T1 is one of the leaders of the domestic IT market with more than 30 years of history. The holding includes companies providing a full range of IT services: from software development and system integration to cloud solutions, big data analysis, artificial intelligence, information security and industrial outsourcing. Key areas of work include digital transformation of businesses and government agencies. The company has more than 26 thousand employees, revenue for 2024 is 249.6 billion rubles.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Security: David K. Porter Named Special Agent in Charge of the Honolulu Field Office

    Source: US FBI

    Director Christopher Wray has named David K. Porter as the special agent in charge of the Honolulu Field Office. Mr. Porter most recently served as the chief of staff for the Deputy Director at FBI Headquarters in Washington, D.C.

    Mr. Porter began his career with the FBI as a special agent in 2006, initially assigned to the Pittsburgh Field Office Joint Terrorism Task Force. In 2010, Mr. Porter transferred to the Detroit Field Office, where he investigated counterterrorism matters. In addition to his work as a special agent in the Pittsburgh and Detroit Field Offices, Mr. Porter also served as an operator on the FBI Pittsburgh and Detroit SWAT Teams.

    In 2013, Mr. Porter was promoted to associate division counsel in the Detroit Field Office and later promoted to supervisory special agent of the Public Corruption and Civil Rights programs in 2015.

    Mr. Porter was selected as an assistant section chief to the Cyber Division at FBI Headquarters in 2019. He was detailed full-time to the Counterintelligence Division’s Foreign Influence Task Force, where he led investigative operations, intelligence production, and interagency policy engagement with the National Security Council.

    Mr. Porter returned to Detroit in May 2021 as the crisis response supervisory special agent. In July 2021, he was then selected as an assistant special agent in charge of the Detroit Field Office, with operational responsibility for the Western District of Michigan and oversight of six resident agencies spanning 49 counties.

    Immediately prior to joining the FBI, Mr. Porter served as counsel for the U.S. Senate Committee on Homeland Security and Governmental Affairs. He also has previous experience practicing law as a corporate litigation attorney, and he served as a high school history teacher. Mr. Porter earned bachelor’s degrees in American history and literature from Calvin University and a juris doctor degree from the University of Michigan Law School.

    MIL Security OSI

  • MIL-OSI Security: FBI San Diego Seizes Cryptocurrency Recovery Websites

    Source: US FBI

    SAN DIEGO — Special Agents with the FBI San Diego Field Office have seized websites belonging to three cryptocurrency recovery services. The seizures come as the FBI continues to crack down on an emerging scam tactic aimed at further defrauding cryptocurrency scam victims.

    The web domains were from the following cryptocurrency recovery services: MyChargeBack, Payback LTD, and Claim Justice. These companies claim to provide cryptocurrency tracing and promise the ability to recover lost funds. Representatives of these companies often advertise strong success in recovering victim funds but have no track record in doing so. They often charge significant upfront fees and ask for a commission should funds be recovered. These companies use extensive social media advertising, including false reviews, to convince victims of the legitimacy of their services.

    Potential ways to identify this type of scheme:

    • Recovery scheme fraudsters charge an up-front fee and either cease communication with the victim after receiving an initial deposit or produce an incomplete or inaccurate tracing report. They may also request additional fees to recover funds.
    • Fraudsters may claim affiliation with law enforcement or legal services to appear legitimate.
    • Scammers may reference actual financial institutions and money exchanges to build credibility and further their schemes.

    Tips to avoid becoming a victim:

    • Be wary of advertisements for cryptocurrency recovery services. Research the advertised company and beware if the company uses vague language, has a minimal online presence, and makes promises regarding an ability to recover funds.
    • If an unknown individual contacts you and claims to be able to recover stolen cryptocurrency, do not release any financial or personal identifying information, and do not send money.
    • Law enforcement does not charge victims a fee for investigating crimes. If someone claims an affiliation with the FBI, contact the FBI San Diego Field Office at 858-320-1800 to confirm.

    Individuals who believe they may have been a victim of this type of scheme should file a report with the FBI’s Internet Crime Complaint Center at ic3.gov.

    MIL Security OSI

  • MIL-OSI Security: Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers

    Source: US FBI

    Note: View the affidavit here.

    The Justice Department today announced a court-authorized law enforcement operation that disrupted a botnet consisting of more than 200,000 consumer devices in the United States and worldwide. As described in court documents unsealed in the Western District of Pennsylvania, the botnet devices were infected by People’s Republic of China (PRC) state-sponsored hackers working for Integrity Technology Group, a company based in Beijing, and known to the private sector as “Flax Typhoon.”

    The botnet malware infected numerous types of consumer devices, including small-office/home-office (SOHO) routers, internet protocol (IP) cameras, digital video recorders (DVRs), and network-attached storage (NAS) devices. The malware connected these thousands of infected devices into a botnet, controlled by Integrity Technology Group, which was used to conduct malicious cyber activity disguised as routine internet traffic from the infected consumer devices. The court-authorized operation took control of the hackers’ computer infrastructure and, among other steps, sent disabling commands through that infrastructure to the malware on the infected devices. During the course of the operation, there was an attempt to interfere with the FBI’s remediation efforts through a distributed denial-of-service (DDoS) attack targeting the operational infrastructure that the FBI was utilizing to effectuate the court’s orders. That attack was ultimately unsuccessful in preventing the FBI’s disruption of the botnet.

    “The Justice Department is zeroing in on the Chinese government backed hacking groups that target the devices of innocent Americans and pose a serious threat to our national security,” said Attorney General Merrick B. Garland. “As we did earlier this year, the Justice Department has again destroyed a botnet used by PRC-backed hackers to infiltrate consumer devices here in the United States and around the world. We will continue to aggressively counter the threat that China’s state- sponsored hacking groups pose to the American people.”

    “Our takedown of this state-sponsored botnet reflects the Department’s all-tools approach to disrupting cyber criminals. This network, managed by a PRC government contractor, hijacked hundreds of thousands of private routers, cameras, and other consumer devices to create a malicious system for the PRC to exploit,” said Deputy Attorney General Lisa Monaco. “Today should serve as a warning to cybercriminals preying on Americans – if you continue to come for us, we will come for you.”

    “This dynamic operation demonstrates, once again, the Justice Department’s resolve in countering the threats posed by PRC state-sponsored hackers,” said Assistant Attorney General Matthew G. Olsen of the National Security Division. “For the second time this year, we have disrupted a botnet used by PRC proxies to conceal their efforts to hack into networks in the U.S. and around the world to steal information and hold our infrastructure at risk. Our message to these hackers is clear: if you build it, we will bust it.”

    “The disruption of this worldwide botnet is part of the FBI’s commitment to using technical operations to help protect victims, expose publicly the scope of these criminal hacking campaigns, and to use the adversary’s tools against them to remove malicious infrastructure from the virtual battlefield,” said FBI Deputy Director Paul Abbate. “The FBI’s unique legal authorities allowed it to lead an international operation with partners that collectively disconnected this botnet from its China-based hackers at Integrity Technology Group.”

    “The targeted hacking of hundreds of thousands of innocent victims in the United States and around the world shows the breadth and aggressiveness of PRC state-sponsored hackers,” said U.S. Attorney Eric G. Olshan for the Western District of Pennsylvania. “This court-authorized operation disrupted a sophisticated botnet designed to steal sensitive information and launch disruptive cyber attacks. We will continue to work with our partners inside and outside government, using every tool at our disposal, to defend and maintain global cybersecurity.”

    “The FBI’s investigation revealed that a publicly-traded, China-based company is openly selling its customers the ability to hack into and control thousands of consumer devices worldwide. This operation sends a clear message to the PRC that the United States will not tolerate this shameless criminal conduct,” said Special Agent in Charge Stacey Moy of the FBI San Diego Field Office.

    According to the court documents, the botnet was developed and controlled by Integrity Technology Group, a publicly-traded company headquartered in Beijing. The company built an online application allowing its customers to log in and control specified infected victim devices, including with a menu of malicious cyber commands using a tool called “vulnerability-arsenal.” The online application was prominently labelled “KRLab,” one of the main public brands used by Integrity Technology Group.

    The FBI assesses that Integrity Technology Group, in addition to developing and controlling the botnet, is responsible for computer intrusion activities attributed to China-based hackers known by the private sector as “Flax Typhoon.” Microsoft Threat Intelligence described Flax Typhoon as nation-state actors based out of China, active since 2021, who have targeted government agencies and education, critical manufacturing, and information technology organizations in Taiwan, and elsewhere. The FBI’s investigation has corroborated Microsoft’s conclusions, finding that Flax Typhoon has successfully attacked multiple U.S. and foreign corporations, universities, government agencies, telecommunications providers, and media organizations.

    A cybersecurity advisory describing Integrity Technology Group tactics, techniques and procedures was also published today by the FBI, the National Security Agency, U.S. Cyber Command’s Cyber National Mission Force, and partner agencies in Australia, Canada, New Zealand and the United Kingdom. 

    The government’s malware disabling commands, which interacted with the malware’s native functionality, were extensively tested prior to the operation. As expected, the operation did not affect the legitimate functions of, or collect content information from, the infected devices. The FBI is providing notice to U.S. owners of devices that were affected by this court-authorized operation. The FBI is contacting those victims through their internet service provider, who will provide notice to their customers.

    The FBI’s San Diego Field Office and Cyber Division, the U.S. Attorney’s Office for the Western District of Pennsylvania, and the National Security Cyber Section of the Justice Department’s National Security Division led the domestic disruption effort. Assistance was also provided by the Criminal Division’s Computer Crime and Intellectual Property Section. These efforts would not have been successful without the collaboration of partners, including French authorities, and Lumen Technologies’ threat intelligence group, Black Lotus Labs, which first identified and described this botnet, which it named Raptor Train, in July 2023.

    If you believe you have a compromised computer or device, please visit the FBI’s Internet Crime Complaint Center (IC3) or report online to CISA. You may also contact your local FBI field office directly.

    The FBI continues to investigate Integrity Technology Group’s and Flax Typhoon’s computer intrusion activities.

    MIL Security OSI

  • MIL-OSI: Security Federal Announces Cash Dividend

    Source: GlobeNewswire (MIL-OSI)

    AIKEN, S.C., May 22, 2025 (GLOBE NEWSWIRE) — Security Federal Corporation, parent company of Security Federal Bank, is pleased to announce that a quarterly dividend of $0.15 per share will be paid on or about June 15, 2025, to shareholders of record as of May 31, 2025.   

    This is the one hundred thirty-eighth consecutive quarterly dividend to shareholders since the Bank’s conversion in October of 1987 from a mutual to a stock form of ownership. The dividend was declared as a result of the Bank’s continued profitability.

    Security Federal Bank has nineteen full-service branch locations in Aiken, Ballentine, Clearwater, Columbia, Graniteville, Langley, Lexington, North Augusta, Ridge Spring, Wagener and West Columbia, South Carolina and Augusta and Evans, Georgia. A full range of financial services, including trust and investments, are provided by the Bank, and insurance services are provided by the Bank’s wholly owned subsidiary, Security Federal Insurance, Inc.

    Security Federal Corporation common stock is traded on the Over-the-Counter Bulletin Board under the symbol SFDL.

    The MIL Network

  • MIL-OSI Economics: Global space economy market to surpass $511 billion in 2029, forecasts GlobalData

    Source: GlobalData

    Global space economy market to surpass $511 billion in 2029, forecasts GlobalData

    Posted in Strategic Intelligence

    The global space economy market is forecast to grow at a compound annual growth rate (CAGR) of 4.0% from $421.0 billion in 2024 to $511.2 billion in 2029, driven by an increase in the deployment of low Earth orbit (LEO) satellites, productivity improvements in satellite equipment manufacturing, the competitive launch services landscape, and demand for services around data communications, navigation, and Earth observation. according to GlobalData, a leading data and analytics company.

    GlobalData’s latest Strategic Intelligence report, “The Space Economy” reveals that space applications, which include satellite communications, navigation, and Earth observation, is the largest segment of the space economy and will grow at a CAGR of 2.9% to reach $334.8 billion by 2029.

    Falling manufacturing and launch costs, non-Western companies’ entrance into the space economy market, increased space militarization, and new uses for data from space are the other growth drivers of the space economy.

    William Rojas, Research Director, Strategic Intelligence at GlobalData, comments: “Different scenarios indicate different growth rates for the space economy market over the coming decade. Issues that may restrict growth include a continuation of the currently challenging global economic environment, Russia’s permanent exit from the space economy, and whether Chinese companies can fulfill the country’s space ambitions. The uncertain financial viability of young satellite and rocket companies and the market’s low return on investment in the short term, combined with the current global economic environment, could lead to a pause in investor confidence in the space economy beyond 2025.”

