Category: United States of America

  • MIL-OSI Security: Kansas City Man Charged with Hobbs Act Robbery and Firearm Violations

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    KANSAS CITY, Mo. – A Kansas City, Mo., man was indicted by a federal grand jury today for robbing fourteen convenience stores at gunpoint. He also faces charges for attempting to rob another convenience store and illegally possessing a firearm.

    Marquise L. North, 31, of Kansas City, Mo., was charged in a thirty-one count indictment returned by a federal grand jury in Kansas City, Mo.

    Today’s indictment charges North with fourteen counts of Hobbs Act robbery, one count of attempted Hobbs Act robbery, fourteen counts of brandishing a firearm in furtherance of a crime of violence, and one count of being a felon in possession of a firearm.

    The federal indictment alleges North committed the robberies between July 26, 2024, and Sep. 21, 2024.  North is alleged to have brandished a firearm during each of the robberies.

    Under federal law, it is illegal for anyone who has been convicted of a felony to be in possession of any firearm or ammunition.  North has a prior felony conviction for unlawful possession of a firearm.

    The charges contained in this indictment are simply accusations, and not evidence of guilt. Evidence supporting the charges must be presented to a federal trial jury, whose duty is to determine guilt or innocence.

    Under federal statutes, North is subject to a sentence of up to life in federal prison without parole.  Brandishing a firearm during a crime of violence carries a mandatory minimum sentence of seven years in federal prison without parole.  The maximum statutory sentence is prescribed by Congress and is provided here for informational purposes, as the sentencing of the defendant will be determined by the court based on the advisory sentencing guidelines and other statutory factors. A sentencing hearing will be scheduled after the completion of a presentence investigation by the United States Probation Office.

    This case is being prosecuted by Special Assistant U.S. Attorney Jessica L. Jennings.  It was investigated by the FBI, Kansas City, Missouri Police Department, Raytown, Missouri Police Department, and Independence, Missouri Police Department.

    Project Safe Neighborhoods

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    MIL Security OSI

  • MIL-OSI Security: Two Springfield, Missouri, Men Sentenced for Methamphetamine Conspiracy

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    SPRINGFIELD, Mo. – Two men from Springfield, Mo., were sentenced in federal court for their roles in a conspiracy to distribute large quantities of methamphetamine in the Springfield area.

    Erik C. Foster, 43, was sentenced by U.S. District Judge Brian C. Wimes, to 215 months in federal prison without parole, to be followed by 5 years of supervised release. Foster pleaded guilty on Dec. 16, 2024.

    Tilton Chase Tate, 41, was sentenced by U.S. District Judge Brian C. Wimes, to 146 months in federal prison without parole, to be followed by 5 years of supervised release. Tate pleaded guilty on October 15, 2024.

    Foster and Tate were charged, along with other individuals, in a 24-count superseding indictment on July 25, 2023, for their roles in a drug conspiracy that lasted from Dec. 2020 to Oct. 2022.

    Foster admitted to purchasing and delivering methamphetamine for other conspirators to distribute in Southwest Missouri. During the course of the conspiracy, law enforcement seized well over 50 grams of methamphetamine from members of the conspiracy.

    According to court records, on Sep. 10, 2022, officers with the Republic, Mo. Police Department located two plastic bags containing at least 844 grams of methamphetamine from inside a speaker during a traffic stop where Foster was the passenger. Foster told officers that he had picked up the methamphetamine in Joplin and was taking it to Springfield to deliver it to a co-conspirator for distribution.

    On Oct. 12, 2022, deputies with the Greene County, Mo., Sheriff’s Office seized a small plastic bag of what appeared to be black tar heroin, a backpack containing 70 grams of methamphetamine, and over $11,960 in cash from Foster during a traffic stop. During a post-Miranda interview, Foster told officers that he was taking the backpack to a co-conspirator for distribution and that he had made six or seven similar trips to deliver methamphetamine.

    Tate admitted to possessing and distributing methamphetamine to others as part of the conspiracy.

    On Oct. 19, 2021, during a traffic stop, a Springfield, Mo. Police Department (SPD) detective seized over 440 grams of methamphetamine from Tate.

    On April 14, 2022, while executing a search warrant for Tate’s residence, SPD officers located a Ruger LCP 380 handgun and a Stoeger Arms, STR 9C 9mm handgun, as well as miscellaneous pills and suspected methamphetamine.

    Later in April, during a post-Miranda interview, Tate admitted to purchasing the methamphetamine seized during the Oct. traffic stop from a co-conspirator. He estimated that he was selling a pound of methamphetamine each week.

    This case is being prosecuted by Assistant U.S. Attorney Stephanie L. Wan. It was investigated by the Bureau of Alcohol, Tobacco, Firearms, and Explosives, the Federal Bureau of Investigation, the Greene County, Mo., Sheriff’s Office, the Missouri State Highway Patrol, the Republic, Mo., Police Department, and the Springfield, Mo., Police Department.

    Organized Crime and Drug Enforcement Task Force

    This case is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) operation. OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.

    MIL Security OSI

  • MIL-OSI Security: Kansas City Man Sentenced to 30 Years for Fentanyl and Methamphetamine Conspiracy

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    KANSAS CITY, Mo. – A Kansas City, Mo., man was sentenced in federal court today for his role in a conspiracy to distribute fentanyl, methamphetamine, and heroin and for possession of firearms in furtherance of that conspiracy.

    Codi J. Monteer, 38, was sentenced by U.S. District Judge D. Greg Kays to 30 years in federal prison without parole.

    On Oct. 8, 2024, Monteer pleaded guilty to one count of conspiracy to distribute fentanyl, methamphetamine, heroin, and marijuana; one count of maintaining a drug involved premises; one count of possession of firearms in furtherance of the drug conspiracy; and one count of being a felon in possession of firearms.

    Monteer’s participation in the drug trafficking conspiracy lasted approximately one year and he was responsible for conspiring with others to distribute at least 124 kilograms of methamphetamine; 700 grams of fentanyl (powder and pills); and 1.58 kilograms of heroin.  He was also in possession of several firearms used in furtherance of his drug trafficking.

    On one occasion, in March 2021, Monteer led members of the Kansas Highway Patrol on a high-speed pursuit that reached speeds of approximately 145 miles per hour.  The pursuit did not conclude until two of the tires came off Monteer’s vehicle.  During the pursuit, drugs were thrown from the vehicle.     

    Monteer was an associate of Autumn Dicks, Ian Hazel, They Kelley, Marc Downs, and Jamison Hopson-Stephens.  Those individuals have already been sentenced for their roles within the conspiracy.  Monteer was also an associate of Davion Williams, Curtis Lewis, Daniel Anderson, and Aaron Dorsey in this conspiracy.  Those individuals have all pleaded guilty and are awaiting sentencing.

    This case is being prosecuted by Assistant U.S. Attorney Ashleigh A. Ragner.  It was investigated by the Kansas City, Mo. Police Department, FBI, United States Postal Inspection Service, and the Kansas State Highway Patrol.

    MIL Security OSI

  • MIL-OSI Video: FLOTUS: 2025 White House Take Our Daughters and Sons to Work Day

    Source: United States of America – The White House (video statements)

    First Lady of the United States Melania Trump welcomed children to the White House with a patriotic arts and crafts activity in the Kennedy Garden as part of the White House’s annual Take Our Daughters and Sons to Work Day celebration.

    https://www.youtube.com/watch?v=wM1NI-0cBOc

    MIL OSI Video

  • MIL-OSI USA News: ICYMI: ‘Angel families’ urge Republicans to pass ‘big beautiful bill’ and secure border to prevent tragedies: ‘There must be change’

    Source: The White House

    Angel Families — whose lives have been shattered by illegal immigrant criminals with no right to be in the country — are calling on Congress to pass President Donald J. Trump’s One, Big, Beautiful Bill, the New York Post reports.

    “’Angel families’ whose loved ones have been killed by illegal immigrants and gang members are urging congressional Republicans to pass President Trump’s ‘big beautiful bill’ to seal the border and fast-track deportations, The Post can exclusively reveal.

    ‘We write to you not as politicians or pundits, but as parents — mothers and fathers who have buried our children because the United States government failed to secure its border,’ they said in an open letter to Congress. ‘There can be no justice for our children, but there can be accountability. There can be action. And there must be change,’ they added.

    ‘We urge every member of Congress to support the ‘One Big Beautiful Bill’ and vote to secure the border, protect our communities, and prevent the next American family from living our nightmare.’

    More than 60 angel relatives co-signed the letter, including the mother of Jocelyn Nungaray, whose 12-year-old daughter was allegedly murdered by two illegal migrants, and the family of Laken Riley, a Georgia nursing student who was killed by a Tren de Aragua gang member from Venezuela. […]

    In their letter, the ‘angel families’ said that for too long they ‘have been ignored, dismissed, or labeled as political props.’

    ‘Every single one of us is living with a permanent hole in our lives because an illegal immigrant, who never should have been in this country, was allowed to stay and take an innocent life,’ they said.

    ‘These were preventable tragedies. And yet, year after year, Washington offers excuses instead of solutions. That must end now.’”

    Click here to read the full story.

    MIL OSI USA News

  • MIL-OSI USA: Attorney General James and 38 Attorneys General Urge Congress to Preserve Access to Health Care for 9/11 Responders and Survivors

    Source: US State of New York

    EW YORK – New York Attorney General Letitia James today led a coalition of 38 other attorneys general in urging Congress to take immediate action to address the impending funding crisis threatening the World Trade Center Health Program (WTCHP), a lifeline for more than 135,000 first responders, survivors, and families impacted by the September 11, 2001 terrorist attacks. In a letter to congressional leadership, Attorney General James and the coalition called for urgent legislative action to ensure the long-term financial stability of the WTCHP, which is projected to face a devastating funding shortfall as early as next year.

    “For nearly 15 years, the WTC Health Program has provided life-saving care to the men and women who rushed toward danger to protect others in the wake of 9/11,” said Attorney General James. “Now, they face a new crisis – the possibility of being denied the medical care they so desperately need and deserve. We owe it to these heroes to keep our promise to them. Congress must honor their sacrifice and act now to prevent catastrophic cuts to this bipartisan, life-saving program, ensuring that these first responders and survivors continue to receive the care they need.”

    Established by Congress under the James Zadroga 9/11 Health and Compensation Act of 2010, WTCHP provides free medical care, monitoring, and treatment to more than 135,000 Americans living with 9/11-related health conditions. Patients served by WTCHP include survivors, first responders, and people who lived or worked near the World Trade Center in lower Manhattan, near the Pentagon, or near the Shanksville, Pennsylvania crash site, as well as those who participated in rescue, recovery, and cleanup efforts. Authorized by Congress through 2090, WTCHP provides care through clinics in the New York metropolitan area and a nationwide provider network that spans all 50 states.

    In the letter, Attorney General James and the coalition write that WTCHP has been an essential resource for fifteen years for Americans exposed to toxic dust and debris following the collapse of the Twin Towers. The attorneys general note that patients include firefighters, law enforcement officers, EMTs, construction workers, volunteers, and community members who were present in the aftermath – many of whom are now suffering from chronic respiratory illnesses, cancers, mental health conditions, and other serious illnesses directly linked to their exposure.

    The attorneys general argue that despite being reauthorized in 2015 and 2019 with overwhelming bipartisan support, the program now faces a severe funding shortfall that could result in the denial of care to thousands of current and future enrollees. The program is authorized to run until 2090, but the attorneys general contend that the far-off date is essentially meaningless if the program is not funded during that period.

    In the letter, Attorney General James and the coalition argue that WTCHP’s funding gap is driven by increasing demand for specialized care, as more survivors and first responders are diagnosed with 9/11-related illnesses each year. They note that approximately 400,000 people were exposed to the toxic air around Ground Zero, and though only a third of that group are currently enrolled in the program, many first responders and survivors are still getting sick at an alarming rate.

    The attorneys general contend that increased demand for services and treatment means that current funding levels are simply not enough for this country to keep its commitment to 9/11 heroes. Without additional funding, waitlists could grow, medical providers may be forced to cut back services, and the program could be unable to accept new enrollees – many of whom are only now receiving diagnoses for conditions directly linked to their exposure.

    Attorney General James and the coalition are calling on Congress to act swiftly and decisively to ensure WTCHP has the full funding it needs. The attorneys general strongly urge Congress to enact legislation that will both address the WTCHP funding shortfall and provide the financial stability necessary for the program to serve current and future enrollees.

    Joining Attorney General James in sending this letter are the attorneys general of California, Colorado, Connecticut, Delaware, Hawaii, Illinois, Iowa, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Nevada, New Hampshire, New Jersey, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, South Carolina, South Dakota, Tennessee, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin, Wyoming, American Samoa, the District of Columbia, the Northern Mariana Islands, and the U.S. Virgin Islands. 