    Future market growth will also depend on the development of reusable rockets and more affordable and frequent ride-sharing services that will increase payload slots on launch missions. The space tourism and colonization subsectors are unlikely to significantly contribute to the overall space economy market until after 2030.

    Rojas adds: “Space is no longer the sole domain of governments and incumbent aerospace and defense companies. Technological advances in manufacturing, propulsion, and the launch of rockets have made it much easier and less expensive to venture into space. Those businesses that pursued emerging opportunities have gained a first-mover advantage. SpaceX was the first private company to launch a spacecraft into orbit and return it safely to Earth. Currently, it charges clients $69.5 million per launch of the Falcon 9, its partially reusable medium-lift launch vehicle.”

    The sector has become incredibly competitive, with various start-ups developing concepts for cost-effective rockets and satellites to rival the aerospace giants. The large satellite groups continue to consolidate to compete with Starlink and the future Amazon Kuiper mega-constellations. Eutelsat and OneWeb merged in 2022, Viasat acquired Inmarsat in 2023, and SES acquired Intelsat in 2024. This market consolidation will continue.

    Rojas continues: ”Satellite broadband communications has become the new strategic imperative impacting national sovereignty, national security, and national digital infrastructure. Countries lagging in terrestrial broadband residential and enterprise infrastructure can use satellite broadband to help fill the gap with advanced countries and attract more foreign direct investment and the digitalization of industry sectors.”

    Technological advancements, such as spaceborne synthetic aperture radar (SAR) for detailed surface mapping and satellite-to-ground optical (laser) technology for ultra-high-speed data transmission, 5G Non-Terrestrial Network (NTN), and satellite device-to-device technology, will enhance remote sensing and communications capabilities. Quantum key distribution (QKD) for satellite communications could boost data transmission security for banks, data center companies, government data centers, and corporate data centers. These technologies will all benefit the space economy in 2025.

    Rojas concludes: “The space economy has been intertwined with the oil and gas and mining sector for several decades already, and now with the falling communications costs of satellite broadband combined with new technologies, many sectors from agriculture to maritime to emergency and disaster response to media will benefit from the pervasiveness of satellite coverage as well as the new capacity that is coming online, reflecting an increase of over 65X between 2015 and 2025.”

    MIL OSI Economics

  • MIL-OSI Economics: Cyberattack could cause M&S’ apparel market share to stall in 2025, says GlobalData

    Source: GlobalData

    Cyberattack could cause M&S’ apparel market share to stall in 2025, says GlobalData

    Posted in Retail

    Following Marks & Spencer’s update on the financial implications of its cyberattack:

    Pippa Stephens, Senior Apparel Analyst at GlobalData, offers her view:

    Marks & Spencer was one of the biggest winners in the UK apparel market in 2024, with its market share rising 0.4ppts to 5.2%*, the highest it has been since 2017. However, this upward trajectory is now under threat following its cyberattack. It has paused online orders for nearly four weeks already, with online disruption expected to continue until at least July. GlobalData estimates that prior to the attack, M&S was set to take around £250m in online apparel sales between May and July, showing how much the retailer could potentially lose, though some of this spend will likely shift to stores. Alongside reduced availability in its food division, and anticipated increased stock management costs, M&S also expects the attack to have a £300m impact on group operating profit in its FY2025/26.

    “Even once M&S has ensured the security of its systems, and starts taking online orders again, the impact of this event will be long-lasting. While the retailer has taken swift action, and been extremely transparent with consumers, the stealing of customer data during the cyberattack could undermine its hard-won gains in brand reputation and customer loyalty. Moreover, it will be left with excess seasonal stock due to the halt of its online operations, likely impacting its margins as it will be forced to implement more discounts. Therefore, this incident serves as a stark reminder of the vulnerabilities retailers face in an increasingly digital landscape, where a single breach can have far-reaching consequences.

    “With the retailers’ recent impressive growth down to its transformation into a more fashion-forward retailer, appealing to younger demographics through more contemporary own-brand designs, as well as partnerships with popular brands such as Nobody’s Child and Adidas, it must now double down on this more than ever to regain appeal. It should also continue to showcase its commitment to quality as consumers prioritise the value for money of their purchases, to deter them from shifting spend elsewhere, and keep investing in its online platform once it is back up and running, to capitalise on the channel’s ongoing outperformance.”

    *Data is from GlobalData’s Retail Intelligence Center. Market shares are calculated from UK apparel sales for the calendar year, including sales tax. Shares are as of May 2025.

    MIL OSI Economics

  • MIL-OSI Economics: Influencers embrace Google’s Veo 3 as future of filmmaking, reveals GlobalData

    Source: GlobalData

    Influencers embrace Google’s Veo 3 as future of filmmaking, reveals GlobalData

    Posted in Business Fundamentals

    Google LLC has captured the attention of influencers on X, largely due to the launch of its innovative AI video generation model, Veo 3, in the third week of May 2025, during the Google I/O event. Influencers have pointed out how this technology makes it increasingly difficult to distinguish between real and AI-generated content, generating excitement about its potential applications. The buzz is further fueled by the integration of Veo 3 with other cutting-edge tools like Flow and Imagen 4, which can collectively enhance the creative process for filmmakers and content creators, reveals the Social Media Analytics Platform of GlobalData, a leading data and analytics company.

    Shreyasee Majumder, Social Media Analyst at GlobalData, comments: “The reactions from influencers predominantly reflect a strong sense of optimism regarding the implications of Veo 3’s capabilities. Many are excited about the transformative potential of AI in filmmaking, with predictions that traditional CGI may soon be replaced by AI-generated visuals in movies.

    “Influencers are particularly enthusiastic about how Veo 3 can enhance creativity and streamline the filmmaking process, allowing creators to produce high-quality content more efficiently. The integration of features like native audio generation and the collaborative tool Flow is seen as a game-changer for filmmakers and content creators, empowering them to explore new storytelling techniques.”

    Below are a few popular influencer opinions captured by GlobalData’s Social Media Analytics Platform:

    1. Shubham Saboo, Head of Developer Relations at Tenstorrent Inc:

    “Google Veo 3 literally generated this video with voiceover and sound from a single prompt.This is INSANE!! The AI FUTURE is here.”

    1. Bilawal Sidhu, TED Curator:

    “non-human intelligence comes in peace the dialogue, lip movement, environmental audio — all perfectly synced — all from one prompt what should i prompt with google veo 3 next?.”

    1. Derya Unutmaz, Professor at The Jackson Laboratory:

    “Veo 3 by @GeminiApp is incredible! It now supports both visuals and sound, this is another landmark advance in AI video! It can generate videos with sound effects, background noise and dialogue! Best of #GoogleIO so far, film making is revolutionized!”

    1. Ashish Rajan, Chief Information Security Officer at Kaizenteq:

    “I was gonna watch a movie this weekend… but now I might just make one. Google’s new AI Veo 3, can generate entire videos with music, people, dialogue, everything. (Play the Clip below) As a creator, this is wild. The game is changing fast. Could you tell this is not AI?”

    1. Haider, Technology Expert:

    “ngl, google “Veo 3” is more than crazy in the next 2 years, movies may use AI instead of traditional CGI for short scenes this could grow fast, which would lead to a big-budget film made almost fully with AI, though humans would still guide the process. AI could create thousands of hours of content before the final version is ready”

    MIL OSI Economics

  • MIL-OSI USA: Miller-Meeks Votes to Prevent Largest Tax Hike in American History

    Source: United States House of Representatives – Representative Mariannette Miller-Meeks’ (IA-02)

    Washington, D.C. — The House of Representatives has officially passed President Trump’s One Big, Beautiful Bill—historic legislation to secure the border, slash taxes, defend working Americans, and restore integrity to our institutions.

    Congresswoman Mariannette Miller-Meeks (IA-01), a 24-year Army veteran, physician, and former small business owner, issued the following statement:

    “Today, the House delivered a major victory for working Americans and the future of our country. By passing President Trump’s Big Beautiful Bill, we’re securing the border, removing illegal immigrants from Medicaid, and making the Tax Cuts and Jobs Act permanent—preventing the largest tax hike in American history,” said Dr. Miller-Meeks. “As a former small business owner and Army veteran, I know what’s at stake. This bill protects Iowa families, seniors, and small businesses while strengthening Medicaid for the vulnerable—not for those who can work and choose not to. I’m especially proud that my two bills to improve Medicaid integrity and expand access to pediatric care were included. Today’s vote is a win for Iowa and for every American who believes in work, responsibility, and a government that serves its people, not the other way around.”

    Key Wins in the One Big, Beautiful Bill:

    PREVENTS THE LARGEST TAX HIKE IN AMERICAN HISTORY:

    • Makes the Tax Cuts and Jobs Act permanent, preventing 106,800 Iowa families from a historic tax hike.
    • Stops a looming 20% tax hike on Iowa small businesses.
    • Ends federal taxes on tips and overtime pay.

    SECURES THE BORDER:

    • Finishes construction of the border fence.
    • Funds 10,000 new ICE agents and expands detention capacity.
    • Speeds up deportations of violent illegal aliens.

    PROTECTS MEDICAID FOR THOSE WHO NEED IT MOST:

    • Ends Medicaid for illegal immigrants and non-disabled adults who choose not to work.
    • Cracks down on billions in waste, fraud, and abuse.
    • Recommits Medicaid to children, pregnant women, seniors, veterans, and people with disabilities.

    Miller-Meeks Legislative Wins Included:

    The Medicaid Program Improvement Act:

    • Requires states to verify addresses & reduces enrollment errors.
    • Avoids duplicate and improper payments to insurance companies.
    • Ensures vulnerable Iowans don’t lose access to care.

    The Accelerating Kids’ Access to Care Act:

    • Streamlines approval for out-of-state pediatric specialists.
    • Speeds up treatment for children on Medicaid and CHIP.
    • Eliminates barriers that delay lifesaving care.

    ###

    MIL OSI USA News

  • MIL-OSI Australia: Varying PAYG instalments for your SMSF

    Source: New places to play in Gungahlin

    If you’re a PAYG instalment amount payer, your instalments have been increased by the gross domestic product (GDP) adjustment factor. For the 2025–26 income year, the GDP adjustment factor is 4%.

    We’ll use the latest information you’ve provided to us when you lodge your SMSF annual return to calculate your new PAYG instalments amount or rate.

    You can vary your PAYG instalments if you think your current instalments will be more or less than your expected tax liability for the year. Your varied amount or rate will apply for the remainder of your income year or until you make another variation. You can lodge your variation through Online Services for Business.

    We encourage you to review your tax position regularly, so that your PAYG instalments reflect your expected tax for the year. Calculating and paying the right PAYG instalments will help you manage SMSF investments.

    Contact a registered tax agent if you need help or tax advice.

    Looking for the latest news for SMSFs? – You can stay up to date by visiting our SMSF newsroom and subscribingOpens in a new window to our monthly SMSF newsletter.

    MIL OSI News

  • MIL-OSI: Terra’s 2025 Vision Puts AI, Affordability, and Ecosystem Connectivity at the Center of Workers’ Comp Innovation

    Source: GlobeNewswire (MIL-OSI)

    COLLEGE STATION, Texas, May 22, 2025 (GLOBE NEWSWIRE) — Terra, the cloud-native platform redefining Workers’ Compensation software, today announced its bold 2025 roadmap—spotlighting new AI innovations, a radically fair pricing model, and seamless partner integrations. With transformative updates rolling out across claims and policy management, Terra is delivering what the industry has long lacked: true efficiency, simplicity, and transparency.

    Terra continues to expand its powerful suite of solutions, including Claims Management, Policy Administration, Claims Benchmarking, Connect Marketplace, and Compliance Management. These solutions are designed to simplify operations for stakeholders across the insurance and risk management ecosystem, such as Third-Party Administrators (TPAs), Carriers, Self-Insured Funds and Groups (SIFs and SIGs), Captives, Managing General Agents (MGAs), and Medical Service Providers.

    A standout differentiator for Terra is its Terra Connect functionality, a built-in marketplace that seamlessly links clients with leading service providers. This eliminates integration barriers and enables frictionless coordination across medical, legal, compliance, and ancillary vendors. This embedded ecosystem enables faster claim handling, streamlined workflows, and better outcomes.

    Announcing his vision for 2025 and beyond, James Benham, CEO and Co-Founder of Terra, stated, “Our AI capabilities are already making a substantial impact by enhancing efficiency and streamlining the claims process for our clients, but this is just the beginning. With features like OCR that auto-populates compliance forms and AI-generated claim note summaries already in action, our clients are saving hours on administrative tasks every week. We are developing novel AI tools that will elevate operational efficiency and decision-making to new levels. We also have key AI partnerships in the pipeline that will strengthen our core platform with best-in-class functionality across automation, fraud detection, and predictive analytics.”