    This is the latest action Attorney General James has taken in her effort to protect the critical World Trade Center Health Program. On May 8, Attorney General James hosted a Community Impact hearing and spoke with Tom Hart, a 9/11 responder, President of the Citizens for The Extension of the James Zadroga Act, and a leader in protecting and extending benefits to 9/11 survivors and their families. On May 5, Attorney General James led a lawsuit to stop the dismantling of the U.S. Department of Health and Human Services, including WTCHP which is facing catastrophic cuts to staff and operating capacity. On April 2, Attorney General James successfully pressured the administration into reinstating the WTCHP director after he was unjustly terminated, throwing the entire program into jeopardy and in February, following reports of significant staff cuts at federal health programs including WTCHP, Attorney General James and others immediately expressed outrage, after which the administration moved to temporarily reverse the staffing cuts.

    MIL OSI USA News

  • MIL-OSI USA: Protecting the Finger Lakes Watersheds

    Source: US State of New York

    overnor Kathy Hochul today announced that $42 million will be disbursed to the Eastern Finger Lakes Coalition to begin implementation of priority projects that will help mitigate Harmful Algal Blooms in the Finger Lakes Watershed area. The Coalition will implement on- and off-farm projects that align with federal and State-approved clean water plans and other pollution prevention plans in an effort to further drive down nutrient and sediment runoff in the Eastern Finger Lakes watersheds. The investment is a part of the Governor’s 2024 State of the State commitment to develop on-the-ground actions necessary to address the controllable causes of harmful algal blooms (HABs) and significantly reduce their prevalence while supporting projects that help prevent nutrient and sediment runoff into lakes and improve climate resiliency.

    “Protecting New York’s water supply is a top priority for New York State,” Governor Hochul said. “We are moving this funding quickly to accelerate watershed protection and restoration measures that will reduce nutrient inputs to the Finger Lakes, improve water quality, and help reduce the frequency of HABs, while building resilience to support New York’s agricultural industry. Clean water is critical to sustaining the health of our communities, protecting our environment, and supporting local economies in the Finger Lakes.”

    In August 2024, New York State announced that $42 million, supported by the Clean Water, Clean Air and Green Jobs Environmental Bond Act of 2022 and other capital resources, was being directed to the Eastern Finger Lakes Coalition to further water quality protections and investments to improve water quality and reduce HABs in the Finger Lakes watershed area. HABs are caused by many factors and impact public health, recreation, and the local economy. The Coalition covers 11 Soil and Water Conservation Districts and seven of New York’s Finger Lakes – Canandaigua, Keuka, Seneca, Cayuga, Owasco, Skaneateles, and Otisco, and their watersheds.

    This dedicated funding, scheduled to the Coalition imminently, is supporting innovative agricultural and resilience projects both on and off farms. This critical investment will not only safeguard the health of the Finger Lakes but also support local farmers by providing additional resources to implement best management practices, such as erosion and sediment controls, nutrient management, and stormwater management that will contribute to cleaner water and soil health throughout the region.

    This direct support of the Coalition is a part of the Department of Agriculture and Markets (AGM) and Department of Environmental Conservation’s (DEC) partnership, alongside the State Soil and Water Conservation Committee, and the 11 Soil and Water Conservation Districts (SWCDs) in the Eastern Finger Lakes, to accelerate watershed protection and restoration measures to improve water quality and mitigate HABs.

    Projects will focus on:

    • Implementing the Agricultural Environmental Management (AEM) program projects  to help farmers reduce water pollution from agricultural activities;
    • Enhancing flood resiliency by stabilizing and protecting vulnerable streams, reducing sediment erosion, and upgrading culverts and implementing water control practices in steep road ditches to minimize sedimentation and runoff; and
    • Supporting nutrient reduction strategiesoutlined in watershed-based plans.

    Department of Environmental Conservation Acting Commissioner Amanda Lefton said, “Governor Hochul’s sustained investments to reduce the frequency of HABs is evident in the ongoing support for the Eastern Finger Lakes Coalition, as well as record infrastructure funding and sustainable farming assistance that helps continue improving the quality of waterbodies statewide. DEC looks forward to collaborating with the Coalition and our many partners on the State and local level to ensure the long-term protection of the lakes and rivers that provide countless environmental, health, and economic contributions to the region’s vibrant communities.”  

    State Agriculture Commissioner Richard A. Ball said, “We are proud of the work we are doing to drive down instances of HABs; however, we know that more must be done to address this issue in our watersheds, including in the Finger Lakes. As such, we are developing comprehensive action plans that will not only build on our current work to prevent water pollution, improve nutrient management, and reduce erosion, but will also guide our future goals for a sustainable environment and cleaner waterbodies. This funding will allow our Soil and Water Conservation Districts to work with both our farms and with local government to complete management projects that will have a critical impact on the reduction of sediments and nutrients entering the waterways and protect the water quality for the region now and for the future.”

    State Health Commissioner Dr. James McDonald said, “This latest funding demonstrates Governor Hochul’s commitment to addressing water quality improvements and Harmful Algal Blooms in the Finger Lakes Watershed area. The State Health Department will continue our work with local water suppliers and our state partners on infrastructure upgrades and technical assistance to help protect drinking water for years to come.”

    Cayuga SWCD Executive Director Doug Kierst said, “Through the continued support of NYS, Soil and Water Conservation Districts of the Eastern Finger Lakes Coalition will continue to get common sense conservation practices on the ground, where they are desperately needed. This dedicated funding will allow local SWCDs to focus on the implementation of an abundance of Best Management Practices that we have identified across the Finger Lakes Region. These important projects, when completed, will facilitate the protection of water quality through the reduction of nutrients and sediments to local waterbodies, support NYS clean water goals and maintain agricultural sustainability.”

    New York State SWCC Chair Matthew Brower said, “The NYS Soil and Water Conservation Committee is proud to be a part of the partnership working to improve the water quality of the Finger Lakes. The farming community, the local Soil and Water Conservation Districts and local governments have been working on these issues for many years and it is great that they will be able to continue this work with the funding provided by New York State. The Agricultural Environmental Program (AEM) has been an excellent program to help farmers identify needs on the farm and get the best management practices implemented to address water quality issues.”

    HABs Mitigation Efforts

    This investment builds on $1.2 million announced by the Governor in July 2024 for the Eastern Finger Lakes Coalition to build professional capacity to address HABs. It also included increased technical support for farmers to implement more cover crops, improve culverts to reduce runoff, enhance soil health, and reduce water quality impairments in the region.

    In just over the last five years, AGM has dedicated nearly $125 million— through its Agricultural Nonpoint Source Abatement and Control, Climate Resilient Farming, and Agricultural Environmental Management (AEM) programs— to on-farm projects that protect soil and water quality, conserve natural resources, fight climate change, and reduce the conditions that cause HABs, such as nutrient runoff and soil erosion, and greenhouse gas emissions.

    Through various funding streams allocated in the Budget, the Department supports the SWCDs, who work on behalf of New York’s farms to implement better nutrient and sediment control practices. The Department also supports SWCDs in their work with the State’s municipalities to increase stormwater absorption and improve water retention. These are accomplished through best management practices, such as nutrient management through manure storage, vegetative buffers along streams, conservation cover crops, water management, and more.

    Since 2020, specific to the Finger Lakes Watershed area, $66 million has been awarded over the last five years to implement best management practices on 370 farms within this region of the state. The projects awarded in the Finger Lakes alone have reduced 32,800 pounds of total phosphorus, 746,000 pounds of total nitrogen, and 43 million pounds of sediment per year. This work has also reduced New York State’s agricultural greenhouse gas emissions by nearly 43,000 metric tons of carbon dioxide equivalent every year and have also made a measurable impact towards keeping HABs out of the State’s waterways.

    Since 2017, DEC worked with stakeholders in the Canandaigua, Keuka, Seneca, Owasco, and Skaneateles lake watersheds to develop clean water plans to protect and improve water quality. In addition, DEC has completed Total Maximum Daily Load analysis in Conesus, Honeoye, and Cayuga lakes. In 2018, DEC convened four regional summits to examine the causes of HABs and develop sustainable solutions to reduce impacts. DEC worked with State and local partners to develop and implement  HABs Action Plans for 13 high- priority waterbodies, including several in the Eastern Finger Lakes.

    To date, New York State awarded more than $530 million in grants for projects statewide designed to reduce the frequency of algal blooms by targeting phosphorus and nitrogen pollution, factors that trigger HAB occurrences. DEC also created the New York Harmful Algal Bloom System (NYHABS) webpage, which features an interactive map that provides active HAB locations. Members of the public should report suspected HABs so DEC experts can review and identify for accuracy. Because it is hard to tell a HAB from a non-harmful algal bloom, it is best to avoid swimming, boating, otherwise recreating in, or drinking water with a suspected bloom. DEC encourages people to “Know it, Avoid it, Report it!” all year round, especially during the summer. The summer months are the peak time for HABs – warmer weather, calmer conditions, and more sunlight will often contribute to the blooms.

    Also, since 2014, DEC awarded more than $55.7 million to 96 projects for water quality improvement planning and implementation within the Eastern Finger Lakes watershed through the Water Quality Improvement Project program and the Non-agricultural Nonpoint Source Planning and MS4 Mapping Grant. Projects funded prepare planning reports or directly improve water quality or habitat, promote flood risk reduction, restoration, and enhanced flood and climate resiliency, or protect a drinking water source. Awards within the Eastern Finger Lakes watershed included land acquisition for source water protection, streambank and road ditch stabilization, wastewater disinfection, sanitary sewer overflow improvements, sediment and erosion control, wetland restoration, riparian buffers, salt storage, and aquatic habitat restoration.

    At least $75 million in grants is currently available through DEC’s Water Quality Improvement Project (WQIP) program to support new projects that can help reduce HABs and other actions that directly improve water quality or habitat, promote flood risk reduction, restoration, and enhanced flood and climate resiliency, or protect a drinking water source.

    Other recent funding to help protect water quality includes more than $90 million in grants and low-interest financing to the City of Auburn announced by Governor Hochul and the State Environmental Facilities Corporation. This will support planning, design, and construction of wastewater treatment improvements. To help promote buffers that prevent runoff and other water quality impairments, DEC established the 287-acre Cayuga Shores Wildlife Management Area along Cayuga Lake and awarded $1.2 million to the Finger Lakes Land Trust for land acquisitions to protect Owasco Lake water quality.

    New York’s Commitment to Water Quality

    New York State continues to increase its nation-leading investments in water infrastructure. With an additional $500 million for clean water infrastructure in the 2025-2026 enacted State Budget announced by Governor Hochul, New York will have invested a total of $6 billion in water infrastructure since 2017. In addition, the $4.2 billion Environmental Bond Act is helping State agencies, local governments, and partners access funding to protect water quality, help communities adapt to climate change, improve resiliency, and create green jobs. Bond Act funding will support new and expanded projects across the state to safeguard drinking water sources, reduce pollution, and protect communities and natural resources from climate change.

    The Governor also expanded EFC’s Community Assistance Teams to help all communities access assistance, particularly small, rural, and disadvantaged communities so they may leverage this funding and address their clean water infrastructure needs. Any community that needs help with funding its water infrastructure is encouraged to contact EFC.

    MIL OSI USA News

  • MIL-OSI Security: MEDIA ADVISORY: Coast Guard to discuss boating safety, offer boat rides for Memorial Day weekend

    Source: United States Coast Guard

    News Release  

    U.S. Coast Guard 7th District PA Detachment Jacksonville
    Contact: Coast Guard PA Detachment Jacksonville
    Office: 904-714-7606/7607
    After Hours: 786-393-4138
    PA Detachment Jacksonville online newsroom

     

    05/21/2025 10:21 AM EDT

    JACKSONVILLE, Fla. — The Coast Guard is scheduled to provide boating safety tips and offer boat rides, Friday, during National Safe Boating Week and ahead of Memorial Day weekend at Coast Guard Station Mayport.

    MIL Security OSI

  • MIL-OSI Security: Lackawanna, New York, Man Going to Prison for His Role in Kidnapping Conspiracy Attempting to Force Sister to Marry in Yemen

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    BUFFALO, N.Y. – U.S. Attorney Michael DiGiacomo announced today that Waleed Abughanem, 33, of Lackawanna, NY, who was convicted of misprision of felony, was sentenced to serve 36 months in prison by U.S. District Judge John L. Sinatra, Jr.

    Assistant U.S. Attorneys Charles M. Kruly and Maeve E. Huggins, who handled the case, stated that Abughanem is the son of Khaled Abughanem and the brother of Adham Abughanem. On September 8, 2021, Khaled and Adham Abughanem flew from Buffalo, NY, to Guadalajara, Mexico to kidnap Victim 1, who is the daughter of Khaled and the sister of Adham and Waleed. Between September 10, 2021, and April 6, 2023, Waleed, Khaled and Adham Abughanem conspired to transport Victim 1 from the Western District of New York to Cairo, Egypt, and then to Sanaa, Yemen, where they confined Victim 1 for approximately 16 months with the purpose of marrying her to a man not of her choosing.