    To that end, Terra has introduced a pricing model that disrupts legacy norms:

    • No setup fees
    • No long-term contracts
    • Flexible, month-to-month pricing based on claims volume (for claims) or gross written premium (for policy)

    Unlike legacy systems that rely on cumbersome processes, Terra’s cloud-native, AI-powered platform centralizes workflows, integrates seamlessly with payment systems and ancillary services, and delivers real-time reporting and analytics. This evolution demonstrates Terra’s commitment to providing forward-thinking solutions that address pain points such as manual interventions, security concerns, and the limitations of outdated systems.

    As Terra progresses on its 2025 roadmap, clients can expect a steady cadence of product rollouts throughout 2025, including deeper AI integrations, advanced risk-scoring features, and more intelligent automations across claims and policy operations.

    The company’s “Don’t Pay Until You’re Live” guarantee further cements its dedication to client success by eliminating financial risk during implementation.

    Explore the full roadmap and see Terra in action—Request a personalized demo here or go to http://terra.insure.

    About Terra

    Terra is a cloud-native platform transforming Workers’ Compensation claims and policy management. By streamlining operations, centralizing workflows, and integrating with critical systems, Terra delivers cutting-edge solutions designed to improve efficiency, reduce costs, and enhance overall management for TPAs, Carriers, SIFs, SIGs, Captives, MGAs, and Medical Service Providers.

    Media Contact
    Girish Jaggi
    The MicDrop Agency
    +1 (289) 623 3627
    girish@thmicdropagency.com

    The MIL Network

  • MIL-OSI: LambdaTest Launches SmartUI MCP Server to Bring Human-Like Intelligence to Visual Testing

    Source: GlobeNewswire (MIL-OSI)

    San Francisco, CA, May 22, 2025 (GLOBE NEWSWIRE) — LambdaTest, a unified agentic AI and cloud engineering platform, has introduced the SmartUI MCP Server, a revolutionary approach to visual regression testing that blends AI-native automation with human-like intelligence. Unlike traditional visual testing tools that rely solely on pixel comparison, the SmartUI MCP Server evaluates UI changes based on real-world user experience, identifying what matters, why it matters, and how to resolve it.

    Designed to simulate how a real user perceives visual changes using cognitive and Gestalt principles, the SmartUI MCP Server helps teams catch subtle yet critical design inconsistencies that often slip past in an automated pixel-to-pixel comparison. From detecting layout shifts and visual regressions to providing contextual root cause analysis, and recommending practical, minimal-effort code fixes that developers can implement immediately. The SmartUI MCP server transforms the debugging process into a seamless, intelligent experience.

    By simulating cognitive models of visual interpretation, the SmartUI MCP Server can discern whether a difference is significant to users or simply cosmetic. It doesn’t just point out changes, it explains them and recommends precise, context-aware solutions. Developers benefit from rapid, multi-layered analysis spanning pixel data, layout structure, DOM attributes, and perceptual shifts, enabling faster resolution without guesswork.

    With developer-ready outputs and intuitive insights, SmartUI MCP Server turns visual QA into a proactive process. It empowers teams to maintain high-quality interfaces that not only look right, but feel right, to the end user.

    “Great visual experiences aren’t defined by what machines catch they’re defined by what users notice,” said Asad Khan, CEO of LambdaTest. “The SmartUI MCP Server brings a Human-Like Interpretation into visual debugging, helping teams not only detect UI issues but understand them in context. Elevating SmartUI to become more than a visual testing tool – helping teams with a smarter way to build interfaces that feel right at first glance.”

    The SmartUI MCP Server sets a new benchmark in test automation by integrating AI assistants directly into the testing workflow. This innovation enables development teams to spot, interpret, and resolve UI issues faster and more intelligently than ever before.

    About LambdaTest

    LambdaTest is an AI-native, omnichannel software quality platform that empowers businesses to accelerate time to market through intelligent, cloud-based test authoring, orchestration, and execution. With over 15,000 customers and 2.3 million+ users across 130+ countries, LambdaTest is the trusted choice for modern software testing.

    • Browser & App Testing Cloud: Enables manual and automated testing of web and mobile apps across 10,000+ browsers, real devices, and OS environments, ensuring cross-platform consistency.
    • HyperExecute: An AI-native test execution and orchestration cloud that runs tests up to 70% faster than traditional grids, offering smart test distribution, automatic retries, real-time logs, and seamless CI/CD integration.
    • KaneAI: The world’s first GenAI-native testing agent, leveraging LLMs for effortless test creation, intelligent automation, and self-evolving test execution. It integrates directly with Jira, Slack, GitHub, and other DevOps tools.

    For more information, please visit, https://lambdatest.com

    The MIL Network

  • MIL-OSI: Infini Introduces Lowest Fees in Platform History for Stablecoin Transactions

    Source: GlobeNewswire (MIL-OSI)

    Infini slashes card fees to 0.1%, edges closer to a 0% stablecoin payment future

    HONG KONG, May 22, 2025 (GLOBE NEWSWIRE) — Infini, the next-generation Pay-Fi platform for stablecoin-based payments and financial services, today announced that its flagship Infini Global Card now offers a reduced transaction fee of just 0.1%, applicable to all users worldwide. This milestone marks the lowest fee tier in the platform’s history and brings it significantly closer to its long-term mission: making stablecoin payments feel free.

    Full compensation delivered within hours

    Earlier this year, Infini faced a significant security incident — an event that could have shattered user confidence.

    Instead, the founding team responded with unprecedented speed and transparency, publicly committing to and delivering full compensation to affected users within hours.

    “True trust is forged in crisis,” said Christian Li, Founder of Infini, “We didn’t wait to react — we chose to act. And our users stood by us because we stood by them.”

    Since then, Infini has implemented multi-layered upgrades to its custody architecture, partnered with leading security auditors, and established a resilient compliance and risk control system. The result? Continued growth, stronger infrastructure, and a community that believes more than ever.

    Card volume growth drives lower fees

    This foundational trust has enabled Infini to accelerate its roadmap.

    “This is exactly why we built the Infini Flywheel,” said Christian Li, Founder of Infini. “As an active node within the Visa and Mastercard networks, the more transaction volume we drive, the more cashback and network incentives we unlock. But instead of keeping those margins, we pass them directly back to users — by lowering fees. That engine is now accelerating.”

    Infini’s model has seen rapid growth across emerging markets like Latin America and Southeast Asia, where users are increasingly seeking low-cost, globally usable crypto payment tools amid rising inflation. As user spending continues to rise, Infini expects platform-level earnings to further improve, making a true 0% fee structure achievable in the near future.

    “No one should be penalized for using their own money,” said Christine, Co-founder of Infini, “That’s why we’re building a future where payments are fair, global, and practically free.”

    Daily yield automatically accrued

    In addition to lower fees, Infini also offers users effortless earnings on stablecoin balances. Funds held in Infini accounts accrue daily yield automatically — no action required.

    Earnings are calculated and distributed every day, creating a seamless blend of saving and spending in one place.

    Spend anywhere

    Since its launch, the Infini Global Card has allowed users to spend stablecoins like USDT and USDC globally via Apple Pay, Google Pay, PayPal, Alipay, and other major wallets. All transactions benefit from zero conversion fees, real-time FX settlement, and automatic daily yield generation — transforming stablecoin balances into productive capital, even while spending.

    In markets with high FX volatility, Infini has even observed what users call a “negative fee effect” — where the USD equivalent deducted during a transaction was lower than the local fiat equivalent at spot rate. This unexpected bonus reflects the real-world advantage of Infini’s 0% conversion fee and instant-settlement architecture over traditional payment rails.

    About Infini

    Infini is a next-generation Pay-Fi platform connecting stablecoin savings with real-world payments. Users can deposit stablecoins like USDT and USDC to earn daily yield and spend them directly via Infini’s virtual or physical cards, accepted globally through Visa and Mastercard networks. With full support for Apple Pay, Google Pay, PayPal, and Alipay, Infini offers a seamless bridge between DeFi earnings and everyday life.

    With over 50,000 active users and growing rapidly, Infini is expanding into new markets while continuing to lower costs, improve security, and introduce support for more currencies and payment scenarios.

    Website: https://infini.money
    Twitter / X: https://x.com/0xInfini

    Media Contact
    Valerio Li
    Head of Marketing
    media@infini.money

    Disclaimer: This is a paid post and is provided by Infini. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice.Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed.Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/c4e2c2d0-69d9-46d9-81f1-9dd1681536d3

    The MIL Network

  • MIL-OSI: XRP Whales Focus Attention to Nimanode’s $NMA Token Presale – No Code AI Agents on XRP Ledger

    Source: GlobeNewswire (MIL-OSI)

    LEEDS, United Kingdom, May 22, 2025 (GLOBE NEWSWIRE) — Nimanode, the pioneering platform merging artificial intelligence and the XRP Ledger is pleased to announce the kick off of their $NMA token presale which commenced on 22nd May 2025, 3pm UTC and is slated to run for a 30 day window.

    As interest in XRP grows, recently fueled by its inclusion in the U.S. Strategic Crypto Reserve and rising institutional adoption projects building on XRPL are in the spotlight.

    JOIN $NMA PRESALE

    Nimanode is positioning itself at the intersection of artificial intelligence and decentralized technology. While much of the Web3 space remains focused on static smart contracts, Nimanode introduces something radically different: autonomous AI agents that users can build, deploy, and monetize — with zero coding required.

    What’s so Special about Nimanode?

    They boast of a suite of AI agents that can be deployed all from a no-code interface

    Web3 Customer Support Agents – Deployment AI agents 24/7 Web3-based customer support

    DeFi Autopilot Agent – AI Agents that not only trade but research, analyse and present optimal APY for its users

    Risk Assessment Agent – Designed to safeguard users by analyzing every dApp or token address a user interacts with.

    Why Whale’s are Scooping $NMA

    With a deliberately limited supply of just 200 million tokens, $NMA’s tokenomics are designed to reward early adopters and its ecosystem participants. Positioned at the core of Nimanode’s decentralized infrastructure, the token offers holders access to staking rewards, governance participation, and revenue-sharing opportunities.

    Holding the $NMA Token unlocks the full potential of the ecosystem, including:

    Agent Deployment – Reduced fees for launching agents when holding a minimum $NMA balance

    Agent Marketplace – Use $NMA to access premium agents or receive exclusive discounts

    Staking Benefits – Stake $NMA to earn passive income through the platform’s reward pool

    Governance Access – Participate in protocol decisions and vote on proposals that shape Nimanode’s future

    Buy $NMA Token

    How To Join The Nimanode Presale

    Here’s how you can participate:

    1. Buy XRP from reputable exchanges like Binance, Coinbase, or Bybit
    2. Send them to an XRP Compatible Wallet (Xaman recommended) to hold your purchased XRP.
    3. Go to Nimanode’s presale page, copy the deposit address, and send your XRP to it.
    4. Receive your tokens via airdrop 24 hours after the presale concludes.

    Act Now, Don’t Miss Out

    The market is heating up. BTC is hitting new highs. But the smartest investors aren’t just riding waves, they’re positioning for what powers the next one.

    AI isn’t coming — it’s already here, and Nimanode gives you the keys to deploy it.

    Get your $NMA while it’s still early.

    JOIN THE PRESALE | TWITTER | TELEGRAM | WHITEPAPER

    Contact:
    Nick Lambert
    contact@nimanode.com

    Disclaimer: This is a paid post and is provided by Nimanode. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice.Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed.Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/7f14cb92-88e8-4539-8a6e-2c5e55cf6723

    The MIL Network

  • MIL-OSI: XRP News: XenDex Presale Ends in 6 Days, Buy $XDX And Don’t Miss Out on XRP’s Fastest-Growing Decentralized Exchange With Lending & Borrowing Feature

    Source: GlobeNewswire (MIL-OSI)

    SYDNEY, May 22, 2025 (GLOBE NEWSWIRE) — As the crypto world continues to turn its attention toward the XRP Ledger, one project is rising fast, XenDex. With only 6 days remaining in its presale, time is running out for investors to buy $XDX tokens at pre-launch pricing before the token is listed on major exchanges like Binance, Gate.io, MEXC, BitMart, FirstLedger, and MagneticX.

    Read on to learn why XenDex is creating so much excitement across the XRP community.

    What is XenDex On XRP Blockchain?

    Purchase $XDX At A low Price & Earn Rewards

    XenDex is the first all-in-one decentralized exchange (DEX) built specifically for the XRP Ledger. It combines fast, secure trading with advanced features previously missing from XRPL, all within a user-friendly interface. It’s built to be scalable, efficient, and inclusive for both beginners and professional traders.

    Features and Problems XenDex Aims to Solve on XRP Ledger

    Until now, XRPL lacked key DeFi tools such as:

    • Lending & borrowing
    • AI copy trading
    • Cross-chain interoperability
    • DAO governance

    XenDex is solving these limitations with its feature-rich platform, designed to empower the XRP community with the full functionality expected in modern DeFi.

    Advantages of $XDX

    Holding $XDX, the native utility token of XenDex, comes with powerful benefits:

    • Governance and voting rights
    • Staking rewards and yield farming
    • Discounted fees on the platform
    • Early access opportunities, exclusive to XDX holders

    Where Can I Trade $XDX?

    After the presale, $XDX will be listed and traded on top exchanges including Binance, Gate.io, BitMart, MEXC, MagneticX, and FirstLedger. The project team assures a good increment in $XDX price upon listing.

    Buy $XDX Now Before Listing On Binance

    Is XenDex a Legit Project on XRP?

    Yes. XenDex is built transparently with a passionate, crypto-native team. The platform is undergoing smart contract audits to ensure security and reliability before its launch. It is an XRP based crypto project that aims to bring various features live on the Ripple ledger, and aims to become the best DEX on Ripple blockchain.

    How Do I Buy $XDX?

    Visit https://xendex.net/presale, connect your XRP-compatible wallet (e.g., Xaman), and contribute a minimum of 150 XRP. Current rate: 1.25 XRP = 10 XDX. For more information on how to buy $XDX, please visit https://tinyurl.com/k3e75va9

    XenDex Presale Details

    • Soft Cap: Filled
    • Hard Cap: Almost Filled
    • Presale Ends: In 6 days
    • Presale Rate: 150 XRP = 1200 $XDX

    Join XenDex Community

    Stay connected and informed:

    Website: xendex.net
    Presale: xendex.net/presale
    Telegram: t.me/xendexcommunity
    Twitter/X: x.com/xendex_xrp
    Docs: xdxdocs.gitbook.io

    Contact:
    Frank Richards
    Frank@xendex.net

    Disclaimer: This is a paid post provided by XenDex. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice.
    Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed. Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/d9a647a2-6389-46e2-9cf6-0df4a01213bb

    The MIL Network

  • MIL-OSI USA: Attorney General James Advances Legislation to Protect Small Businesses and Consumers

    Source: US State of New York

    EW YORK – New York Attorney General Letitia James today joined supporters to rally for the passage of the Fostering Affordability and Integrity through Reasonable Business Practices, or FAIR Business Practices Act, a program bill from the Office of the Attorney General (OAG) and sponsored in the state legislature by Senator Leroy Comrie and Assemblymember Micah Lasher. This legislation will strengthen New York’s consumer protection law, GBL §349, to protect New Yorkers from predatory lending, abusive debt collection, junk fees, artificial intelligence (AI)-based schemes, online phishing scams, hard-to-cancel subscriptions, data breaches, and other unfair, deceptive, and abusive practices. Forty-two other states and federal law already prohibit unfair practices, making New York’s current law both antiquated and inadequate.

    “As the federal government steps back from protecting consumers and small businesses, New York must step up to help working families and Main Street businesses,” said Attorney General James. “The FAIR Business Practices Act will protect small businesses from predatory lenders, homeowners from bad mortgage servicers, patients from abusive debt collection, and much more. This legislation will strengthen New York’s consumer protection laws to stop businesses from taking advantage of New Yorkers. I look forward to working with my partners in the state legislature to get this legislation passed.”

    The FAIR Business Practices Act would also help stop lenders, including auto lenders, mortgage servicers, and student loan servicers, from deceptively steering people into higher-cost loans. It would reduce unnecessary and hidden fees, stop unfair billing practices by health care companies, and prevent companies from taking advantage of New Yorkers with limited English proficiency. With the federal government rolling back protections for consumers and small businesses, the FAIR Business Practices Act authorizes OAG and victims to seek civil penalties and restitution against businesses that use unfair, deceptive, or abusive practices against vulnerable New Yorkers.

    “New Yorkers deserve to be treated fairly, and this legislation helps ensure that,” said Senator Leroy Comrie. “The FAIR Business Practices Act gives our state stronger tools to hold bad actors accountable and protect everyday people from deceptive and abusive practices. I’m proud to sponsor this bill alongside Attorney General James and Assemblymember Lasher as we work to strengthen consumer protections and support small businesses across our state.” 

    “New York has one of the weakest consumer protection laws in the country. Donald Trump and Elon Musk are taking a hatchet to federal consumer protections, leaving New Yorkers even more vulnerable to abuse. The time to act is now,” said Assemblymember Micah Lasher. “Making sure that the Attorney General has the tools she needs to look out for New Yorkers is one of the best ways we can stop the damage Trump is trying to do. We must pass this bill this session to protect consumers from the high costs of unfair business practices. It is an honor to stand together in this fight with Attorney General James and Senator Comrie. Let’s get this done.”

    “We applaud Attorney General James for developing the FAIR Business Practices Act and we thank Assemblymember Lasher for introducing this bill,” said Mario Cilento, President of the New York State AFL-CIO. “The NYS AFL-CIO strongly supports modernizing the state’s consumer protection laws, particularly because of rollbacks at the federal level, but also to address technological, legal, and other developments that have made our current laws less effective. This bill, which will improve the rights and protections of workers who have been victims of various fraudulent and unfair practices, including unreasonable terms and conditions for payday loans or payroll check-cashing schemes, is a crucial step towards a fairer and more just society.” 

    “The FAIR Business Practices Act will protect working families from abusive business practices that are making it hard for people to get a car, keep a roof over their heads, and put food on the table,” said Henry Garrido, Executive Director of American Federation of State, County and Municipal Employees, DC37. “Right now the federal government is stepping away from enforcing consumer protection laws that protect everyday people. I applaud Attorney General James, Senator Comrie, and Assemblymember Lasher for advancing this legislation to protect working families, small businesses, seniors, and much more. Let’s pass the FAIR Business Practices Act by the end of this session.”

    “AARP New York thanks Attorney General James, Senator Comrie, and Assemblymember Lasher for their leadership on this legislation,” said Kristen McManus, Senior Associate State Director for Advocacy for AARP New York. “Scammers are targeting older adults more than ever, with the FBI reporting that New Yorkers 60 and older lost more than $254 million to fraud in 2024, a more than $50 million increase from the previous year. Now is the time for the Governor and legislature to step up for all New Yorkers by establishing a consumer protection law that will foil scammers and discourage con artists from targeting some of the most vulnerable among us.” 

    “Where New York was once a leader in protecting small businesses from bad loans, our neighboring states have all since passed laws to stop unfair, abusive, and deceptive behavior,” said Lindsey Vigoda, New York Director of Small Business Majority. “We cannot continue to fall behind on these common-sense protections, which is why New York must pass the FAIR Business Practices Act. This legislation would shield Main Street from abusive fees that all too often place enormous strain on small businesses. With predatory lending products more prevalent today than ever, it’s time for New York to step up once again and defend our most precious asset — our small business community.” 

    “In response to the Trump administration’s gutting of federal consumer protection agencies and financial regulators, states must step up to stop big businesses from ripping off working families,” said Winston Berkman-Breen, Legal Director at the Student Borrower Protection Center. “This is especially true in New York, where abusive student loan servicers and private student loan companies take advantage of our weak consumer protections and prey on low-income households and vulnerable communities seeking to achieve financial stability through higher education. We applaud Attorney General James, Senator Comrie, and Assemblymember Lasher for meeting this moment by introducing the FAIR Business Practices Act. The bill will finally catch New York up with the rest of the country by providing commonsense and timely consumer protections for households and small businesses.”

    “The FAIR Business Practices Act strengthens New York’s core consumer protection law to ensure it is up to date and serves as an effective deterrent against wrongdoing,” said Chuck Bell, Advocacy Programs Director for Consumer Reports. “At a time when federal consumer protection initiatives are under attack, New York is stepping up to ensure consumers and small businesses will have the protections they need and deserve against financial ripoffs, fraud, and scams in the marketplace.” 

    “Every New Yorker should be able to work and invest in a prosperous future without fearing predatory lenders pulling the carpet out from under them,” said Diana Caba, Vice President for Community and Economic Development, Hispanic Federation. “It is deeply concerning how few protections consumers have in New York and how those protections are becoming even more limited because of the weakening of regulatory bodies at a national level. The FAIR Business Practices Act shows that New York is prioritizing the financial well-being of New Yorkers and catching state regulations up with the 42 other states who recognize why states must protect people’s financial future.” 

    “New York’s bedrock consumer protection law is intended to protect New Yorkers from new and evolving scams across all economic activity, but in practice it has fallen short, leaving gaps where scam victims have no recourse to get their money back, while making it profitable to continue abusing people,” said Ariana Lindermayer, Senior Staff Attorney of Mobilization for Justice. “The FAIR Business Practices Act would close these gaps and catch New York up with the 42 states that already ban unfair business practices. Honest businesses and everyday New Yorkers will welcome real protection from predatory businesses and competitors.” 

    “The FAIR Business Practices Act should be uncontroversial,” said Matthew Parham, Director of Litigation and Advocacy at the Western New York Law Center in Buffalo. “The unfair and abusive practices that it addresses are already illegal. It just does what most states have done for decades: lets individual consumers and state regulators enforce these rights, instead of relying on the federal government. This is vitally important now, when the federal government is completely abdicating its responsibility to protect consumers from scams and ripoffs.” 

    MIL OSI USA News

  • MIL-OSI Video: What Makes Darknet Marketplaces So Dangerous

    Source: Federal Bureau of Investigation (FBI) (video statements)

    An analyst in the FBI’s High-Tech Organized Crime Unit describes how the ease of using Darknet marketplaces is part of what makes them so dangerous. The unit manages the FBI’s Joint Criminal Opioid and Darknet Enforcement (JCODE) team, part of a global effort to disrupt fentanyl and opioid trafficking on the Darknet.

    —————————————————
    Subscribe to Inside the FBI wherever you get your podcasts:
    Spotify: https://open.spotify.com/show/4H2d3cg…
    Apple Podcasts: https://podcasts.apple.com/us/podcast…
    Google Podcasts: https://podcasts.google.com/feed/aHR0…
    More ways to follow us: https://inside-the-fbi.transistor.fm/…

    Follow us on social media:
    X: https://twitter.com/fbi
    Facebook: https://facebook.com/FBI
    Instagram: https://instagram.com/fbi
    YouTube: youtube.com/user/fbi

    https://www.youtube.com/watch?v=rpCpB4_YFow

    MIL OSI Video

  • MIL-OSI USA: ICE, Europol, law enforcement partners, dismantle major illicit drug networks in global Darknet crackdown

    Source: US Immigration and Customs Enforcement

    WASHINGTON — U.S. Immigration and Customs Enforcement, in collaboration with Europol, the Joint Criminal Opioid and Darknet Enforcement Team, and various national and international partners, announced the results of Operation RapTOR May 22. This historic takedown, led by Europol, resulted in the highest number of seizures in JCODE’s history.

    The seizures, to which ICE Homeland Security Investigations significantly contributed, include more than $200 million in currency and digital assets, over two metric tons of drugs, comprised of 144 kilograms of fentanyl or fentanyl-laced narcotics, and over 180 firearms. In addition, the United States and international law enforcement partners made 270 arrests of dark web vendors, buyers, and administrators in Austria, Brazil, France, Germany, Netherlands, South Korea, Spain, Switzerland, United Kingdom, and the United States.

    Led by Europol’s European Cyber Crime Centre Operation RapTOR united the FBI-led JCODE team — comprised of ICE HSI and law enforcement partners from the United States, Europe, South America, and Asia — to disrupt fentanyl and opioid trafficking, as well as sale of other illicit goods and services on the Darknet. Building on the successes of prior years’ operations, Operation RapTOR furthered global efforts to dismantle darknet marketplaces, resulting in the seizure of darknet infrastructure from Nemesis, Tor2Door, Bohemia, and Kingdom Markets. These actions provided investigators across the globe with invaluable leads and evidence, strengthening the ongoing fight against cybercrime and illicit activities on the darknet.

    “This record-breaking operation sends a clear message to every trafficker hiding behind a screen — your anonymity ends where our global reach begins,” said ICE acting Director Todd Lyons. “Thanks to the unwavering efforts by ICE HSI, Europol and our international partners, we’re cracking the code of the so-called ‘safe spaces’ for cybercriminals — they are in our sights and we’re not backing down.”