    Waleed Abughanem knew Victim 1 was being held involuntarily, and during some of this period, he was present in Yemen. When he was not present in Yemen, Waleed Abughanem instructed his wife to monitor and supervise Victim 1. In December 2022, Waleed Abughanem traveled from Yemen to the United States. When questioned by U.S. Customs and Border Protection as to the whereabouts of his siblings, Waleed Abughanem told the CBP Officer that the Victim was in the United States. By making a false statement, Waleed Abughanem concealed that Victim 1 had been kidnapped and was being involuntarily held in Yemen.

    Khaled and Adham Abughanem were previously convicted by a federal jury at trial and are awaiting sentencing.

    Waleed Abughanem’s sentencing is the result of an investigation by the Federal Bureau of Investigation, under the direction of Special Agent-in-Charge Matthew Miraglia, and the U.S. Department of State’s Diplomatic Security Service, under the direction of Diplomatic Security Director Carlos Matus and Deputy Assistant Secretary Paul Houston. Additional assistance was provided by the Lackawanna Police Department, under the direction of Chief Mark Packard, Customs and Border Protection, under the direction of Director of Field Operations Rose Brophy, and CPB in Boston, Massachusetts.

    # # # #

    MIL Security OSI

  • MIL-OSI Security: Mexican National Indicted for Allegedly Attempting to Smuggle Over 1100 Pounds of Meth into the U.S. Through Eagle Pass

    Source: Office of United States Attorneys

    DEL RIO, Texas – A federal grand jury in Del Rio returned an indictment charging a Mexican national with four counts related to methamphetamine trafficking.

    According to court documents, Veronica Sanchez-Pineda, 46, of Piedras Negras, Coahuila, Mexico, approached the Eagle Pass Port of Entry in a pickup truck on April 20, allegedly giving Customs and Border Protection officers a negative declaration for contraband including narcotics. A secondary inspection allegedly resulted in the discovery of a crystal-like substance inside an auxiliary tank in the bed of the truck. The liquid was extracted and resulted in a positive test result for the properties of methamphetamine, a criminal complaint alleges. The total approximate weight of the alleged narcotic was 521.03 kg.

    The criminal complaint also alleges that Sanchez-Pineda consented to a search of her cell phone, which contained a text message about a “job” in Eagle Pass as well as screenshots of money transfers between the defendant and another individual. Sanchez-Pineda allegedly admitted to being involved in illegal activity regarding the contents of the auxiliary tank and that she was being compensated in Mexican Pesos.

    Sanchez-Pineda is charged with one count of conspiracy to possess with intent to distribute methamphetamine; one count of possession of methamphetamine with intent to distribute; one count of conspiracy to import methamphetamine; and one count of importation of methamphetamine. She was arrested and made her initial court appearance April 24 before U.S. Magistrate Judge Matthew H. Watters of the U.S. District Court for the Western District of Texas. If convicted, Sanchez-Pineda faces 10 years to life in prison and up to a $10 million fine. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    Acting U.S. Attorney Margaret Leachman for the Western District of Texas made the announcement.

    Homeland Security Investigations is investigating the case.

    Assistant U.S. Attorney Warsame Galaydh is prosecuting the case.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    An indictment is merely an allegation and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    ###

    MIL Security OSI

  • MIL-OSI Security: Dover Man Pleads Guilty for Stalking Three Women for Multiple Years

    Source: Office of United States Attorneys

    CONCORD – A Dover man plead guilty yesterday in federal court for stalking three women he was in romantic relationships with by using anonymous phone numbers and email accounts to create a fictious stalker, Acting U.S. Attorney Jay McCormack announces.

    Jason Subirana, age 48, pleaded guilty in federal court in Concord to three counts of Stalking. U.S. District Court Judge Steven J. McAuliffe scheduled sentencing for August 27, 2025.

    According to the charging documents and statements made in court, between November 2016 – December 2021, the defendant stalked three women he was in romantic relationships with. He used more than 50 anonymous phone numbers, provided by TextNow, and anonymous email accounts to send over 650 harassing messages to the three victims from a fictious stalker. He attempted to manipulate his victims, catch them in lies, and cause emotional distress. For example, he sent one victim a text message that read:

    “How can you b*tch to everyone about your birthday? You should be grateful he’s put up with all your lies and shit for so long. Stop trying to make him look like a bad guy, he’s the best thing you have and lucky he hasn’t put you to the curb like the trash bag that you are. Own your shit and stop lying to everyone. You want more? Be honest to EVERYONE around you. Stop thinking you are smarter than everyone.”

    In addition to sending harassing communications to the victims, the defendant also sent himself harassing messages from the fictious stalker using anonymous accounts. For example, the defendant texted himself from an anonymous TextNow number, “Do you really think you’re the only one she’s banging? You really should get yourself tested. Put something in the mail for you keep an eye out for it.” On February 10, 2021, the defendant texted himself from an anonymous TextNow number, “How many times do you think she’s going to take it this afternoon before coming to give you sloppy seconds?”

    The defendant also collected compromising information about the victims and then sent the compromising information to himself under the guise that he received it from “the stalker”. For example, the defendant gained access to Victim 2’s email account and forwarded himself an email exchange from 2015 where Victim 2 mentioned a potential romance with an acquaintance of hers. The defendant orchestrated a series of email forwards through anonymous accounts before making its way back to Victim 2. This email controversy led to Victim 2 admitting to the defendant a prior romantic relationship with that acquaintance, with the defendant responding, “You’re only telling me this now because of the email you got. What else are you hiding from me?” and “What wlse [sic] is out there? Has this all been based on lies???”

    The defendant actively distanced himself from “the stalker” by accusing innocent individuals of being his victim’s “stalker.” For example, the defendant sent numerous harassing messages to a male colleague of Victim 3. Between April 22, 2018, and August 15, 2018, the defendant sent 52 harassing text messages to the victim’s colleague from at least five anonymous TextNow numbers. The defendant also sent the victim’s colleague numerous explicit photos of a woman’s body that resembled Victim 3 but was not in fact Victim 3. When Victim 3 described this to the defendant in messages, he then sent himself multiple messages from “the stalker,” including two of the explicit photos that he had sent to the victim’s colleague and suggested to Victim 3 that her colleague was in fact her stalker.

    The charging statute provides for a sentence of a maximum penalty of 5 years in prison. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

    The Federal Bureau of Investigation led the investigation. Assistant U.S Attorney John Kennedy is prosecuting the case.

     

    ###

    MIL Security OSI

  • MIL-OSI Security: Charlotte Man Sentenced For Illegal Firearm Possession After Assaulting Two U.S. Postal Service Mail Carriers On The Same Day

    Source: Office of United States Attorneys

    CHARLOTTE, N.C. – Dujuan Marquise McNeil, 39, of Charlotte, was sentenced yesterday to 10 years in prison followed by three years of supervised release for illegal possession of a firearm after he assaulted two U.S. Postal Service mail carriers on the same day, announced Russ Ferguson, U.S. Attorney for the Western District of North Carolina.

    Rodney Hopkins, Inspector in Charge of the Atlanta Division of the U.S. Postal Inspection Service (USPIS), which oversees Charlotte, joins U.S. Attorney Ferguson in making today’s announcement.

    “My office will continue to aggressively prosecute those that threaten or harm our postal workers,” said U.S. Attorney Ferguson.  “Postal workers are hard-working Americans that are vital to our way of life and essential to our system of commerce.”

    “A core mission of the U.S. Postal Inspection Service is to provide a safe environment for Postal employees and the American public. Illegal weapons threaten the safety of all our communities,” said Inspector in Charge Hopkins. “We extend our utmost appreciation to our law enforcement partners and the U.S. Attorney’s Office in the Western District of North Carolina for supporting our mission and bringing this investigation to a successful conclusion.”

    According to court records, on June 1, 2023, McNeil, used firearms to threaten two U.S. Postal Service mail carriers. In both instances, McNeil used his vehicle to block a mail truck, before threatening the carrier inside with his guns. McNeil believed someone with the post office stole an unidentified item from his package. McNeil also went to a local post-office complain about the alleged theft. Clerks at that office reported that McNeil stated he would kill whichever carrier was responsible for the alleged theft.

    During the investigation, law enforcement determined the McNeil had multiple prior criminal convictions, including Possession of a Firearm by a Felon, Discharge of a Weapon into Occupied Property, and Domestic Violence Protective Order Violation, and was prohibited from possessing firearms.

    On June 14, 2023, a federal search warrant was executed at McNeil’s residence, where law enforcement found and seized multiple firearms, including: three 9mm semi-automatic pistols (one fitted with an extended magazine); a Polymer 80 9mm semi-automatic pistol (commonly referred to as a “ghost gun”) with an extended magazine; an AR15 semi-automatic rifle; multiple magazines; and nearly 300 rounds of ammunition.

    On October 30, 2024, McNeil pleaded guilty to possession of a firearm by a convicted felon. He is currently in federal custody and will be transferred to the custody of the Federal Bureau of Prisons.

    In making today’s announcement U.S. Attorney Ferguson commended USPIS for their work in this investigation and thanked the Bureau of Alcohol, Tobacco, Firearms and Explosives and the Charlotte Mecklenburg Police Department for their assistance. 

    The U.S. Attorney’s Office in Charlotte prosecuted the case.

     

    MIL Security OSI

  • MIL-OSI Security: Austin Felon Sentenced to 12 Years in Federal Prison for Firearm Possession

    Source: Office of United States Attorneys

    AUSTIN, Texas – An Austin man was sentenced in a federal court in Austin to 144 months in federal prison for one count of felon in possession.

    According to court documents, Steven Moreno Briseno, 38, was arrested by Austin Police when he surrendered during a barricaded standoff at his family’s residence on Nov. 30, 2023. Briseno had allegedly been under the influence of methamphetamine and got into an altercation with his wife, physically assaulting her and then fleeing on foot when officers arrived in response to a 911 call.

    Briseno ran into a vacant apartment across the street then sprinted back to his residence, where he barricaded himself inside. Briseno’s aggressive behavior escalated as he refused the officers’ commands to exit the residence, made comments about arming himself, and threatened to start shooting if the officers did not back away from his residence. Officers observed Briseno fashioning a tripod through a window and mounting a long rifle on top. He was also seen smoking from a glass pipe that resembled a meth pipe while he loaded numerous rounds into rifles, handguns, and at least one shotgun. Additionally, officers watched Briseno exit the residence with a gun in his hand while wearing a camouflaged tactical vest.

    When APD SWAT arrived on the scene, Briseno was instructed to exit the residence with his hands up and empty. Subsequently, he fired at least one round from one of his firearms from inside the residence to an unspecified location outside the residence. After several minutes of speaking via loudspeaker, Briseno surrendered to APD. Inside the residence, officers located numerous firearms, loaded magazines, and boxes of ammunition in plain view, including on top of the kitchen table and staged near the front door and multiple windows in the front of the house.

    Briseno had previously been convicted of multiple felonies, including burglary on Nov. 30, 2022. He pleaded guilty to one count of felon in possession of a firearm on Jan. 15, 2025.

    Acting U.S. Attorney Margaret Leachman for the Western District of Texas made the announcement.

    The Bureau of Alcohol, Tobacco, Firearms and Explosives and the Austin Police Department investigated the case.

    Assistant U.S. Attorney Grant Sparks prosecuted the case.

    ###

    MIL Security OSI

  • MIL-OSI Security: Baltimore Man Pleads Guilty to Drug Trafficking Conspiracy Involving Sale of Loaded AR-Style Pistol

    Source: Office of United States Attorneys

    The defendant sold undercover agents more than 2,000 grams of drugs.

    Baltimore, Maryland – Derrick Nutter, 40, of Baltimore, Maryland, pled guilty to conspiracy to commit drug trafficking in federal court. 

    Kelly O. Hayes, U.S. Attorney for the District of Maryland, announced the plea with Special Agent in Charge Toni M. Crosby, Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF).

    According to the guilty plea, Nutter unknowingly met with undercover agents on multiple occasions to sell methamphetamine, fentanyl, cocaine, and a loaded AR-style pistol.

    On June 12, 2024, Nutter sold an undercover agent approximately 109 grams of cocaine for $3,600, approximately seven grams of methamphetamine for $100, and a free sample of fentanyl. Then on June 20, 2024, Nutter sold the undercover agent approximately 85 grams of suspected fentanyl for $3,300, and approximately 79 grams of cocaine for $2,700.

    Additionally, on the same date, Nutter sold the undercover agent a 5.56 caliber AR-style privately made pistol with no serial number. It was equipped with an Axeon optic and loaded with 12 rounds of ammunition. The substance Nutter described as fentanyl was actually Schedule I ortho-Methylfentanyl – a fentanyl analogue.

    Nutter sold cocaine and MDMA to a second undercover on June 25, 2024, and August 22, 2024. He also explained that his “girl” was receiving a package of drugs in the mail. Investigators identified Nutter’s “girl” as co-conspirator Khristina Williams.

    On September 3, 2024, Nutter was at Williams’ residence and then he drove to a planned meeting location to sell the second undercover agent drugs. Nutter met the undercover agent and sold approximately 223 grams of methamphetamine in exchange for $4,000. He returned to his vehicle where authorities observed Williams seated in the front passenger seat.

    Then on September 10, 2024, Nutter met with two undercover agents and sold them approximately 525 grams of methamphetamine in exchange for $6,100. He also provided a free sample of fentanyl. Nutter agreed to sell the undercover agents additional fentanyl if they came to his home.

    While in route to his home, Nutter called Williams multiple times. After arriving at his residence, Nutter sold the undercover agents several hundred fentanyl pills. Eventually, Nutter and the undercover agents walked outside and met with Williams, who had arrived in her vehicle. Nutter retrieved several hundred additional fentanyl pills from Williams and handed them to the undercovers. The undercover agents paid Nutter $3,900 in exchange for the drugs, including nearly 800 fentanyl pills.

    On October 3, 2024, the two undercover agents met Nutter in a public parking lot. After Nutter sold them approximately 830 grams of methamphetamine, authorities arrested him. During the undercover operation, Nutter sold agents approximately 1,595 grams of methamphetamine, 298 grams of cocaine, 90 grams of fentanyl, 85 grams of fentanyl analogue, and the loaded AR-style pistol.

    Nutter faces a maximum sentence of 20 years in prison. Sentencing is scheduled for Wednesday, September 17, at 11 a.m.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone.  On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    U.S. Attorney Hayes commended the ATF for their work in the investigation.  Ms. Hayes also thanked Assistant U.S. Attorney James O’Donohue who is prosecuting the case.

    For more information about the Maryland U.S. Attorney’s Office, its priorities, and resources available to help the community, visit www.justice.gov/usao-md and https://www.justice.gov/usao-md/community-outreach.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Silver Spring Man Pleads Guilty to “Sextortion” of More Than 100 Minors Located Throughout the United States and Abroad

    Source: Office of United States Attorneys

    Greenbelt, Maryland – Chase William Mulligan, 28, of Silver Spring, Maryland, pled guilty to two counts of producing child sexual abuse material in federal court. The charges are in connection with a scheme in which he met young girls through social media and internet chat rooms and eventually “sextorted” them.

    Specifically, through the scheme, Mulligan coerced at least 108 girls — ranging from ages 5-17 — to send him sexually explicit photographs and videos of themselves. When the girls told him they no longer wanted to send him sexually graphic images, Mulligan threatened to post the images online or come to their house.

    Kelly O. Hayes, U.S. Attorney for the District of Maryland, announced the guilty plea with Special Agent in Charge William J. DelBagno of the Federal Bureau of Investigation (FBI) – Baltimore Field Office.

    “Mulligan used manipulation, fear, and intimidation to exploit over 100 young victims. Now we must ensure that we send a clear message to Mulligan, and others, that those who abuse the most vulnerable members of our communities will pay a steep price,” Hayes said. “We’re committed to working with our law-enforcement partners to relentlessly pursue, prosecute, and bring to justice those who engage in these deplorable acts.”

    “Chase Mulligan is a depraved and dangerous predator. He used social media to target, viciously threaten, and horribly abuse more than 100 minor victims – one as young as five years old,” DelBagno said. “His abhorrent behavior is not diminished by the fact he was thousands of miles away and never met his victims, rather, it’s the opposite. Despite his distance, he presents a serious threat to any child he can access through the internet. The FBI works diligently every day to find and arrest predators like Mulligan so they can no longer prey on innocent children.”

    As detailed in the plea agreement, between at least 2019 and December 2023, Mulligan used numerous Snapchat, Discord, Roblox, Skype, Omegle, and Instagram accounts to target young girls. He convinced minors living in the United States, Canada, Denmark, Spain, Philippines, Australia, and United Kingdom to produce and send him sexually explicit images.

    Mulligan also directed minors to expose their genital areas and engage in sexual conduct. Additionally, Mulligan coerced multiple girls to urinate on camera, insert objects into their genitalia, and participate in sexual acts with dogs.

    After some victims informed Mulligan that they no longer wished to send him sexually explicit images, he threatened to publicly post the images or come to their homes. Mulligan wanted the victims to send more images depicting increasingly graphic sexual conduct.

    As part of his plea agreement, Mulligan must register as a sex offender in places where he resides, is an employee, and is a student, under the Sex Offender Registration and Notification Act.

    Mulligan is facing a mandatory minimum of 15 years and a statutory maximum of 60 years in federal prison.  U.S. District Judge Theodore C. Chuang scheduled sentencing for Wednesday, August 27, at 2:30 p.m.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse.  Led by the United States Attorney’s Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims.  For more information about Project Safe Childhood, visit www.justice.gov/psc. Click the “Resources” tab on the left side of the page to learn about Internet safety education.

    U.S. Attorney Hayes commended the FBI for its work in the investigation. Ms. Hayes also thanked Assistant U.S. Attorneys Megan S. McKoy and Elizabeth Wright who are prosecuting the case.

    For more information about the Maryland U.S. Attorney’s Office, its priorities, and resources available to help the community, please visit www.justice.gov/usao-md and https://www.justice.gov/usao-md/community-outreach.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Mission Woman Sentenced to Federal Prison for Larceny and Failure to Appear

    Source: Office of United States Attorneys

    PIERRE – United States Attorney Alison J. Ramsdell announced today that U.S. District Judge Eric C. Schulte has sentenced a Mission, South Dakota woman convicted of Larceny and Failure to Appear. The sentencing took place on May 19, 2025.

    Kylie Leader Charge, age 19, was sentenced to eight months in federal prison, followed by three years of supervised release. Leader Charge was further ordered to pay a $200 special assessment to the Federal Crime Victims Fund and $1,000 in restitution.

    Leader Charge was indicted by a federal grand jury in February 2024. She pleaded guilty on February 20, 2025.

    The conviction for Larceny stemmed from an incident that occurred in November of 2023, within the Rosebud Sioux Indian Reservation, when Leader Charge and a co-defendant stole a vehicle near Mission, drove it in a reckless manner, and caused damage to the vehicle.

    Following her Indictment, Leader Charge was released on bond. On March 21, 2024, Leader Charge failed to appear for a bail review hearing as required by her bond conditions. She was subsequently indicted for Failure to Appear.

    These matters were prosecuted by the U.S. Attorney’s Office because the Major Crimes Act, a federal statute, mandates that certain violent crimes alleged to have occurred in Indian Country be prosecuted in Federal court as opposed to State court.

    These cases were investigated by the Rosebud Sioux Tribe Law Enforcement Services and the United States Marshals Service. Assistant U.S. Attorney Meghan N. Dilges prosecuted the cases.

    Leader Charge was immediately remanded to the custody of the U.S. Marshals Service. 

    MIL Security OSI

  • MIL-OSI Global: Why was St-Pierre-Miquelon targeted by both Donald Trump and a French politician?

    Source: The Conversation – Canada – By Paco Milhiet, Visiting fellow au sein de la Rajaratnam School of International Studies ( NTU-Singapour), chercheur associé à l’Institut catholique de Paris, Institut catholique de Paris (ICP)

    St-Pierre-Miquelon is a small French archipelago off the coast of Newfoundland in the northwestern Atlantic Ocean.

    A map of St-Pierre-Miquelon and its exclusive economic zone.
    (Eric Gaba)

    The territory is just 244 square kilometres with a population of only 5,800. Nonetheless, it’s recently been in the global spotlight due to its inclusion in a wave of tariffs imposed by the United States — and because of a controversial remark from a French presidential hopeful suggesting undocumented migrants should be deported there.

    These recent events provide an opportunity to examine the complex historical and geopolitical entanglements surrounding St-Pierre-Miquelon and involving France, Canada and the United States.

    Last French territory in the region

    Visited by Indigenous Peoples for nearly 5,000 years, St-Pierre-Miquelon became known to European sailors in the late 15th century and was officially claimed for France by Jacques Cartier in 1536.

    The archipelago soon emerged as a strategic base for French fishermen engaged in cod fishing and whaling. Over the ensuing centuries, the islands were fiercely contested by France and Great Britain, changing hands multiple times before being definitively restored to French control in 1816.

    In the 20th century, the archipelago was at the heart of recurring fishing disputes between Canada and France.

    These peaked in 1988 with events that included the seizure of fishing vessels, the recall of ambassadors and violations of existing agreements. Despite historic treaty-based rights, France’s access to fishing grounds declined after Canada’s 1992 cod moratorium and an arbitration ruling that gave St-Pierre-Miquelon an exclusive economic zone of just 38 kilometres around the archipelago, except for a 16-kilometre swath extending 320 kilometres south.

    Both these events had major economic repercussions for St-Pierre-Miquelon.

    Hefty tariff

    Today, the territory’s economy is small — less than 0.001 per cent of France’s GDP — and it depends heavily on public funds and external provisions, particularly from neighbouring Canada.

    Nevertheless, the territory was initially included among the targets of the so-called Liberation Day tariffs announced U.S. President Donald Trump in April. It was singled out with a hefty 50 per cent import duty, temporarily making it one of the most heavily taxed territories in the world, matched only by the landlocked African country of Lesotho.

    Although Trump reversed course and reduced the tariff to 10 per cent a few days later, the original decision was perplexing given the archipelago’s minimal economic weight and its peripheral geopolitical position. Why was this St-Pierre-Michelon targeted so brutally by the Trump administration?

    Halibut geopolitics

    St-Pierre-Miquelon and the U.S. had a balanced trade relationship from 2010 to 2025, until a sharp discrepancy appeared in July 2024. The U.S. imported US$3.4 million worth of goods from the islands, exporting only $100,000 over the entire year.

    This resulted in a reported trade imbalance of 3,300 per cent for the year 2024, which the U.S. government appears to have interpreted as evidence of a 99 per cent tariff imposed by the territory, applying the same flawed algorithm on other countries.

    Why was there such a discrepancy in July 2024?

    According to several reports, this statistical anomaly is actually the result of a long-standing dispute between France and Canada over fishing quotas in the waters surrounding St-Pierre-Miquelon.

    Traditionally, the territory mainly exports seafood products to France and Canada, and almost none to the U.S.

    But in June 2024, a French vessel offloaded several tons of halibut — an expensive fish in high culinary demand — in Saint-Pierre.

    While the catch was made in international waters and was technically legal, it occurred amid ongoing tensions between France and Canada over halibut stocks and the sustainability of the species in the area.

    Because of these tensions, the catch was redirected to the U.S. market and sold for the aforementioned US$3.4 million, an outcome that ultimately triggered the tariffs imposed by the Trump administration.

    France and Canada reached an agreement on halibut later in 2024. But their “halibut war” was just the latest example of recurring disputes between the two countries over fishing quotas in the waters off the Grand Banks of Newfoundland, one of the world’s richest fishing grounds.

    The heavy tariffs imposed by the U.S. on St-Pierre-Miquelon, even though they were swiftly reversed, wer therefore an indirect consequence of the long-standing tensions between France and Canada.

    A new Alcatraz?

    Within days of St-Pierre-Miquelon recovering from the tariff shock, it was once again thrust into the spotlight.

    This time, Laurent Wauquiez, a moderate right-wing presidential contender in France, suggested migrants under deportation orders known as obligations de quitter le territoire français — or OQTF — should be given two options: either be detained in St-Pierre-Miquelon or return to their countries of origin.

    It’s not the first time politicians have proposed deporting prisoners to French overseas territories.

    The suggestion is aligned with France’s historical use of these territories as sites for penal colonies, most notably in Cayenne in French Guyana and New Caledonia in the South Pacific.

    Wauquiez’s remarks were widely condemned as contemptuous and colonial in tone, including by members of the government.

    In response, local authorities in St-Pierre-Miquelon tried to capitalize on the controversy by launching a humorous media campaign that reappropriated the OQTF acronym.

    Social media ads from St-Pierre-Miquelon officials on the deportation proposal by Laurent Wauquiez.
    (Compiled by Paco Milhiet)

    Their goal was to shift the narrative and highlight the archipelago’s appeal: low unemployment, strong public safety, outstanding natural landscapes and a peaceful, family-friendly quality of life — and, hopefully, free from hefty American tariffs.

    Paco Milhiet does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Why was St-Pierre-Miquelon targeted by both Donald Trump and a French politician? – https://theconversation.com/why-was-st-pierre-miquelon-targeted-by-both-donald-trump-and-a-french-politician-256662

    MIL OSI – Global Reports

  • MIL-OSI USA: LEADER JEFFRIES STATEMENT ON THE PASSING OF REP. GERRY CONNOLLY

    Source: United States House of Representatives – Congressman Hakeem Jeffries (8th District of New York)

    Today, Democratic Leader Hakeem Jeffries released the following statement:

    The Democratic Caucus, the Commonwealth of Virginia and the country have lost a hardworking, humble and honorable public servant with the passing of Congressman Gerry Connolly. 

    For more than three decades, Gerry relentlessly defended our democracy on the Oversight Committee, where he became a Subcommittee Chair and then the Ranking Member. As the co-author of the Issa-Connolly Federal Information Technology Acquisition Reform Act (FITARA), he was instrumental in overhauling our federal IT laws and ensuring our government institutions remain strong and secure. He used his foreign policy expertise as both a Senate staffer and a Member of the People’s House to bolster our transatlantic alliance, serving twice as the President of the NATO Parliamentary Assembly. Even as he battled a difficult cancer diagnosis, Ranking Member Connolly continued to push back against the unprecedented attacks on the federal workers in his district and across the country.