    The Head of Europol’s European Cybercrime Centre, Edvardas Šileris, commented: “Operation RapTor shows that the dark web is not beyond the reach of law enforcement. Through close cooperation and intelligence sharing, officers across three continents identified and arrested suspects, sending a clear message to those who think they can hide in the shadows. Europol will continue working with our partners to make the internet safer for everyone.”

    In furtherance of Operation RapTOR and in their first action as a JCODE member agency, the Office of Foreign Assets Control (OFAC) additionally sanctioned Behrouz Parsarad, an Iranian national, for his role as the founder and operator of Nemesis Market following seizure of the market.

    “This historic international seizure of firearms, deadly drugs, and illegal funds will save lives,” said Attorney General Pam Bondi. “Criminals cannot hide behind computer screens or seek refuge on the dark web — this Justice Department will identify and eliminate threats to the American people regardless of where they originate.”

    “By cowardly hiding online, these traffickers have wreaked havoc across our country and directly fueled the fentanyl crisis and gun violence impacting our American communities and neighborhoods. But the ease and accessibility of their crimes ends today,” said FBI Director Kash Patel. “The FBI could not do this work without our partners both at home and abroad, and the staggering success of this year’s record-breaking amount of fentanyl, guns, and drugs seized prove that our efforts are working. Anyone looking to anonymously harm our citizens through illicit darknet trafficking: your days of recklessness are numbered.”

    “These predators who peddled poison on the dark web might have thought they are untouchable — hiding behind screens, pushing fentanyl, fueling overdoses, and cashing in on misery. However, Operation RapTor just proved them wrong,” said DEA acting Administrator Robert Murphy. “DEA and our global partners reached across borders, across platforms, and across currencies to rip their networks apart. Let this stand as a warning: no mask, no marketplace, and no digital wallet can hide you from facing justice.”

    “This unprecedented operation is a testament to the power of global partnership and the unwavering dedication of our team,” said Chief Guy Ficco of IRS Criminal Investigation (IRS-CI). “Working through the JCODE initiative, IRS Criminal Investigation and our international partners led the largest and most impactful takedown to date — seizing over $200 million in assets, removing deadly drugs and weapons from circulation, and holding more than 270 individuals accountable. This critical strike against dark web networks fueling the fentanyl crisis marks a proud moment in our ongoing effort to protect communities worldwide.”

    “Operation RapTor shows what’s possible when the U.S. Postal Inspection Service and our partners around the world stand united. No matter where criminals hide, we will find them, dismantle their operations, and bring them to justice. This operation was about protecting innocent people from predatory criminals who profit from violence, addiction, and fear. Our commitment is unwavering,” said Chief Postal Inspector Gary Barksdale, United States Postal Inspection Service.

    “The FDA is committed to continuing its work to disrupt and dismantle the illegal sales of drugs on the dark web, where such sales far too often have tragic consequences,” said Chad Menster, Deputy Director of the Food and Drug Administration’s Office of Criminal Investigations (FDA OCI). “We will continue to monitor, investigate and bring to justice those who misuse the internet in a quest for profits with reckless disregard for the risk to public health and safety.”  

    The impact of Operation RapTOR builds on years-long legacy of dark web enforcement and the tireless work of HSI and our U.S. and international law enforcement partners, as seen in the following cases:

    • “Incognito Market” Owner Pleads Guilty For Operating One Of The Largest Illegal Narcotics Marketplaces On The Internet
      • Incognito Market sold more than $100 million of narcotics — including hundreds of kilograms of cocaine and methamphetamine as well as heroin, cocaine, LSD, MDMA, oxycodone, methamphetamine, ketamine, and alprazolam, and misbranded prescription medication. Incognito Market was available globally to anyone with internet access and was designed to foster seamless narcotics transactions across the world. It incorporated many features of legitimate e-commerce sites such as branding, advertising, and customer service. While concealing their identities users were able to search thousands of listings for narcotics of their choice. Prescription medication was also listed that was advertised as being authentic but was not, as seen in November 2023, when an undercover federal agent purchased and received several tablets that purported to be oxycodone, but were in fact, fentanyl pills.
    • Central District of California | Two Southern California Men Who Supplied Fentanyl Sold to Darknet Customers in All 50 States Sentenced to Federal Prison | United States Department of Justice
      • Ruiz of Orange County was sentenced to over 17 years in federal prison, and Omar Navia of South Los Angeles was separately sentenced to 15 years in federal prison in January 2025 for supplying fentanyl-laced pills to a drug trafficking ring that sold these drugs to more than 1,000 customers nationwide via the Darknet Navia and Ruiz admitted that at least August 2021 to December 2022, they supplied fentanyl-laced pills to Michael Ta, 26, of Westminster, and Rajiv Srinivasan, 38, of Houston, who used the Darknet and encrypted messaging applications to sell more than 120,000 fentanyl-laced pills, 20 pounds of methamphetamine, and other drugs directly to more than 1,000 customers in all 50 states, causing several fatal overdoses in the process.
    • In February 2024, the Eastern District of Virginia issued a criminal complaint charging Joshua Vasquez, Joseph Vasquez, and Rafael Roman with conspiracy to distribute 500 grams or more of methamphetamine.
      • Joshua Vasquez, Joseph Vasquez, and Rafael Roman conspired to sell counterfeit Adderall containing methamphetamine on darknet markets such as Bohemia and Tor2Door. The defendants allegedly sold drugs on darknet marketplaces in exchange for cryptocurrency. Collectively, these prolific darknet vendors were responsible fulfilling over 13 thousand drug orders shipped throughout the United States, ranging in size from user quantities, e.g., 5 pills, to “reseller” quantities, e.g., 10 thousand pills. While executing search warrants in New Jersey and New York, Federal Law Enforcement officers seized more than $330 thousand, close to 80 thousand counterfeit Adderall pills, one firearm, and two industrial pill press machines. FBI, FDA, and USPIS investigated this matter with significant contributions from HSI and our law enforcement partners.
    • Van Nuys Man Sentenced to More Than 20 Years in Prison for Trafficking Fentanyl and Cocaine via Darknet Marketplaces and Possessing Guns
      • A San Fernando Valley man was sentenced to 20 plus years in federal prison for using darknet marketplaces to sell hundreds of thousands of dollars’ worth of fentanyl-laced pills and cocaine to buyers nationwide. He admitted in court documents to causing one fatal fentanyl overdose. From at least April 2021 to May 2023, McDonald and others conspired to sell fentanyl and cocaine via multiple darknet marketplaces. Specifically, McDonald purchased bulk quantities of fentanyl and cocaine and then directed the activities of other coconspirators to carry out hundreds of drug sales involving the distribution of large quantities of both fentanyl and cocaine, including hundreds of thousands of fentanyl-laced pills. The FBI and the DEA investigated this matter as part of JCODE.

    “Cybercriminals think the Darknet makes them untouchable — we just proved they’re dead wrong,” said ICE HSI acting Executive Associate Director Robert Hammer. “HSI is on the front lines of a digital battlefield, deploying cutting-edge tech, relentless enforcement, and global coordination to hunt down these predators. Cybercrime is a global threat, and that’s why we’re committed to working hand-in-hand with our partners at Europol and across the world to dismantle these networks together. If you profit from pain online, we’re looking for you — and you’ll soon learn that no corner of the internet is beyond our reach.”

    Operation RapTOR includes law enforcement actions taken by JCODE member agencies, to include ICE HSI; the DEA; FBI; FDA-OCI; IRS-CI; and USPIS; in addition to foreign partners listed below. Credible reporting from the referenced agencies, in addition to contributions from ATF; Army CID; CBP; Department of Treasury’s FinCEN and Office of Foreign Assets Control; and NCIS enabled domestic law enforcement actions in support of Operation RapTOR. Local, state, and other federal agencies also contributed to investigations through task force participation and regional partnerships. The investigations leading to Operation RapTOR were significantly aided by support and coordination from the Justice Department Criminal Division’s Narcotic and Dangerous Drug Section and Computer Crime and Intellectual Property Section, with additional support from the Organized Crime Drug Enforcement Task Forces; multi-agency Special Operations Division; Money Laundering and Asset Recovery Section’s Digital Currency Initiative, and Fraud Section; the Justice Department’s Office of International Affairs; Europol and its Dark Web team; and international partners.

    The international partners include Europol; Eurojust; Austria’s Criminal Intelligence Service with various Provincial Criminal Police Departments (Bundeskriminalamt und Landeskriminalämter); Brazil’s Civil Police of the State of Pará (Polícia Civil do Estado do Pará) and Civil Police of the State of São Paulo (Polícia Civil do Estado do São Paulo); France’s French Customs (Douane), National Gendarmerie (Gendarmerie Nationale); Germany‘s Federal Criminal Police Office (Bundeskriminalamt), Prosecutor’s Office in Cologne – Central Cybercrime Contact Point (Staatsanwaltschaft Köln, Zentral- und Ansprechstelle Cybercrime), Central Criminal Investigation in Oldenburg (Zentrale Kriminalinspektion Oldenburg) various police departments (Dienststellen der Länderpolizeien), German Customs Investigation (Zollfahndungsämter); The Netherlands’s National Police (Politie), Post Interventie Team; Spain’s National Police (Policía Nacional); South Korea’s Seoul Central District Prosecutors’ Office – Darknet Investigations Unit; Switzerland’s Zurich Cantonal Police (Kantonspolizei Zürich) and Public Prosecutor’s Office II of the Canton of Zurich (Staatsanwaltschaft II); and the United Kingdom’s National Crime Agency, National Police Chiefs’ Council.

    HSI is a worldwide law enforcement leader in Darknet and other cyber-related criminal investigations. The DHS Cyber Crimes Center (C3) combats cybercrime, online child sexual exploitation, and criminal exploitation of the internet with state-of-the-art forensic technology. The Center investigates large-scale cybercrime threats and provides expertise on cybercrime investigations to the field. It also uses global law enforcement networks, like Europol, to combat cybercrime threats.

    C3 delivers computer and cyber-based technical services in support of HSI cases — including investigations into underground online marketplaces selling illegal drugs, weapons and other contraband; enabling the trade of images of child exploitation materials; and facilitating the theft of intellectual property, trade secrets, and export-controlled technology and data.

    Individuals across the world can report suspicious criminal activity to the ICE Tip Line 24 hours a day, seven days a week at 866-DHS-2-ICE. Highly trained specialists take reports from both the public and law enforcement agencies on more than 400 laws enforced by ICE.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI USA: Law Enforcement Seize Record Amounts of Illegal Drugs, Firearms, and Drug Trafficking Proceeds in International Operation Against Darknet Trafficking of Fentanyl and Opioids; 270 Arrested Across Four Continents

    Source: US State Government of Utah

    WASHINGTON — Today, the Attorney General and the Department of Justice’s Joint Criminal Opioid and Darknet Enforcement (JCODE) team, and international law enforcement partners announced the results of Operation RapTor, including the arrests of 270 dark web vendors, buyers, and administrators in Austria, Brazil, France, Germany, the Netherlands, South Korea, Spain, Switzerland, the United Kingdom, and the United States. Operation RapTor resulted in the highest number of seizures of any JCODE operation, including more than $200 million in currency and digital assets, over two metric tons of drugs, 144 kilograms of fentanyl or fentanyl-laced narcotics, and over 180 firearms.

    Operation RapTor was a global, coordinated effort by law enforcement in the United States, Europe, South America, and Asia to disrupt fentanyl and opioid trafficking, as well as the sales of other illicit goods and services, on the darknet, or dark web. Operation RapTor builds on the successes of prior years’ operations and takedowns of marketplaces, which resulted in the seizure of darknet infrastructure from Nemesis, Tor2Door, Bohemia, and Kingdom Markets, providing investigators across the world with investigative leads and evidence. JCODE and Europol’s European Cybercrime Centre (EC3) continue to compile intelligence packages to identify entities of interest. These leads allow U.S. and international law enforcement agencies to identify darknet drug vendors and buyers, resulting in a series of coordinated, but separate, law enforcement investigations, reflected in the statistics announced today. In furtherance of Operation RapTor and in its first action as a JCODE member agency, the Office of Foreign Assets Control (OFAC) additionally sanctioned Iranian national Behrouz Parsarad for his role as the founder and operator of Nemesis Market following seizure of the market. Parsarad was also indicted by a federal grand jury on drug trafficking charges related to the illegal business he ran on the dark web.

    “This historic international seizure of firearms, deadly drugs, and illegal funds will save lives,” said Attorney General Pam Bondi. “Criminals cannot hide behind computer screens or seek refuge on the dark web – this Justice Department will identify and eliminate threats to the American people regardless of where they originate.”