    In addition to his legislative wisdom, Gerry always brought his signature mirth and wit to the House, making even something like proxy voting a point of levity during an otherwise challenging time in our nation. My prayers, and those of the entire House Democratic Caucus, are with Congressman Connolly’s loved ones and the devoted staff who he considered to be his family. 

    ###

    MIL OSI USA News

  • MIL-OSI: No Credit Check Loans: Small Payday & Emergency Loans from Direct Lenders for Bad Credit – ( Guaranteed Approval Loans ) – HonestLoans

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, May 21, 2025 (GLOBE NEWSWIRE) —

    Are you in search of funds but concerned about your credit history? No credit check loans may be just the thing for you. No credit check loans are specially crafted for those who have bad credit history or do not wish to have their credit score impacted by hard inquiries. In this detailed guide, we will cover all you want to know about no credit check loans and why HonestLoans is the finest option in this field.

    Why HonestLoans Is The Best Option For No Credit Check Loans

    In the case of no credit check loans, Honest Loans beats other options for several reasons. With a huge network of reliable direct lenders, Honest Loans makes sure that borrowers find themselves connected with lenders who have expertise in offering loans without conventional credit checks.

    Honest Loans provides:

    • Easy and quick application process
    • High approval rates for all credit histories
    • Transparent fee structure with no hidden fees
    • Rapid funding, usually within 24 hours or shorter
    • Multiple loan options to cater to different financial situations

    Unlike most other loan-matching services, HonestLoans values customer satisfaction and financial health, earning them the top preference for acquiring a loan with no credit check from a direct lender.

     <<< Get Your Emergency Loan Today – No Credit Check, Guaranteed Approval with HonestLoans>>>

    Understand No Credit Check Loans | Loans Without Credit Checks, Guaranteed Approval From Direct Lender

    What Is A No Credit Check Loan?

    A no credit check loan is a product where the lender will not do a standard “hard pull” of your credit history at the time of application. Rather than considering your credit score, lenders consider other items like:

    • Current income level
    • Job stability
    • Bank account status and activity
    • Debt-to-income ratio
    • Alternative data points

    These loans are tailored for borrowers with bad credit records, thin credit histories, or who do not wish to incur further hard inquiries on their credit reports.

    What Kind Of Loans Don’t Need A Credit Check?

    A number of loan types usually don’t need traditional credit checks:

    • Payday Loans: Short-term, high-interest loans based on your pay
    • Title Loans: Secured loans using your car as collateral
    • Pawn Shop Loans: Secured loans tied to the value of things you lend temporarily
    • Some Installment Loans: More long-term loans with fixed installments that emphasize income verification
    • Cash Advances: Short-term loans against future income or available credit card limits
    • Some Personal Loans: Some alternative lenders provide personal loans without credit checks

    Each of these types of loans has its own merits, needs, and cost factors. HonestLoans allows the borrower to know which type is the best for their own particular financial circumstances.

     <<>>

    How Do Loans With No Credit Check Work?

    No credit check loans are different from bank loans:

    • Application: Fill out simple personal and financial details on the internet via sites such as HonestLoans
    • Verification: Your identity, income, and banking details are confirmed by lenders
    • Alternative Assessment: Rather than credit checks, lenders consider such things as income stability and banking history
    • Approval Decision: Be given a lending decision, often in minutes
    • Loan Agreement: Sign off and agree to the loan terms and conditions
    • Funding: Get paid through direct deposit, often within one business day or sooner

    The whole process is intended to be fast and accessible, particularly for people who could be denied such traditional banking services as a result of credit history problems.

    1 Hour Payday Loans Online No Credit Check Instant Approval From HonestLoans

    For emergency financial needs, 1 hour payday loans provide a savior. HonestLoans puts you in touch with lenders that offer instant approval—at times in under an hour.

    Main features of HonestLoans

    HonestLoans is unique in the no credit check loans market with a number of key features:

    • Friendly Platform
    • 256-bit Encryption
    • Free Service
    • Extensive Lender Network
    • Clear Process
    • Educational Content
    • Good Customer Support
    • Fast Results
    • 24/7 application availability
    • Real-time matching with direct lenders
    • Funds paid through ACH or prepaid card
    • No paperwork or faxing
    • Minimal documentation – ID and proof of income

    These elements work together to provide a hassle-free borrowing process that ranks your financial security and needs first.

     <<< Need Fast Cash for an Emergency? Get a No Credit Check Loan Today from HonestLoans>>>

    How HonestLoans’ Direct Lender Network Ensures No Denial Loans without credit checks

    In contrast to conventional financial institutions, HonestLoans utilizes a direct lender network that focuses on bad credit and no credit profiles. This decreases the possibility of rejection by matching you with a lender who can accommodate your individual financial profile.

    Why Honestloans Provides Guaranteed Approval Payday Loans Without Credit Check For Bad Credit?

    Although no loan is technically “guaranteed,” HonestLoans increases your chances of approval by:

    • Soliciting non-hard credit checks
    • Sourcing alternative income verification
    • Skipping conventional underwriting models
    • Offering alternatives for self-employed and part-time employees

    Advantages Of Using HonestLoans for Emergency Loans For Bad Credit

    In the event of a financial emergency with poor credit, Honest Loans provides several benefits:

    • Easy application process
    • Good approval rating for bad credit customers
    • Rapid funding, in some cases within 1 hour
    • No collateral needed
    • Clear loan terms

    These advantages make Honest Loans an ideal option for anyone in need of emergency funding irrespective of credit issues.

     <<>>

    HonestLoans’ Application and Funding Process – 1 Hour Payday Loans Online No Credit Check Instant Approval

    HonestLoans simplifies the loan process to obtain funds in the shortest time possible:

    • Go to the Honest Loans website
    • Complete the application form (around 3 minutes)
    • Compare lender deals
    • Digitally agree to terms
    • Fund received in as fast as 60 minutes

    This streamlined process allows borrowers in emergency situations to obtain funds when they are most in need, without delay or burdensome paperwork.

    Various Alternatives Provided for for Small Payday Loans Online With No Credit Check By HonestLoans

    HonestLoans provides borrowers with a range of small loan alternatives, including:

    • Traditional Payday Loans
    • Installment Payday Loans
    • Tribal Loans
    • Flex Loans
    • Cash Advances
    • Bad Credit Personal Loans
    • Paycheck Advances
    • $100 – $500 loans
    • Weekly or biweekly payment plans
    • Optional rollover or extended terms

    This diversity of loan offerings allows borrowers to locate the particular loan product which most closely matches their individual financial profile and repayment capabilities.

     <<< HonestLoans Has You Covered – Get Direct Lender Emergency Loans with No Credit Checks>>>

    Honest Loans’s No Credit Check Options vs. Traditional Loans

    HonestLoans offers a faster, easier option to banks, especially if you have bad credit.

    Let’s compare the important aspects:

    • Credit: Banks always pull credit. HonestLoans does not, so it’s easier to qualify.
    • Speed: Bank loans take days to receive. HonestLoans approves and deposits your loan within the hour.
    • Eligibility: Banks require good credit and a steady job. HonestLoans considers your income, number of active bank accounts, and not credit history.
    • Loan Amounts: Bank loans are large loans with long repayment terms. HonestLoans offers $100-$1000 short-term loans (today).
    • Application: Bank loan applications take forever. HonestLoans is online and takes minutes to complete.

    HonestLoans is the more convenient option if you want quick, easy financing when traditional financing is not available.

    Features And Benefits Of No Credit Check Loans With Guaranteed Approval From Direct Lender

    No credit check guaranteed approval loans provided by direct lenders possess various important features and advantages that benefit many borrowers:

    Important Features:

    • Direct funding source with no intermediaries
    • Streamlined application process
    • Income-focused instead of credit-based
    • Transparency in fee structure
    • Fast funding term
    • Simple repayment terms

    These features and advantages come together to produce a financial product that benefits those who are usually skipped by conventional banking organizations.

     <<< Bad Credit? No Problem – Get Quick, Hassle-Free Loans from HonestLoans Today>>>

    Eligibility Criteria for Loans Without Credit Check For Borrowers With Poor Credit History

    Although no credit check loans are easier to obtain than regular loans, borrowers must still satisfy basic criteria:

    • Regular Income: Regular source of income (job, benefits, etc.)
    • Active Bank Account: Active check account in good standing for receiving loan funds
    • Age Requirement: At least 18 years old (19 in certain states)
    • Identification: Valid government-issued photo ID
    • Contact Information: Current phone number and email address
    • Residency: U.S. citizenship or permanent residency
    • No Outstanding Payday Loans: Previous payday loans need to be paid in full

    Satisfying these conditions also greatly enhances your chances of loan approval even with bad credit history. HonestLoans cooperates with lenders who are more interested in these factors than with conventional credit scores.

    Various Types of Emergency Loans | Instant Payday Loans For Bad Credit No Credit Check

    Personal Loans

    Bad credit personal loans are unsecured loans with the following characteristics:

    • Amounts ranging from $500 to $5,000
    • Payback periods ranging from months to years
    • Fixed rates and consistent payments
    • Funds used for any expense
    • Possible reporting to credit bureaus to establish or rebuild credit

    Credit Card Cash Advances

    Cash advances permit borrowing against available credit card lines:

    • Instant access via ATMs or banks
    • No separate application process
    • Available up to your cash advance limit
    • Higher interest rates than standard purchases
    • Additional cash advance fees typically apply

      <<< Get Your Emergency Loan Today – No Credit Check, Guaranteed Approval with HonestLoans>>>

    Payday Loans

    Payday loans are short-term loans due on your next payday:

    • Typically $100 to $1,000
    • Very short terms (2-4 weeks)
    • Higher interest rates
    • Simple qualification requirements
    • Fast funding (same-day or next-day)
    • Based primarily on income verification

    Title Loans

    Title loans use your vehicle as collateral:

    • Loan amount based on vehicle value (25-50%)
    • Must own vehicle outright
    • Continue driving while repaying
    • Higher loan amounts than unsecured options
    • Longer repayment terms possible
    • Risk of vehicle repossession if unable to repay

    Paycheck Advances

    Paycheck advances offer early access to wages earned:

    • Access portion of wages prior to payday
    • Lower fees than regular payday loan
    • Often through employer program or app
    • Repayment automatically taken from paycheck
    • No credit check needed
    • Limited to amount already earned

      <<>>

    Urgent Loans For Bad Credit: How Long Does It Take to Get Approved?

    With bad credit, timing is everything when dealing with a financial emergency. Here’s what the approval timeframe looks like:

    • Application: 5-10 minutes to finish
    • Initial Decision: Typically instant to 15 minutes
    • Documentation Verification: 1-24 hours
    • Final Approval: As fast as 1 hour, usually within 24 hours
    • Funding: Some lenders provide 1-hour funding, others 24 hours

    HonestLoans partners with lenders who value speed, with most providing same-day approval and financing for approved borrowers.

    Payday Loans Online No Credit Check Instant Approval

    No credit check payday loans online with instant approval have transformed emergency lending by not only making the process quicker and more convenient than ever but also allowing us to disburse funds faster.

    Schedule for Quick Loans No Credit Check Disbursement

    Standard fund disbursement schedule:

    • Same Business Day: Applications received prior to 10:30 AM
    • Next Business Day: Applications received after cut-offs
    • Weekend Requests: Typically processed Monday (weekend funding provided by some lenders)
    • Bank Processing: Depends on the bank

    1 Hour Payday Loans Online No Credit Check Instant Approval

    For the quickest funding, the process is as follows:

    • Fill out HonestLoans’ quick application
    • Get instant pre-qualification
    • Send verification documents online
    • Get final approval, usually in minutes
    • Get funds via expedited bank deposit

      <<< Need Fast Cash for an Emergency? Get a No Credit Check Loan Today from HonestLoans>>>

    $255 Payday Loans Online Same Day

    These typical small loans provide:

    • Protection for small emergency costs
    • Simpler qualification terms
    • Faster approval process
    • Same-day funding when applied early
    • Less intimidating repayment amounts

    Pros and Cons of No Credit Check Loans

    As with any financial product, no credit check loans have benefits and drawbacks that are worth considering by the borrower.

    Pros:

    • Available to bad credit holders
    • Rapid application and funding
    • Low documentation needed
    • No hard credit checks
    • For use in multiple kinds of emergencies
    • Can prevent late charges or disconnection of services

    Cons:

    • Increased interest and fees
    • Repayment periods are shorter
    • Risk of debt cycle trap
    • May not establish credit if not reported
    • Smaller loan amounts than traditional ones
    • Predatory lenders exist in the industry

    Some predatory lenders target susceptible borrowers (that is why operations like HonestLoans are worth it)

    No Credit Check Loan Scenario in the USA

    The business landscape consists of:

    • Around 12 million Americans utilize payday loans every year
    • More than 23,000 payday lenders have business in the country
    • State laws differ significantly
    • Online lending opened up access beyond locations
    • Average payday loan amount is roughly $375

    HonestLoans operates within this environment by matching borrowers with solid lenders that work within regulations while ensuring fair terms.

      <<>>

    Alternatives to Small Payday Loans Online No Credit Check and Urgent Loans No Credit Check

    Alternatives to mainstream small payday loans:

    • Installment Microloans: Smaller loans with several payments
    • Cash Advance Apps: Mobile apps for wage advances
    • Credit Union Payday Alternative Loans: Less expensive alternatives
    • Small Personal Loans: Mainstream lenders with less restrictive requirements
    • Family and Friend Loans: Private loan sources

    $500 Cash Advance No Credit Check Loans

    The $500 cash advance is in demand because it:

    • Pays for most typical emergencies
    • Provides affordable payment sizes
    • Is easily accessible from many lenders
    • Typically offers same-day loans
    • Usually asks for $1,000-$1,500 monthly income

    Emergency Loans No Credit Check

    Emergency no credit check loans assist when:

    • Medical conditions need to be paid immediately
    • Car repairs are necessary for work commute
    • Repairs for the home are needed for safety
    • Critical utilities threaten disconnection
    • Other immediate needs loom in the financial future

    Some Risk-Free Alternatives to No Credit Check Loans

    Although no credit check loans have a valuable function, customers should think about these likely lower-cost options:

    Secured Loans

    Secured loans employ collateral to limit lender risk:

    • Less than unsecured rates
    • More available amount of money
    • Longer time to repay
    • Access through traditional credit unions and banks
    • Possibility of losing collateral if cannot repay

      <<< Need Fast Cash for an Emergency? Get a No Credit Check Loan Today from HonestLoans>>>

    Credit Unions

    Credit unions tend to be more flexible in lending:

    • Member-oriented approach
    • Payday Alternative Loans with caps on lower rates
    • More individualized assessment
    • Financial literacy tools
    • Opportunity to develop positive relationships
    • Demand membership (typically with small fees)

    Peer-to-Peer Lending

    P2P websites bring borrowers together with individual investors:

    • Consider non-credit score factors
    • Competitive rates for most borrowers
    • Flexible qualification
    • Transparent fee practices
    • Diverse loan amounts and durations
    • Easier application process

      <<< HonestLoans Has You Covered – Get Direct Lender Emergency Loans with No Credit Checks>>>

    What Are the Risks of No Credit Check Loans?

    No credit check borrowers must be aware of some possible dangers:

    • Exorbitant prices (interest rates and fees)
    • Short payment periods putting pressure
    • Possible cycles of debt
    • Predatory lenders preying on vulnerable borrowers
    • Differing state laws and consumer protections
    • Limited opportunity to build credit
    • Access to bank account for automatic debit

    Engaging in reputable services such as HonestLoans reduces these risks by linking borrowers with responsible lenders.

    How to Apply for No Denial Payday Loans Direct Lenders Only With No Credit Check?

    The process of application for no denial payday loans by direct lenders is simple:

    1. Gather Required Information:

    • Government ID
    • Proof of income
    • Active checking account info
    • Social Security Number
    • Contact details

    2. Select a Reputable Platform:

    • HonestLoans matches you with reliable direct lenders
    • Free service with no obligation
    • Personal info is secure using encryption

    3. Complete Application:

    • Enter personal and financial information
    • Enter amount of loan desired
    • Enter employment details
    • Enter banking information for funds transfer

    4. Review Offers:

    • Compare offers from various lenders
    • Watch for APR, fees, and terms of repayment
    • Look for hidden fees

    5. Accept Loan Terms:

    • Read the whole loan contract
    • Have questions answered about anything that is unclear
    • E-sign the contract

    6. Receive Funds:

    • Direct deposit into your bank account
    • Funding times from 1 hour to 1 business day

    Why Go For No Credit Check Loans?

    These loans serve important purposes:

    • Perfect for those with damaged credit histories
    • Faster than traditional loans during emergencies
    • Simple online application available 24/7
    • Accessible to those excluded from traditional banking
    • Private way to handle financial challenges
    • Avoid hard inquiries that damage credit scores
    • Bridge financial gaps between paychecks
    • Address urgent situations without delay

    How to Find a Reputable No Credit Check Loan Direct Lender?

    Search for lenders with:

    • Transparent fee terms and clear charges
    • Regulatory compliance
    • Good customer feedback
    • Secure sites (https)
    • Solid history
    • Membership in industry associations
    • Educational materials
    • No charges upfront

    Steer clear of lenders displaying:

    • Guaranteed approval with no conditions
    • High-pressure tactics
    • Sneaky charges or ambiguous charges
    • No address or contact information
    • Requests for unconventional payment options
    • Very high interest charges

    HonestLoans pre-screens their network of direct lenders to guarantee they are held to high standards for good lending practices.

    Where to Find The Best No Denial Payday Loans From Direct Lenders Only With No Credit Check?

    When looking for no denial payday loans from direct lenders with no credit checks, HonestLoans is the best choice for a variety of reasons:

    • Large lender pool boosting chances of approval
    • Vigorous lender screening guaranteeing ethical practices
    • No-charge service with no platform fee
    • Bank-level protection safeguarding your data
    • Easy application process
    • Educational materials to make informed decisions
    • Friendly customer support
    • Clear terms prior to commitment

      <<< Need Fast Cash for an Emergency? Get a No Credit Check Loan Today from HonestLoans>>>

    Final Words

    No credit check loans offer useful money solutions to persons with credit issues or crises that have to be addressed immediately. Although loans do generally incur more expense compared to conventional lending, they play a necessary role in the financial system by making available funds to persons who would otherwise have no alternative.

    For individuals requiring rapid access to funds without the usual credit checks, HonestLoans provides a trusted, secure portal linking borrowers directly with established direct lenders. Transparency, security, and customer education are their top priorities, and for this reason, they are the best in the no credit check loan market.

    Frequently Asked Questions

    Can I borrow money without a credit check?

    Yes, many online lenders such as HonestLoans offer loans based on your income rather than your credit score.

    Which loan does not require a credit check?

    Payday loans, cash advances, and certain personal installment loans typically don’t involve a credit check.

    How to get instant loan 50000 with low CIBIL score?

    Try to apply with lenders who consider income over credit history or opt for secured loans like HonestLoans.

    What is the easiest loan to get with no credit?

    Cash loans or payday loans are typically the quickest if you have no credit history.

    How can I get a loan in 1 hour?

    Search for lenders online such as HonestLoans that provide fast approvals and can make transfers in an hour.

    Can I get a loan with a 450 credit score in USA?

    Yes, your best option would be no credit check lenders or those who take other factors into consideration such as your income.

    Media Details:

    www.honestloans.net

    • Company: Honest Loans
    • Phone: 888-718-9134
    • Email: support@onlineloannetwork.com

    Attachment

    The MIL Network

  • MIL-OSI: $HAREHOLDER ALERT: The M&A Class Action Firm Investigates the Merger of SigmaTron International, Inc. – SGMA

    Source: GlobeNewswire (MIL-OSI)

    NEW YORK, May 21, 2025 (GLOBE NEWSWIRE) — Monteverde & Associates PC (the “M&A Class Action Firm”), has recovered millions of dollars for shareholders and is recognized as a Top 50 Firm in the 2024 ISS Securities Class Action Services Report. We are headquartered at the Empire State Building in New York City and are investigating SigmaTron International, Inc. (NASDAQ: SGMA), relating to the proposed merger with Transom Capital Group, LLC. Under the terms of the agreement, an affiliate of Transom will commence a tender offer to acquire all outstanding shares of the Company’s common stock for $3.02 per share in cash.

    Click here for more https://monteverdelaw.com/case/sigmatron-international-inc-sgma/. It is free and there is no cost or obligation to you.

    NOT ALL LAW FIRMS ARE THE SAME. Before you hire a law firm, you should talk to a lawyer and ask:

    1. Do you file class actions and go to Court?
    2. When was the last time you recovered money for shareholders?
    3. What cases did you recover money in and how much?

    About Monteverde & Associates PC

    Our firm litigates and has recovered money for shareholders…and we do it from our offices in the Empire State Building. We are a national class action securities firm with a successful track record in trial and appellate courts, including the U.S. Supreme Court. 

    No company, director or officer is above the law. If you own common stock in the above listed company and have concerns or wish to obtain additional information free of charge, please visit our website or contact Juan Monteverde, Esq. either via e-mail at jmonteverde@monteverdelaw.com or by telephone at (212) 971-1341.

    Contact:
    Juan Monteverde, Esq.
    MONTEVERDE & ASSOCIATES PC
    The Empire State Building
    350 Fifth Ave. Suite 4740
    New York, NY 10118
    United States of America
    jmonteverde@monteverdelaw.com
    Tel: (212) 971-1341

    Attorney Advertising. (C) 2025 Monteverde & Associates PC. The law firm responsible for this advertisement is Monteverde & Associates PC (www.monteverdelaw.com).  Prior results do not guarantee a similar outcome with respect to any future matter.

    The MIL Network

  • MIL-OSI: Best Payday Loans (Same Day) with No Credit Check and Same Day Approval 2025 – Fast Cash Online Instant Payday Loans for Quick Funding – Viva PayDay Loans

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, May 21, 2025 (GLOBE NEWSWIRE) —

    When life throws you a curveball—like an unexpected car repair, a last-minute medical bill, or an urgent home expense—waiting for your next paycheck isn’t always an option.

    That’s where payday loans step in, offering a lifeline for people who need fast cash. 

    These short-term loans are designed to help you cover emergency expenses quickly, so you can get back on your feet without the stress of financial uncertainty.

    Get an answer in 2 minutes!

    < CLICK for Same Day Loans Online No Credit Check Instant & Guaranteed Approval >

    Viva Payday Loans Review 2025: The Easiest Way to Fast Cash Online

    Life can throw you financial curveballs when you least expect it—an unexpected medical bill, a last-minute car repair, or just that awkward moment when payday is still days away but your wallet is already empty. 

    In these moments, you need a solution that’s fast, reliable, and doesn’t make you jump through endless hoops. 

    That’s where Viva Payday Loans shines as the best payday loan platform in 2025.

    < CLICK to apply for same day loan same day approval now >

    Why Choose Viva Payday Loans?

    Viva Payday Loans has redefined what it means to get a quick cash loan in the USA. Forget about stressful bank visits, mountains of paperwork, and worrying about your credit score. Viva Payday Loans makes the entire process simple, transparent, and tailored to real people—no matter your situation.

    With Viva Payday Loans, you can borrow anywhere from $100 up to $5,000, and choose a repayment term from just 2 months up to 24 months. 

    Whether you’re looking for a small bridge to your next paycheck or a larger amount for a big expense, the flexibility here is unmatched.

    Lightning-Fast Application & Approval

    Time is money, especially in a financial emergency. With Viva Payday Loans, you won’t be left waiting and wondering. 

    The online application is refreshingly fast—just a couple of minutes to fill in your details, choose your loan amount and term, and submit. 

    The decision? You’ll have your answer in about 2 minutes. No more anxious waiting—if approved, you can expect funds direct to your checking account, often as soon as the same day or by the next business day.

    < CLICK for No Credit Check Payday Loan – Instant & Guaranteed Approval >

    All Credit Scores Welcome

    If you’ve ever been turned down by traditional lenders because of past financial mistakes, Viva Payday Loans is a breath of fresh air. 

    This platform welcomes all FICO scores, including those with bad credit or limited credit history. Many payday lender partners in their network focus more on your current affordability than your credit past, so a rough patch years ago won’t keep you from getting the help you need today.

    No Credit Check? No Problem.

    Worried about a credit check? Viva Payday Loans offers options for no credit check payday loans. 

    If you need fast cash loans and want to avoid the hassle or anxiety of a traditional credit inquiry, you can still qualify as long as you meet the basic eligibility: be over 18, have a regular monthly income of at least $1,000, a permanent address, and an active checking or savings account with direct deposit.

    For Every Situation

    What truly sets Viva Payday Loans apart is the wide range of loan types available. Whether you’re unemployed but have alternative income, on benefits, or even need a specific amount like a $255 or $500 loan, Viva Payday Loans has solutions. 

    There are options for people with non-traditional income, people on SSI, and even those who prefer to use debit or prepaid cards instead of a standard bank account.

    Transparent, Trusted, and User-Focused

    Transparency is key at Viva Payday Loans. Interest rates are clearly stated (ranging from 5.99% to 35.99% APR), there are no upfront fees, and you always see the full repayment schedule before you commit. 

    The platform only works with reputable, reliable lenders, making it easy to avoid scams and hidden fees.

    Simple Steps, Real Results

    1. Choose your amount and term.
    2. Complete the simple online form.
    3. Get a decision in minutes and, if approved, receive your cash fast.

    It’s genuinely that easy. Plus, Viva Payday Loans’ support team is available throughout the week to answer any questions or help you through the process.