    “By cowardly hiding online, these traffickers have wreaked havoc across our country and directly fueled the fentanyl crisis and gun violence impacting our American communities and neighborhoods. But the ease and accessibility of their crimes ends today,” said FBI Director Kash Patel. “The FBI could not do this work without our partners both at home and abroad, and the staggering success of this year’s record-breaking amount of fentanyl, guns, and drugs seized prove that our efforts are working. Anyone looking to anonymously harm our citizens through illicit darknet trafficking: your days of recklessness are numbered.”

    “These predators who peddled poison on the dark web might have thought they are untouchable — hiding behind screens, pushing fentanyl, fueling overdoses, and cashing in on misery. However, Operation RapTor just proved them wrong,” said DEA Acting Administrator Robert Murphy. “DEA and our global partners reached across borders, across platforms, and across currencies to rip their networks apart. Let this stand as a warning: no mask, no marketplace, and no digital wallet can hide you from facing justice.”

    “Operation RapTor shows that the dark web is not beyond the reach of law enforcement,” said Head of Europol’s European Cybercrime Centre, Edvardas Šileris. “Through close cooperation and intelligence sharing, officers across three continents identified and arrested suspects, sending a clear message to those who think they can hide in the shadows. Europol will continue working with our partners to make the internet safer for everyone.”

    “This unprecedented operation is a testament to the power of global partnership and the unwavering dedication of our team,” said Chief Guy Ficco of IRS Criminal Investigation (IRS-CI). “Working through the JCODE initiative, IRS Criminal Investigation and our international partners led the largest and most impactful takedown to date—seizing over $200 million in assets, removing deadly drugs and weapons from circulation, and holding more than 270 individuals accountable. This critical strike against dark web networks fueling the fentanyl crisis marks a proud moment in our ongoing effort to protect communities worldwide.”

    “This record-breaking operation sends a clear message to every trafficker hiding behind a screen—your anonymity ends where our global reach begins,” said Acting Director Todd Lyons of U.S. Immigration and Customs Enforcement (ICE). “Thanks to the unwavering efforts by ICE’s Homeland Security Investigations (HSI), Europol and our international partners, we’re cracking the code of the so-called ‘safe spaces’ for cybercriminals—they are in our sights and we’re not backing down.”

    “Operation RapTor shows what’s possible when the U.S. Postal Inspection Service and our partners around the world stand united,” said Chief Postal Inspector Gary Barksdale of the United States Postal Inspection Service. “No matter where criminals hide, we will find them, dismantle their operations, and bring them to justice. This operation was about protecting innocent people from predatory criminals who profit from violence, addiction, and fear. Our commitment is unwavering.”

    “The FDA is committed to continuing its work to disrupt and dismantle the illegal sales of drugs on the dark web, where such sales far too often have tragic consequences,” said Deputy Director Chad Menster of the Food and Drug Administration’s Office of Criminal Investigations (FDA OCI). “We will continue to monitor, investigate and bring to justice those who misuse the internet in a quest for profits with reckless disregard for the risk to public health and safety.”  

    The impact of Operation RapTor can be attributed to the tireless work of U.S. and international law enforcement partners. For example:

    On Dec. 16, 2024, Rui-Siang Lin pleaded guilty to charges brought by the U.S. Attorney’s Office for the Southern District of New York of narcotics conspiracy, money laundering, and conspiracy to sell adulterated and misbranded medication for owning and operating Incognito Market, one of the largest narcotics marketplaces on the internet.

    According to court documents and statements made in court, Incognito Market was an online narcotics bazaar that started on the dark web in October 2020. Until it shut down in March 2024, Incognito Market sold more than $100 million of narcotics—including hundreds of kilograms of cocaine and methamphetamine. Incognito Market was available globally to anyone with internet access using the Tor web browser on the “dark web” or “darknet.” Incognito Market was designed to facilitate seamless narcotics transactions, incorporating many features of legitimate e-commerce sites such as branding, advertising, and customer service. Upon visiting the site, users were met by a splash page and graphic interface, which is pictured below:

    Figure 1: Incognito Market homepage

    While concealing their identities with a unique username or “moniker,” users were able to search thousands of listings for narcotics of their choice. Incognito Market sold illegal narcotics including heroin, cocaine, LSD, MDMA, oxycodone, methamphetamine, ketamine, and alprazolam, as well as misbranded prescription medication. An example of listings on Incognito market is below:

    Figure 2: Listings for various drugs on the Incognito Market.

    Listings included offerings of prescription medication that was falsely advertised as being authentic. For example, in November 2023, while operating in an undercover capacity on Incognito Market, a law enforcement agent purchased and received several tablets purported to be oxycodone. Testing revealed that these tablets were not oxycodone and were, in fact, fentanyl pills.

    The FBI, HSI, DEA, FDA OCI, and the New York Police Department investigated the case.

    In a second example, in January 2025, the U.S. Attorney’s Office for the Central District of California secured a 17-year sentence for Adan Ruiz, of Orange County, and a 15-year sentence for Omar Navia, of Los Angeles, for supplying fentanyl-laced pills to a drug trafficking ring that sold these drugs to more than 1,000 customers nationwide via the darknet. In imposing the sentences, U.S. District Judge David O. Carter called this case “the most sophisticated fentanyl distribution ring that this court has seen.”

    Navia and Ruiz admitted in their plea agreements that, from at least August 2021 to December 2022, they supplied fentanyl-laced pills to Michael Ta, 26, of Westminster, and Rajiv Srinivasan, 38, of Houston, who used the darknet and encrypted messaging applications to sell more than 120,000 fentanyl-laced pills, 20 pounds of methamphetamine, and other drugs directly to more than 1,000 customers in all 50 states, causing several fatal overdoses.

    According to court documents and statements made in court, Srinivasan and Ta used the “redlightlabs” darknet account to advertise and sell counterfeit M30 oxycodone pills containing fentanyl and other illicit drugs. Srinivasan also used the encrypted messaging application Wickr to communicate with and sell drugs to customers. Srinivasan received virtual currency as payment for the drugs and then routed that virtual currency through cryptocurrency exchanges.

    The court record also shows that Ta communicated with Srinivasan about drug orders, obtained fentanyl-laced pills and methamphetamine from sources of supply, stored those drugs in his residence, and mailed out packages with drugs to customers who had ordered them from Srinivasan on the “redlightlabs” account.

    Ta and Srinivasan admitted in their plea agreements to causing the fentanyl overdose deaths of three victims. Both defendants further admitted to distributing fentanyl-laced pills to two additional victims, both of whom suffered fatal drug overdoses shortly after they received the pills from Ta and Srinivasan. Prosecutors wrote in a sentencing memorandum, “The five victims of defendants’ crimes ranged in age from 19 to 51. They lived across the country, from California to Florida, Colorado to Arkansas. Each of the five victims leaves behind a family that has been forever and fundamentally changed by defendants’ actions. [Ta and Srinivasan] also victimized countless others as part of an epidemic of addiction and despair plaguing our district and our country.”

    The FBI investigated this case, with substantial assistance from the U.S. Postal Inspection Service (USPIS), the DEA’s Fayetteville Resident Office, and the Northern Colorado Drug Task Force.

    In a third example, in February 2024, the U.S. Attorney’s Office for the Eastern District of Virginia charged Joshua Vasquez, Joseph Vasquez, and Rafael Roman by criminal complaint with conspiracy to distribute 500 grams or more of methamphetamine. Joshua Vasquez, Joseph Vasquez, and Roman conspired to sell counterfeit Adderall containing methamphetamine on darknet markets such as Bohemia and Tor2Door. The defendants allegedly sold drugs on darknet marketplaces in exchange for cryptocurrency under the monikers “NuveoDelux,” “Mrjohnson,” and “AllStateRx.”

    According to court documents and statements made in court, these three prolific darknet vendors were collectively responsible for fulfilling over 13,000 drug orders shipped throughout the United States, ranging in size from user quantities, e.g., 5 pills, to “reseller” quantities, e.g., 10,000 pills. Joshua and Joseph Vasquez collectively ran the NuveoDeluxe and AllStateRx accounts. A fourth co-conspirator, Gregory Castillo-Rosario, who was arrested in October 2024, ran the Mrjohnson account. Roman assisted his co-conspirators by pressing counterfeit Adderall pills, packaging them, and distributing drug orders into the mail using the U.S. Postal Service. The conspiracy also laundered funds associated with darknet drug proceeds.

    While executing search warrants in New Jersey and New York, federal law enforcement officers seized more than $330,000, close to 80,000 counterfeit Adderall pills, one firearm, and two industrial pill press machines. Additionally, two vehicles and several pieces of property were seized during the search warrants. An additional 30 kilograms of suspected counterfeit Adderall pills were seized on May 2, 2024, in New York. Photographs of some of the seized items are below: 

    Figure 3: Counterfeit Adderall pills laced with methamphetamine stored in 5-gallon buckets

    Figure 4: Bags ready to be shipped to customers nationwide.

    Figure 5: Illegal pill press machines used by drug traffickers to make counterfeit pharmaceutical pills.

    Figure 6: Trash bags full of counterfeit Adderall pills laced with methamphetamine.

    Joshua Vasquez pleaded guilty on April 24, 2024, and was sentenced on July 25, 2024, to 12 years in prison. Joseph Vasquez pleaded guilty on April 15, 2024, and was sentenced on Aug. 8, 2024, to 10 years in prison. Roman pleaded guilty on May 30, 2024, and was sentenced on Nov. 14, 2024, to 10 years in prison. They all pleaded guilty to conspiracy to create a counterfeit substance and distribute 500 grams or more of a mixture and substance containing methamphetamine.

    The FBI, FDA, and USPIS investigated this matter with significant contributions from DEA, HSI, the Ocean County Sheriff’s Office, the Howell Township Police Department, the Lakewood Township Police Department, the Orlando Police Department, the Orange County Sheriff’s Office, the Arlington County Police Department, and the New York Police Department.

    In a fourth example, a San Fernando Valley man, Brian McDonald, 23, was sentenced to more than 20 years in federal prison in the Central District of California for using darknet marketplaces to sell hundreds of thousands of dollars’ worth of fentanyl-laced pills and cocaine to buyers nationwide. He admitted in court documents to causing one fatal fentanyl overdose.

    From at least April 2021 until May 2023, McDonald and others conspired to sell fentanyl and cocaine via multiple darknet marketplaces. McDonald operated under the monikers “Malachai Johnson,” “SouthSideOxy,” and “JefeDeMichoacan.” McDonald created, monitored, and maintained the darknet vendor profiles, including by updating drug listings and shipment options, tracking drug orders, and offloading Monero cryptocurrency received as drug deal payments into cryptocurrency wallets that McDonald controlled.

    McDonald recruited and hired accomplices to help package and ship the narcotics they sold on the darknet. McDonald directed and helped these accomplices package and ship the narcotics. McDonald purchased bulk quantities of fentanyl and cocaine and then directed others to complete hundreds of drug sales involving large quantities of both fentanyl and cocaine.

    The FBI and DEA investigated this matter.

    Operation RapTor involves law enforcement actions taken by JCODE member agencies, including the DEA, FBI, FDA OCI, HSI, IRS-CI, and USPIS. Credible reporting from the referenced agencies, in addition to contributions from ATF, Army Criminal Investigation Division, Customs and Border Protection, the Treasury Department’s Financial Crimes Enforcement Network (FinCEN) and OFAC, and Naval Criminal Investigative Service, enabled domestic law enforcement actions in support of Operation RapTor. State, local, and other federal agencies also contributed to Operation RapTor investigations through task force participation and regional partnerships, as well as the multi-agency Special Operations Division.

    The investigations leading to Operation RapTor were significantly aided by support and coordination from the Criminal Division’s Narcotic and Dangerous Drug Section and Computer Crime and Intellectual Property Section, with valuable assistance from the Criminal Division’s Money Laundering and Asset Recovery Section, Fraud Section, and Office of International Affairs.