    Viva Payday Loans Is Your Go-To in 2025

    < CLICK for No Credit Check Payday Loan – Instant & Guaranteed Approval >

    In a world where financial emergencies can happen to anyone, Viva Payday Loans is the safety net that’s fast, friendly, and truly accessible. 

    With flexible loan options, instant online decisions, and no judgment for past credit issues, it’s simply the smartest way to get back on your feet. If you’re looking for the best payday loan lender in 2025, look no further—Viva Payday Loans delivers exactly what you need, right when you need it.

    Ready to experience the difference? Apply today and see how easy getting a payday loan can really be.

    Why Payday Loans?

    What makes payday loans especially attractive is their speed and accessibility. Thanks to the rise of online payday lenders, you can now apply for a loan from the comfort of your own home at any time of day. The application process is straightforward and typically takes just a few minutes to complete. Most online payday lenders offer instant approval—meaning you’ll know within moments whether you qualify—and many can deposit funds into your bank account the very same day.

    Unlike traditional loans that rely heavily on your credit score, payday lenders often skip the detailed credit check or use alternative methods for approval. This means even if you have a less-than-perfect credit history, you still have a strong chance of getting approved. For many borrowers who’ve been denied elsewhere, this opens the door to much-needed funds.

    Loan amounts usually range from $100 up to $1,000, depending on the lender and your individual circumstances. This flexibility allows you to borrow just what you need, without overextending yourself. With fast cash payday loans, you get a practical solution for those moments when time and money are both in short supply.

    < CLICK for No Credit Check Payday Loan – Instant & Guaranteed Approval >

    Understanding Payday Lenders

    Now that you know how payday loans can help in a pinch, let’s take a closer look at the lenders behind them and what you should expect when applying.

    How Payday Lenders Work

    Payday lenders are there for those moments when you need money fast and can’t wait until your next paycheck. They offer short-term loans—usually from $100 to $1,000—with the idea that you’ll pay the money back, plus interest, as soon as you get paid again. Because these loans are so quick and easy to get, the interest rates are typically much higher than what you’d find with a traditional bank loan. The convenience comes at a cost, but for many, it’s worth it when there’s an urgent need.

    What Makes a Lender Trustworthy?

    Not all payday lenders are the same. The best ones—like those you’ll find through reputable online loan platforms—are upfront about their fees, interest rates, and repayment terms. They won’t try to sneak in hidden costs or confusing fine print. A good lender spells everything out in simple language, so you know exactly what you’re signing up for from the start.

    What You’ll Need to Apply

    Applying for a payday loan is surprisingly simple. Most lenders just ask for a few basics: a bank account to deposit your funds, proof that you have a steady income, and a valid ID. These requirements help make the process quick and safe for everyone.

    About “Guaranteed Approval” Loans

    You might see some payday lenders advertise “guaranteed approval,” especially if you have bad credit. While this sounds great, it’s important to be careful—these loans often come with even steeper interest rates and extra fees. Always read the terms and borrow only what you can comfortably repay.

    Exploring Cash Advance Options

    What Is a Cash Advance?

    A cash advance is another fast and flexible way to handle surprise expenses, such as urgent car repairs or medical bills. Like payday loans, cash advances are short-term loans designed to tide you over until your next paycheck. They typically don’t require extensive paperwork, and many lenders now offer online cash advances that make the process even more convenient. With just a few clicks, you can request funds and have money deposited directly into your bank account—sometimes within hours.

    How Cash Advances Can Help

    For those facing a financial crunch, cash advances can be a practical solution to avoid missed payments, overdraft fees, or late charges on important bills. Many payday loan borrowers turn to cash advances when they need to bridge the gap between paychecks, especially when timing is tight.

    Personal Loan Alternatives: A Smarter Way to Borrow

    Why Consider a Personal Loan?

    If you have time to shop around and want to save money on interest, personal loans can be a much more budget-friendly alternative to payday loans or cash advances. Personal loans typically come with lower interest rates, longer repayment periods, and larger borrowing limits. This makes them a solid choice for bigger expenses or for consolidating high-interest debts.

    Where to Find Personal Loans

    You can apply for personal loans through a variety of sources. Online lending platforms connect you with multiple lenders at once, allowing you to compare rates, terms, and offers in minutes. Many traditional banks and credit unions also offer personal loans with even more favorable terms, especially if you have an established relationship or good credit history.

    What to Expect in the Application Process

    Unlike payday loans, personal loans require a bit more information. You’ll need to submit a formal application, undergo a credit check, and often provide details about your income and employment. While this process can take a little longer, the reward is usually a lower rate and a more manageable payment plan. For many borrowers, the extra effort is well worth it for the long-term savings and financial peace of mind.

    The Convenience of Online Loan Applications

    Applying for Loans Has Never Been Easier

    The digital age has completely transformed the way people borrow money. Today, nearly every reputable lender offers an online application process for payday loans, personal loans, and cash advances. Gone are the days of driving across town to fill out paperwork in person. Now, you can apply from your phone or computer, any time of day or night.

    Fast Approvals and Same-Day Funding

    Most online loan applications are designed for speed and simplicity. You’ll typically need to provide basic information—such as a valid ID, proof of income, and your bank account details. Thanks to automated approval systems, many lenders can review your application and provide an instant decision. If you’re approved, funds are often transferred the same day, putting money in your pocket when you need it most.

    Comparing Your Options

    Online loan platforms also make it easier than ever to shop around. You can compare multiple offers side by side, review interest rates and repayment terms, and choose the loan that best fits your needs and budget. This transparency empowers you to make smarter financial choices and avoid getting locked into a loan that doesn’t work for you.

    Loan Options and Terms

    When urgent financial needs arise, understanding your loan options and terms is crucial before choosing a payday lending provider.

    Online payday loans are popular for their speed, but most come with very short repayment periods—often just two to four weeks—meant to be paid back by your next payday. While this quick turnaround can be helpful, the interest rates and fees for these loans are typically much higher than what you’d see with a personal loan from a bank or credit union.

    Some payday loan lenders may offer slightly better terms for returning customers or those with a steady income, but these loans generally remain one of the more expensive ways to borrow.

    On the other hand, personal loans usually feature longer repayment periods—sometimes stretching over several months or even years—and offer lower interest rates. Your eligibility, the loan amounts you’re offered, and even your chances of an approval will depend on factors like your credit score and history.

    The good news is that many payday loan providers and credit check loans now consider borrowers with bad credit, giving more people access to much-needed funds.

    Still, before signing a loan agreement, always review the fine print and compare loan amounts, fees, and repayment schedules.

    Most payday loan borrowers benefit from carefully matching their loan choice to their budget and timeline, which can help prevent surprise costs or falling into a debt cycle. Taking the time to understand your options ensures you make the best decision for your financial situation.

    Cash Advance App Benefits

    In recent years, cash advance apps have become a popular alternative for folks who need quick cash but want to avoid the pitfalls of traditional payday loans.

    These apps are designed for convenience—they usually just need you to have a bank account and a steady paycheck, and most won’t even check your credit score.

    For many payday loan borrowers, this makes cash advance apps much more approachable, especially if your credit isn’t perfect. 

    The fees tend to be lower, and you can get money in your account fast, making them a great option for covering small, sudden expenses. 

    By using these apps, you can manage your finances more smoothly, avoid late fees, and steer clear of the high costs that come with payday loan lenders. They’re a solid choice if you need a little help between paychecks without taking on a lot of debt.

    Credit Union Loans

    If you’re looking for a more affordable way to borrow, it’s worth checking out what your local credit union has to offer.

    Credit unions are known for providing personal loans with much lower interest rates and fees than most payday loan providers.

    While you’ll usually need to become a member and go through a credit check, the process is often straightforward, and the terms are much more borrower-friendly.

    Many payday loan borrowers find that credit union loans are perfect for things like consolidating debt, paying for a big repair, or handling unexpected bills. Plus, credit unions often go the extra mile by offering financial counseling and guidance, helping you build better money habits for the future.

    If you’re tired of the high costs associated with payday loan lenders, a credit union could be a great long-term solution.

    Payday Loan Regulations

    Payday loan regulations can make a big difference in how safe and fair the borrowing process is for consumers.

    Depending on where you live, your state might put strict limits on how much payday loan lenders can charge in interest and fees—or it might have banned payday loans altogether.

    Reputable payday loan providers are required to follow both state and federal rules, such as the Truth in Lending Act, which makes sure you get all the facts about your loan upfront.

    For most payday loan borrowers, it’s really important to know your rights and understand the laws in your state before signing anything.

    These regulations are designed to protect you from unfair practices and help prevent debt from spiraling out of control. Always look for payday loan lenders who are transparent about their terms and who operate within the law, so you can borrow with greater confidence and peace of mind.

    Managing Debt

    Getting a handle on your debt is one of the smartest moves you can make, especially if you’ve relied on fast cash loans or loans online to cover emergencies like medical expenses.

    Many payday lender options may seem convenient at the moment, but without a plan, it’s easy to get stuck in a cycle of borrowing.

    If you’ve made past financial mistakes, you’re not alone—what matters most is taking steps to move forward. One way to get back on track is by looking into debt consolidation loans, which can bundle your balances into one payment with a structured repayment schedule.

    Setting a realistic budget and tracking every dollar that goes in and out of your checking account can help you avoid overspending. If you’re unsure where to start, talking to a financial advisor or credit counselor can help you map out a plan that fits your minimum monthly income and long-term goals.

    Avoiding Scams

    When you’re searching for loans online, it’s so important to stay alert for scams—especially since fast cash loans often attract shady operators.

    Many payday lender websites promise easy money, but always take time to research any lender before sharing your personal or checking account information.

    Read reviews, look for clear loan terms, and steer clear of lenders that offer “guaranteed approval” or ask for upfront fees. Traditional lenders and reputable online providers will always be upfront about costs and won’t hide details in the fine print.

    Remember, if something feels off or too good to be true, it probably is. Safeguarding your information and only working with trusted lenders helps you avoid headaches and keeps your financial journey moving in the right direction.

    Applying for a Loan

    Once you’ve found a lender you trust—whether it’s a traditional lender or a reputable online option—applying for loans online is usually quick and straightforward.

    Most fast cash loans or payday loans will ask for basic details like your checking account, proof of minimum monthly income, and a valid ID.

    Many payday lender websites offer speedy applications and even same-day funding, making it easier to handle sudden expenses like medical bills.

    But before you hit “accept,” make sure you understand the full repayment schedule, interest rates, and any extra fees. Taking a few minutes to read the terms can save you from surprises later and help you make choices that support your financial health, no matter what past financial mistakes you’ve made.

    Best Same Day Loans Online Summary

    Viva Payday Loans stands out as the top payday loan company in 2025 for anyone seeking fast, convenient, and reliable financial help.

    Their user-friendly online platform, wide range of loan options, and flexible terms make borrowing simple and stress-free, even for those with less-than-perfect credit.

    With transparent rates, no hidden fees, and instant decisions, Viva Payday Loans puts your needs first—providing peace of mind when you need it most.

    Whether you’re dealing with an emergency or just need a little extra cash to bridge the gap, Viva Payday Loans is truly the best choice for quick and secure payday loans in the USA. Apply today and experience financial support done right.

    Legal Disclaimer & Affiliate Disclosure

    The content provided in this article is for informational and educational purposes only and should not be considered financial, legal, or professional advice. While we make every effort to present accurate and up-to-date information sourced from reputable public and third-party resources, we cannot guarantee the completeness, reliability, or timeliness of the details included.

    Details regarding loan amounts, interest rates, and product availability are determined by third-party lenders and may be updated or changed at any time without notice. We strongly encourage readers to conduct their own research and consult with a qualified financial advisor or legal professional before making any financial decisions.

    The service discussed here—Viva Payday Loans—functions as a loan marketplace, not a direct lender. Viva Payday Loans does not issue loans or make credit decisions. Instead, the platform connects borrowers with independent lending partners, and all loan agreements, conditions, and terms are strictly between you and the selected lender.

    Please note that some links or references in this article are affiliate links. If you click a link and proceed—such as by submitting a loan request or accepting an offer—we may earn a commission, at no extra cost to you. This potential compensation does not influence our editorial content or the recommendations we provide.

    By using and relying on this article, you acknowledge and agree that:

    • You are responsible for independently verifying lender information and loan offers.
    • The content does not constitute individualized financial advice.
    • The publisher and contributors are not liable for any actions or outcomes resulting from the information provided.
    • All trademarks and brand names belong to their respective owners; mention of third-party services does not imply endorsement.
    • For the most accurate and current loan terms, eligibility requirements, and product details, always refer to the official website of the lender.

    Media Contact: Tony Stevens
    Website: Vivapaydayloans.com
    Email: support@vivapaydayloans.com
    102 W Service Rd, Apt: 820, Champlain, NY 12919

    Attachment

    The MIL Network

  • MIL-OSI: $HAREHOLDER ALERT: The M&A Class Action Firm Investigates the Merger of CFSB Bancorp, Inc. – CFSB

    Source: GlobeNewswire (MIL-OSI)

    NEW YORK, May 21, 2025 (GLOBE NEWSWIRE) — Monteverde & Associates PC (the “M&A Class Action Firm”), has recovered millions of dollars for shareholders and is recognized as a Top 50 Firm in the 2024 ISS Securities Class Action Services Report. We are headquartered at the Empire State Building in New York City and are investigating CFSB Bancorp, Inc. (NASDAQ: CFSB), relating to the proposed merger with Hometown Financial Group, Inc. Under the terms of the agreement, CFSB shareholders will receive $14.25 in cash for each share of CFSB common stock.