    Key international partners include Europol; Eurojust; Austria’s Criminal Intelligence Service with various Provincial Criminal Police Departments (Bundeskriminalamt und Landeskriminalämter); Brazil’s Civil Police of the State of Pará (Polícia Civil do Estado do Pará) and Civil Police of the State of São Paulo (Polícia Civil do Estado do São Paulo); France’s French Customs (Douane), National Gendarmerie (Gendarmerie Nationale); Germany’s Federal Criminal Police Office (Bundeskriminalamt), Prosecutor’s Office in Cologne – Central Cybercrime Contact Point (Staatsanwaltschaft Köln, Zentral- und Ansprechstelle Cybercrime), Central Criminal Investigation in Oldenburg (Zentrale Kriminalinspektion Oldenburg) various police departments (Dienststellen der Länderpolizeien), and German Customs Investigation (Zollfahndungsämter); the Netherlands’ Team High Tech Crime (National Investigations and Special Operations (NIS) and Post Interventie Team (PIT), National Intelligence, Expertise and Operational Support (NIEO);  Spain’s National Police (Policía Nacional); South Korea’s Seoul Central District Prosecutors’ Office – Darknet Investigations Unit; Switzerland’s Zurich Cantonal Police (Kantonspolizei Zürich) and Public Prosecutor’s Office II of the Canton of Zurich (Staatsanwaltschaft II); and the United Kingdom’s National Crime Agency (NCA), National Police Chiefs’ Council (NPCC).

    Federal investigations spanned the United States, and 26 United States Attorneys’ Offices are prosecuting cases, including the Central District of California, the Northern District of California, the Southern District of California, the District of Colorado, the District of Connecticut, the District of Columbia, the Middle District of Florida, the Southern District of Florida, the Middle District of Georgia, the District of Hawaii, the Northern District of Illinois, the Southern District of Indiana, the Eastern District of Kentucky, the District of Massachusetts, the Eastern District of Michigan, the Western District of Michigan, the Eastern District of Missouri, the District of New Jersey, the Southern District of New York, the District of North Dakota, the Northern District of Ohio, the Southern District of Ohio, the Northern District of Oklahoma, the Eastern District of Pennsylvania, the Eastern District of Virginia, and the Western District of Washington.

    The Justice Department established the FBI-led JCODE team to lead and coordinate government efforts to detect, disrupt, and dismantle major criminal enterprises reliant on the darknet for trafficking opioids and other illicit narcotics, along with identifying and dismantling their supply chains.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: Law Enforcement Seize Record Amounts of Illegal Drugs, Firearms, and Drug Trafficking Proceeds in International Operation Against Darknet Trafficking of Fentanyl and Opioids; 270 Arrested Across Four Continents

    Source: United States Attorneys General 13

    WASHINGTON — Today, the Attorney General and the Department of Justice’s Joint Criminal Opioid and Darknet Enforcement (JCODE) team, and international law enforcement partners announced the results of Operation RapTor, including the arrests of 270 dark web vendors, buyers, and administrators in Austria, Brazil, France, Germany, the Netherlands, South Korea, Spain, Switzerland, the United Kingdom, and the United States. Operation RapTor resulted in the highest number of seizures of any JCODE operation, including more than $200 million in currency and digital assets, over two metric tons of drugs, 144 kilograms of fentanyl or fentanyl-laced narcotics, and over 180 firearms.

    Operation RapTor was a global, coordinated effort by law enforcement in the United States, Europe, South America, and Asia to disrupt fentanyl and opioid trafficking, as well as the sales of other illicit goods and services, on the darknet, or dark web. Operation RapTor builds on the successes of prior years’ operations and takedowns of marketplaces, which resulted in the seizure of darknet infrastructure from Nemesis, Tor2Door, Bohemia, and Kingdom Markets, providing investigators across the world with investigative leads and evidence. JCODE and Europol’s European Cybercrime Centre (EC3) continue to compile intelligence packages to identify entities of interest. These leads allow U.S. and international law enforcement agencies to identify darknet drug vendors and buyers, resulting in a series of coordinated, but separate, law enforcement investigations, reflected in the statistics announced today. In furtherance of Operation RapTor and in its first action as a JCODE member agency, the Office of Foreign Assets Control (OFAC) additionally sanctioned Iranian national Behrouz Parsarad for his role as the founder and operator of Nemesis Market following seizure of the market. Parsarad was also indicted by a federal grand jury on drug trafficking charges related to the illegal business he ran on the dark web.

    “This historic international seizure of firearms, deadly drugs, and illegal funds will save lives,” said Attorney General Pam Bondi. “Criminals cannot hide behind computer screens or seek refuge on the dark web – this Justice Department will identify and eliminate threats to the American people regardless of where they originate.”

    “By cowardly hiding online, these traffickers have wreaked havoc across our country and directly fueled the fentanyl crisis and gun violence impacting our American communities and neighborhoods. But the ease and accessibility of their crimes ends today,” said FBI Director Kash Patel. “The FBI could not do this work without our partners both at home and abroad, and the staggering success of this year’s record-breaking amount of fentanyl, guns, and drugs seized prove that our efforts are working. Anyone looking to anonymously harm our citizens through illicit darknet trafficking: your days of recklessness are numbered.”

    “These predators who peddled poison on the dark web might have thought they are untouchable — hiding behind screens, pushing fentanyl, fueling overdoses, and cashing in on misery. However, Operation RapTor just proved them wrong,” said DEA Acting Administrator Robert Murphy. “DEA and our global partners reached across borders, across platforms, and across currencies to rip their networks apart. Let this stand as a warning: no mask, no marketplace, and no digital wallet can hide you from facing justice.”

    “Operation RapTor shows that the dark web is not beyond the reach of law enforcement,” said Head of Europol’s European Cybercrime Centre, Edvardas Šileris. “Through close cooperation and intelligence sharing, officers across three continents identified and arrested suspects, sending a clear message to those who think they can hide in the shadows. Europol will continue working with our partners to make the internet safer for everyone.”

    “This unprecedented operation is a testament to the power of global partnership and the unwavering dedication of our team,” said Chief Guy Ficco of IRS Criminal Investigation (IRS-CI). “Working through the JCODE initiative, IRS Criminal Investigation and our international partners led the largest and most impactful takedown to date—seizing over $200 million in assets, removing deadly drugs and weapons from circulation, and holding more than 270 individuals accountable. This critical strike against dark web networks fueling the fentanyl crisis marks a proud moment in our ongoing effort to protect communities worldwide.”

    “This record-breaking operation sends a clear message to every trafficker hiding behind a screen—your anonymity ends where our global reach begins,” said Acting Director Todd Lyons of U.S. Immigration and Customs Enforcement (ICE). “Thanks to the unwavering efforts by ICE’s Homeland Security Investigations (HSI), Europol and our international partners, we’re cracking the code of the so-called ‘safe spaces’ for cybercriminals—they are in our sights and we’re not backing down.”

    “Operation RapTor shows what’s possible when the U.S. Postal Inspection Service and our partners around the world stand united,” said Chief Postal Inspector Gary Barksdale of the United States Postal Inspection Service. “No matter where criminals hide, we will find them, dismantle their operations, and bring them to justice. This operation was about protecting innocent people from predatory criminals who profit from violence, addiction, and fear. Our commitment is unwavering.”

    “The FDA is committed to continuing its work to disrupt and dismantle the illegal sales of drugs on the dark web, where such sales far too often have tragic consequences,” said Deputy Director Chad Menster of the Food and Drug Administration’s Office of Criminal Investigations (FDA OCI). “We will continue to monitor, investigate and bring to justice those who misuse the internet in a quest for profits with reckless disregard for the risk to public health and safety.”  

    The impact of Operation RapTor can be attributed to the tireless work of U.S. and international law enforcement partners. For example:

    On Dec. 16, 2024, Rui-Siang Lin pleaded guilty to charges brought by the U.S. Attorney’s Office for the Southern District of New York of narcotics conspiracy, money laundering, and conspiracy to sell adulterated and misbranded medication for owning and operating Incognito Market, one of the largest narcotics marketplaces on the internet.

    According to court documents and statements made in court, Incognito Market was an online narcotics bazaar that started on the dark web in October 2020. Until it shut down in March 2024, Incognito Market sold more than $100 million of narcotics—including hundreds of kilograms of cocaine and methamphetamine. Incognito Market was available globally to anyone with internet access using the Tor web browser on the “dark web” or “darknet.” Incognito Market was designed to facilitate seamless narcotics transactions, incorporating many features of legitimate e-commerce sites such as branding, advertising, and customer service. Upon visiting the site, users were met by a splash page and graphic interface, which is pictured below:

    Figure 1: Incognito Market homepage

    While concealing their identities with a unique username or “moniker,” users were able to search thousands of listings for narcotics of their choice. Incognito Market sold illegal narcotics including heroin, cocaine, LSD, MDMA, oxycodone, methamphetamine, ketamine, and alprazolam, as well as misbranded prescription medication. An example of listings on Incognito market is below:

    Figure 2: Listings for various drugs on the Incognito Market.

    Listings included offerings of prescription medication that was falsely advertised as being authentic. For example, in November 2023, while operating in an undercover capacity on Incognito Market, a law enforcement agent purchased and received several tablets purported to be oxycodone. Testing revealed that these tablets were not oxycodone and were, in fact, fentanyl pills.

    The FBI, HSI, DEA, FDA OCI, and the New York Police Department investigated the case.

    In a second example, in January 2025, the U.S. Attorney’s Office for the Central District of California secured a 17-year sentence for Adan Ruiz, of Orange County, and a 15-year sentence for Omar Navia, of Los Angeles, for supplying fentanyl-laced pills to a drug trafficking ring that sold these drugs to more than 1,000 customers nationwide via the darknet. In imposing the sentences, U.S. District Judge David O. Carter called this case “the most sophisticated fentanyl distribution ring that this court has seen.”

    Navia and Ruiz admitted in their plea agreements that, from at least August 2021 to December 2022, they supplied fentanyl-laced pills to Michael Ta, 26, of Westminster, and Rajiv Srinivasan, 38, of Houston, who used the darknet and encrypted messaging applications to sell more than 120,000 fentanyl-laced pills, 20 pounds of methamphetamine, and other drugs directly to more than 1,000 customers in all 50 states, causing several fatal overdoses.

    According to court documents and statements made in court, Srinivasan and Ta used the “redlightlabs” darknet account to advertise and sell counterfeit M30 oxycodone pills containing fentanyl and other illicit drugs. Srinivasan also used the encrypted messaging application Wickr to communicate with and sell drugs to customers. Srinivasan received virtual currency as payment for the drugs and then routed that virtual currency through cryptocurrency exchanges.

    The court record also shows that Ta communicated with Srinivasan about drug orders, obtained fentanyl-laced pills and methamphetamine from sources of supply, stored those drugs in his residence, and mailed out packages with drugs to customers who had ordered them from Srinivasan on the “redlightlabs” account.

    Ta and Srinivasan admitted in their plea agreements to causing the fentanyl overdose deaths of three victims. Both defendants further admitted to distributing fentanyl-laced pills to two additional victims, both of whom suffered fatal drug overdoses shortly after they received the pills from Ta and Srinivasan. Prosecutors wrote in a sentencing memorandum, “The five victims of defendants’ crimes ranged in age from 19 to 51. They lived across the country, from California to Florida, Colorado to Arkansas. Each of the five victims leaves behind a family that has been forever and fundamentally changed by defendants’ actions. [Ta and Srinivasan] also victimized countless others as part of an epidemic of addiction and despair plaguing our district and our country.”

    The FBI investigated this case, with substantial assistance from the U.S. Postal Inspection Service (USPIS), the DEA’s Fayetteville Resident Office, and the Northern Colorado Drug Task Force.

    In a third example, in February 2024, the U.S. Attorney’s Office for the Eastern District of Virginia charged Joshua Vasquez, Joseph Vasquez, and Rafael Roman by criminal complaint with conspiracy to distribute 500 grams or more of methamphetamine. Joshua Vasquez, Joseph Vasquez, and Roman conspired to sell counterfeit Adderall containing methamphetamine on darknet markets such as Bohemia and Tor2Door. The defendants allegedly sold drugs on darknet marketplaces in exchange for cryptocurrency under the monikers “NuveoDelux,” “Mrjohnson,” and “AllStateRx.”

    According to court documents and statements made in court, these three prolific darknet vendors were collectively responsible for fulfilling over 13,000 drug orders shipped throughout the United States, ranging in size from user quantities, e.g., 5 pills, to “reseller” quantities, e.g., 10,000 pills. Joshua and Joseph Vasquez collectively ran the NuveoDeluxe and AllStateRx accounts. A fourth co-conspirator, Gregory Castillo-Rosario, who was arrested in October 2024, ran the Mrjohnson account. Roman assisted his co-conspirators by pressing counterfeit Adderall pills, packaging them, and distributing drug orders into the mail using the U.S. Postal Service. The conspiracy also laundered funds associated with darknet drug proceeds.

    While executing search warrants in New Jersey and New York, federal law enforcement officers seized more than $330,000, close to 80,000 counterfeit Adderall pills, one firearm, and two industrial pill press machines. Additionally, two vehicles and several pieces of property were seized during the search warrants. An additional 30 kilograms of suspected counterfeit Adderall pills were seized on May 2, 2024, in New York. Photographs of some of the seized items are below: 

    Figure 3: Counterfeit Adderall pills laced with methamphetamine stored in 5-gallon buckets

    Figure 4: Bags ready to be shipped to customers nationwide.

    Figure 5: Illegal pill press machines used by drug traffickers to make counterfeit pharmaceutical pills.

    Figure 6: Trash bags full of counterfeit Adderall pills laced with methamphetamine.

    Joshua Vasquez pleaded guilty on April 24, 2024, and was sentenced on July 25, 2024, to 12 years in prison. Joseph Vasquez pleaded guilty on April 15, 2024, and was sentenced on Aug. 8, 2024, to 10 years in prison. Roman pleaded guilty on May 30, 2024, and was sentenced on Nov. 14, 2024, to 10 years in prison. They all pleaded guilty to conspiracy to create a counterfeit substance and distribute 500 grams or more of a mixture and substance containing methamphetamine.

    The FBI, FDA, and USPIS investigated this matter with significant contributions from DEA, HSI, the Ocean County Sheriff’s Office, the Howell Township Police Department, the Lakewood Township Police Department, the Orlando Police Department, the Orange County Sheriff’s Office, the Arlington County Police Department, and the New York Police Department.

    In a fourth example, a San Fernando Valley man, Brian McDonald, 23, was sentenced to more than 20 years in federal prison in the Central District of California for using darknet marketplaces to sell hundreds of thousands of dollars’ worth of fentanyl-laced pills and cocaine to buyers nationwide. He admitted in court documents to causing one fatal fentanyl overdose.

    From at least April 2021 until May 2023, McDonald and others conspired to sell fentanyl and cocaine via multiple darknet marketplaces. McDonald operated under the monikers “Malachai Johnson,” “SouthSideOxy,” and “JefeDeMichoacan.” McDonald created, monitored, and maintained the darknet vendor profiles, including by updating drug listings and shipment options, tracking drug orders, and offloading Monero cryptocurrency received as drug deal payments into cryptocurrency wallets that McDonald controlled.

    McDonald recruited and hired accomplices to help package and ship the narcotics they sold on the darknet. McDonald directed and helped these accomplices package and ship the narcotics. McDonald purchased bulk quantities of fentanyl and cocaine and then directed others to complete hundreds of drug sales involving large quantities of both fentanyl and cocaine.

    The FBI and DEA investigated this matter.

    Operation RapTor involves law enforcement actions taken by JCODE member agencies, including the DEA, FBI, FDA OCI, HSI, IRS-CI, and USPIS. Credible reporting from the referenced agencies, in addition to contributions from ATF, Army Criminal Investigation Division, Customs and Border Protection, the Treasury Department’s Financial Crimes Enforcement Network (FinCEN) and OFAC, and Naval Criminal Investigative Service, enabled domestic law enforcement actions in support of Operation RapTor. State, local, and other federal agencies also contributed to Operation RapTor investigations through task force participation and regional partnerships, as well as the multi-agency Special Operations Division.

    The investigations leading to Operation RapTor were significantly aided by support and coordination from the Criminal Division’s Narcotic and Dangerous Drug Section and Computer Crime and Intellectual Property Section, with valuable assistance from the Criminal Division’s Money Laundering and Asset Recovery Section, Fraud Section, and Office of International Affairs.

    Key international partners include Europol; Eurojust; Austria’s Criminal Intelligence Service with various Provincial Criminal Police Departments (Bundeskriminalamt und Landeskriminalämter); Brazil’s Civil Police of the State of Pará (Polícia Civil do Estado do Pará) and Civil Police of the State of São Paulo (Polícia Civil do Estado do São Paulo); France’s French Customs (Douane), National Gendarmerie (Gendarmerie Nationale); Germany’s Federal Criminal Police Office (Bundeskriminalamt), Prosecutor’s Office in Cologne – Central Cybercrime Contact Point (Staatsanwaltschaft Köln, Zentral- und Ansprechstelle Cybercrime), Central Criminal Investigation in Oldenburg (Zentrale Kriminalinspektion Oldenburg) various police departments (Dienststellen der Länderpolizeien), and German Customs Investigation (Zollfahndungsämter); the Netherlands’ Team High Tech Crime (National Investigations and Special Operations (NIS) and Post Interventie Team (PIT), National Intelligence, Expertise and Operational Support (NIEO);  Spain’s National Police (Policía Nacional); South Korea’s Seoul Central District Prosecutors’ Office – Darknet Investigations Unit; Switzerland’s Zurich Cantonal Police (Kantonspolizei Zürich) and Public Prosecutor’s Office II of the Canton of Zurich (Staatsanwaltschaft II); and the United Kingdom’s National Crime Agency (NCA), National Police Chiefs’ Council (NPCC).

    Federal investigations spanned the United States, and 26 United States Attorneys’ Offices are prosecuting cases, including the Central District of California, the Northern District of California, the Southern District of California, the District of Colorado, the District of Connecticut, the District of Columbia, the Middle District of Florida, the Southern District of Florida, the Middle District of Georgia, the District of Hawaii, the Northern District of Illinois, the Southern District of Indiana, the Eastern District of Kentucky, the District of Massachusetts, the Eastern District of Michigan, the Western District of Michigan, the Eastern District of Missouri, the District of New Jersey, the Southern District of New York, the District of North Dakota, the Northern District of Ohio, the Southern District of Ohio, the Northern District of Oklahoma, the Eastern District of Pennsylvania, the Eastern District of Virginia, and the Western District of Washington.

    The Justice Department established the FBI-led JCODE team to lead and coordinate government efforts to detect, disrupt, and dismantle major criminal enterprises reliant on the darknet for trafficking opioids and other illicit narcotics, along with identifying and dismantling their supply chains.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI: Fresche Solutions and FalconStor Partner to Modernize IBM i Data Backup and Management

    Source: GlobeNewswire (MIL-OSI)

    SAN FRANCISCO, May 22, 2025 (GLOBE NEWSWIRE) — Fresche Solutions, a global leader in AI-powered IT modernization, announces a strategic partnership with FalconStor Software, a leader in IBM Power Systems backup optimization. Together, the companies will deliver modern, secure, and scalable backup and recovery solutions for IBM i environments in the cloud.

    As part of the collaboration, FalconStor’s StorSafe® solution will be integrated into Fresche’s managed services for IBM Power Virtual Server (PowerVS), providing enterprises with a cyber-resilient, cost-effective alternative to legacy tape-based backup systems. The joint solution is designed to optimize backup and archive operations in hybrid cloud deployments by:

    • Modernizing backup from on-premises IBM Power systems to PowerVS: Enabling seamless hybrid cloud transitions
    • Optimizing backups of workloads running natively in PowerVS: Ensuring high-speed recovery and reduced storage costs
    • Leveraging IBM Cloud Object Storage (COS): For long-term data retention, compliance, and immutable protection against ransomware attacks

    “Our collaboration with FalconStor strengthens our ability to help IBM i customers modernize with confidence,” said Lief Morin, GM, Managed Services at Fresche Solutions. “Together, we’re delivering solutions that align with cloud-first strategies while maintaining enterprise-grade resilience and security.”

    Key Benefits of FalconStor StorSafe®:

    • Faster, More Reliable Backup & Recovery: Emulates traditional tape libraries while improving speed, flexibility, and automation
    • Cloud-Ready and Scalable: Integrates with IBM COS to ensure geo-dispersed, highly durable archive and restore capabilities
    • Reduced Costs: Advanced deduplication and storage optimization reduce infrastructure, bandwidth, and cloud storage expenses by up to 60%, including infrastructure costs
    • Ransomware Protection: Immutable storage and WORM (Write Once Read Many) support defend critical data from cyber threats
    • Seamless Integration: Fully compatible with IBM BRMS and other backup tools, making deployment fast and non-disruptive

    “This partnership is a natural fit,” added Todd Brooks, CEO, FalconStor. “Fresche’s leadership in IBM i modernization and managed services complements our mission to provide robust, efficient, and future-ready data protection.”

    To learn more about how Fresche and FalconStor optimize IBM i backup, visit www.freschesolutions.com or www.falconstor.com.

    About Fresche Solutions
    Innovators in AI-powered IT modernization, Fresche manages and maximizes the value of IBM i business-critical systems to reduce technical debt. Our market-leading IP and proven solutions in Modernization, AI & Data Analytics, KTLO, and Cloud Managed Services have earned the trust of global leaders from 2200+ companies. Reimagine your IT challenges into future growth and innovation with Fresche Solutions.

    About FalconStor
    FalconStor Software, Inc. (OTC: FALC) is a trusted leader in data protection, enabling enterprises to modernize backup and archiving across hybrid environments. Its StorSafe platform helps customers optimize storage usage, protect against ransomware, and streamline cloud adoption, especially in IBM ecosystems.

    Media Contact:
    Fresche Solutions
    Kimberley Hernandez
    Corporate Marketing Manager
    Fresche Solutions Inc.
    kimberley.hernandez@freschesolutions.com

    FalconStor
    Vicki Grey
    Head of Marketing
    FalconStor Software Inc.
    vicki.grey@falconstor.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/98ac2065-5fc4-41e9-be9b-a448f51b228f

    The MIL Network

  • MIL-OSI USA: Warren, Markey Slam Trump’s Science Funding Cuts, Highlights Threats to Research and Innovation

    US Senate News:

    Source: United States Senator for Massachusetts – Elizabeth Warren
    May 22, 2025
    Senators concerned by Administration’s false claims of progress highlight over 250 NSF grants that have been canceled across Massachusetts.
    “We urge you to work with the NSF and the White House to reverse the Trump Administration’s budget cuts and the chaos the administration has created.”
    Text of Letters (PDF)
    Washington, D.C. – U.S. Senators Elizabeth Warren (D-Mass.) and Edward J. Markey (D-Mass.) sent a letter to Michael Kratsios, Director of the White House Office of Science and Technology Policy (OSTP), detailing their concerns with the ongoing chaos and upheaval at the National Science Foundation (NSF) and its impact on the future of scientific research and innovation across the United States and the hundreds of thousands of students, postdocs, and faculty in Massachusetts who depend on federal science funding.
    “As the Director of the White House Office of Science and Technology Policy and Science Advisor to President Trump, you are charged with ‘empowering researchers to achieve groundbreaking discoveries’ and safeguarding U.S. leadership in science,” wrote the senators. “Therefore, we write to seek answers regarding why the Trump administration has led the agency into such disarray.” 
    On February 12, 2025, the senators wrote to the NSF inquiring about the decision-making process for the recent disruptions to grant funding and highlighting their impact on research institutions in Massachusetts. In response, NSF told the senators, “The agency has not stopped working; in fact, we have continued to make significant progress over the past few weeks.”
    But since the beginning of the Trump Administration, the NSF appears to have awarded fewer new grants than in any of the five preceding years and recently announced that it would be returning all approved grant proposals back to the review stage, terminating more than 1,400 existing grants, freezing all new grant funding actions “until further notice,” and capping the percentage of NSF grants that institutions are able to spend on administrative and operational costs like facilities and equipment costs at 15 percent. Amidst all of this, on April 24, 2025, NSF Director Panchanathan abruptly stepped down, leaving the agency without a leader or clear direction.
    A federal judge issued an order to the NSF stopping the agency from freezing, blocking, or terminating grants, calling such actions “unlawful.” However, reports indicate that the NSF has significantly cut back on funding and awards activity—in what appears to be defiance of court orders—reversing years of progress and endangering the nation’s scientific future.
    Over 250 grants have been canceled across Massachusetts, with research institutions scrambling to support students who have lost NSF funding and beginning to reduce incoming class sizes for certain scientific programs by 50% due to funding cuts, pauses, and uncertainty. 
    More upheaval continues to plague the NSF, with Director Panchanathan unexpectedly stepping down, leaving the agency currently leaderless and without a clear future. Reports suggest that Panchanathan’s departure may have been triggered by impending budget and staff reductions at the recommendation of the Department of Government Efficiency (DOGE), making working for the NSF untenable. If the reports are accurate, the departure represents a clear rebuke of the Trump Administration’s approach to the U.S. science enterprise.
    “Given the critical importance of NSF funding to scientific progress in Massachusetts and across the country, we urge you to work with the NSF and the White House to reverse the Trump Administration’s budget cuts and the chaos the administration has created,” concluded the senators.
    Due to the troubling reports about the status of the grant review and funding process at the NSF and the impacts these disruptions have on researchers who depend on federal science funding, the senators demand a response by June 3, 2025.

    MIL OSI USA News