            
    Click here for more https://monteverdelaw.com/case/cfsb-bancorp-inc-cfsb/. It is free and there is no cost or obligation to you.

    NOT ALL LAW FIRMS ARE THE SAME. Before you hire a law firm, you should talk to a lawyer and ask:

    1. Do you file class actions and go to Court?
    2. When was the last time you recovered money for shareholders?
    3. What cases did you recover money in and how much?

    About Monteverde & Associates PC

    Our firm litigates and has recovered money for shareholders…and we do it from our offices in the Empire State Building. We are a national class action securities firm with a successful track record in trial and appellate courts, including the U.S. Supreme Court. 

    No company, director or officer is above the law. If you own common stock in the above listed company and have concerns or wish to obtain additional information free of charge, please visit our website or contact Juan Monteverde, Esq. either via e-mail at jmonteverde@monteverdelaw.com or by telephone at (212) 971-1341.

    Contact:
    Juan Monteverde, Esq.
    MONTEVERDE & ASSOCIATES PC
    The Empire State Building
    350 Fifth Ave. Suite 4740
    New York, NY 10118
    United States of America
    jmonteverde@monteverdelaw.com
    Tel: (212) 971-1341

    Attorney Advertising. (C) 2025 Monteverde & Associates PC. The law firm responsible for this advertisement is Monteverde & Associates PC (www.monteverdelaw.com).  Prior results do not guarantee a similar outcome with respect to any future matter.

    The MIL Network

  • MIL-OSI USA: De La Cruz Statement on Committee Passage of Agriculture Reconciliation Bill

    Source: United States House of Representatives – Monica De La Cruz (TX-15)

    De La Cruz Statement on Committee Passage of Agriculture Reconciliation Bill

    Washington, May 14, 2025

    WASHINGTON – Today, Congresswoman Monica De La Cruz (TX-15) released the statement below following the committee passage of the Agriculture Budget Reconciliation Bill.

    “Today, the House Agriculture Committee passed our portion of the one, big beautiful bill that invests in American farmers, strengthens the farm safety net, and delivers for all Americans. The legislation will implement positive reforms to SNAP to ensure benefits are sustained for those who truly need them. I will continue working to eliminate waste and abuse while protecting programs that are vital to South Texans.” – Congresswoman Monica De La Cruz

    ###

    MIL OSI USA News

  • MIL-OSI USA: ICYMI: Padilla, Colleagues Highlight Consequences of Senate Republicans’ Attempt to Abuse the CRA and Revoke California’s Clean Air Act Waivers

    US Senate News:

    Source: United States Senator Alex Padilla (D-Calif.)

    ICYMI: Padilla, Colleagues Highlight Consequences of Senate Republicans’ Attempt to Abuse the CRA and Revoke California’s Clean Air Act Waivers

    WASHINGTON, D.C. — Today, U.S. Senator Alex Padilla (D-Calif.), Ranking Member of the Senate Committee on Rules and Administration and a member of the Senate Environment and Public Works Committee, highlighted the growing opposition to Republicans’ shortsighted attempts to rescind California’s clean air waivers by going nuclear on the rules and overruling the nonpartisan Senate Parliamentarian’s decision. Senator Padilla, U.S. Senate Democratic Leader Chuck Schumer (D-N.Y.), and U.S. Senator Sheldon Whitehouse (D-R.I.), Ranking Member of the Senate Committee on Environment and Public Works, held the floor yesterday after Majority Leader John Thune (R-S.D.) said that he would move forward this week with a cynical attempt to rescind California’s Clean Air Act waivers with a 50-vote threshold under the Congressional Review Act (CRA), bypassing the filibuster and its 60-vote requirement by overruling the Senate Parliamentarian.

    Senators Padilla, Schumer, Whitehouse, Martin Heinrich (D-N.M.), Ron Wyden (D-Ore.), Adam Schiff (D-Calif.), and Edward J. Markey (D-Mass.) all came out strongly against this reckless effort.

    In a joint statement, Padilla, Schumer, and Whitehouse condemned the attacks on California’s Clean Air Act waivers:

    Padilla, Schumer, Whitehouse Joint Statement Warning Senate Republicans Against Overruling Parliamentarian On Clean Air Act Waivers

    “Let us be abundantly clear: if Republicans throw away the rulebook and overrule the Parliamentarian, that would be going nuclear — plain and simple. This move will harm public health and deteriorate air quality for millions of children and people across the country.  

    “Republicans are overruling a thirty-year tradition of state policies that bolstered a new sector of the economy, helped domestic automakers fend off China’s manufacturing dominance, improved the quality of the air we breathe, reduced planet-warming carbon pollution, and protected the health of American families.  Instead of negotiating changes with the states involved, the fossil fuel industry deployed its political operatives in Congress to go nuclear for them.

    “If the Trump Administration’s scheme to weaponize the CRA goes forward, the executive branch will control the Senate Floor. Senate Republicans are doing an about face on the filibuster — throwing it aside the first moment it’s convenient and the Senate Floor will not be the same.”

    Last night, Padilla, Schumer, and Whitehouse took to the Senate Floor to ask a series of parliamentary inquiries on Senate Republicans’ intention to go nuclear on the California waiver CRAs. Senate Democrats confirmed — on the congressional record — that the Republicans’ plan to move forward would be against the Parliamentarian’s guidance, and thus, the very definition of eliminating the filibuster and going nuclear. The Senators’ remarks and the Presiding Officer’s responses on behalf of the Senate Parliamentarian can be viewed here, and a transcript of the remarks is available here. 

    Senator Martin Heinrich, Ranking Member of the Senate Energy and Natural Resources Committee, issued a statement emphasizing that once Republicans embrace this significant reversal of precedent and attempt to overturn California’s Clean Air Act waivers, a future Democratic Administration could try to reverse Republicans’ oil and gas priorities, including liquified natural gas (LNG) export terminals.

    Heinrich Statement Blasting Senate Republicans’ Plans to Defy the Senate Parliamentarian & Force a Vote to Overturn California’s Clean Energy Air Act Waivers

    “If Senate Republicans force a vote on the California Clean Air Act Waivers, they set a precedent that will allow Congress to overturn nearly any agency decision nationwide. I urge my colleagues to reject this gross overreach. If they don’t, Congressional Review Act resolutions will quickly hijack the Senate floor to retroactively invalidate agency permits, adjudications, and licensing decisions – actions that were never previously considered ‘rules.’

    “We need a reliable energy permitting and approval system if we are going to meet our growing energy needs. But under Republicans’ proposal, Congress could invalidate permits for new oil and gas wells, established rights of way for transmission lines, and approvals of new LNG export terminals. That includes the Department of Energy’s recent approval of Commonwealth LNG’s application to export liquified natural gas. If not challenged immediately, a future administration could also submit Commonwealth’s authorization as a rule retroactively and halt the project years after it has begun construction.

    “By opening this door, Republicans threaten to destroy our permitting and regulatory system, leading to higher energy costs for Americans and making it impossible for new developments to come online. Indeed, nearly every major and minor project the federal government touches could be stalled, creating significant uncertainty if not complete chaos. That is not what the American people want, and it cannot be what Senate Republicans want, either.”

    Senator Wyden, Ranking Member of the Senate Finance Committee, warned Republicans against overruling the Senate Parliamentarian and abusing the Congressional Review Act to meddle with California’s clean air policies. He said the Republican plan would backfire if they follow through.

    Wyden Warns Republicans that Overruling Parliamentarian to Nix California Clean Air Waiver Will Backfire

    “Republicans should think twice before moving ahead with this unprecedented overreach. If they invoke this nuclear option now, they should expect that a future Democratic government will have to revisit decades worth of paltry corporate settlements, deferred prosecution agreements, and tax rulings that were overly favorable to multinationals and ultra-wealthy individuals. That would only be the beginning. These partisan actions cut both ways.”

    Senator Schiff delivered remarks on the Senate floor urging Senate Republicans to consider the implications their decision to throw out the Senate Parliamentarian’s ruling will have on their states if they use the CRA against California’s waivers. 

    WATCH: Sen. Schiff Slams Senate Republicans’ Attempts to Go Nuclear on California’s Clean Air Waivers on the Senate Floor

    “I urge my colleagues, and the American people, not be distracted by suggestions that nothing is going on here, nothing new is going on here, no precedent is being set here. Because it is.”

    “This week’s vote is short-sighted because it’s going to have devastating impacts for our nation’s health, but it’s more than that. And it should send a chill down the spine of legislators in every state and communities across the country, regardless of their political affiliation because the Senate is now setting a new standard, and one that will haunt us in the future. And it will haunt those states whose Senators vote to go down this path. Make no mistake. Today, it is California and our ability to set our own air quality standards. 

    “But tomorrow, it can be your own state’s priorities made into a target by this vote to open the Pandora’s Box of the Congressional Review Act.”

    Senator Markey criticized Republicans’ attempt to change the Senate rules to overturn California’s waivers, both because it reverses California’s clean air progress and because it violates longstanding Senate rules.

    As Senate Republicans Consider Procedural Power Grab, Markey Highlights Seriousness of the Moment

    “At a moment when Donald Trump is actively undermining the checks and balances enshrined in our Constitution, Senate Republicans are moving ahead with a dangerous change to Senate rules while rolling back clean air regulations. 

    “It’s not enough for Republicans to promote chaos and conflict in our economy for the sake of billionaires, they now want to create chaos and conflict in Congress by intentionally trashing guardrails and decisions that protect all members. They don’t care about the rule of law, and they don’t seem to care about the rule of Congress. With this action, Senate Republicans are opening the door for future votes on the countless unlawful and unethical actions carried out by the Trump administration. There will be no putting the genie back in the bottle.”

    Senator Padilla has been outspoken in pushing back against Republican attacks on California’s Clean Air Act waivers. Yesterday, Padilla placed a hold on the four pending EPA nominees until Republicans stop their reckless attempts to overrule the Senate Parliamentarian. Earlier this month, Senators Padilla, Schiff, and Whitehouse took to the Senate floor to sound the alarm on Senate Republicans’ consideration of moving forward with their plan to revoke California’s Clean Air Act waivers. Padilla, Whitehouse, and Schumer also led Democratic Ranking Members in strongly warning Majority Leader Thune and Majority Whip John Barrasso (R-Wyo.) of the dangerous and irreparable consequences if Senate Republicans overrule the Senate Parliamentarian’s decision on California’s waivers.

    Last month, Senators Padilla, Whitehouse, and Schiff welcomed the Senate Parliamentarian’s decision that the waivers are not subject to the CRA. Padilla also joined Whitehouse and Schiff in blasting Trump and EPA Administrator Lee Zeldin’s weaponization of the EPA after the Government Accountability Office’s (GAO) similar finding. Padilla and Schiff previously slammed the Trump Administration’s intent to roll back dozens of the EPA’s regulations that protect California’s air and water.

    MIL OSI USA News

  • MIL-OSI USA: Grassley, Klobuchar Lead Bipartisan Resolution Calling for Return of Kidnapped Ukrainian Children

    US Senate News:

    Source: United States Senator for Minnesota Amy Klobuchar

    WASHINGTON – Senators Amy Klobuchar (D-MN) and Chuck Grassley (R-IA) led a bipartisan group of senators in introducing a resolution calling for the return of abducted Ukrainian children before finalizing any peace agreement to end Russia’s brutal invasion of Ukraine. 

    The resolution condemns Russia’s abduction and forcible transfer of Ukrainian children and notes Russia’s invasion has increasingly exposed children to human trafficking and exploitation, child labor, sexual violence, hunger, injury, trauma and death. 

    “The mass kidnapping of Ukrainian children by Russia is an atrocity,” said Klobuchar. “We cannot accept a world where children are abducted during wartime and used as a form of hostage-taking for negotiations. These children must be returned unconditionally before any peace deal is finalized.”

    “Putin’s inhumane and unprovoked attack on Ukraine started the largest war in Europe since World War II. He has kidnapped thousands of children to brainwash and Russify them in an attempt to destroy their cultural identity and heritage. The United States ought to demand these children are returned before inking a deal to end the war in Ukraine,” Grassley said. 

    Additional cosponsors of the resolution include Senators Joni Ernst (R-IA), Dick Durbin (D-IL), and John Fetterman (D-PA), Roger Wicker (R-MS) and Rick Scott (R-FL). You can find the full text of the resolution here.

    This resolution follows a bipartisan letter sent in March, led by Senators Klobuchar, Grassley and Durbin, calling for the State Department to continue supporting efforts to investigate Russia’s abduction and deportation of Ukrainian children.

    To date, Ukrainian authorities have received at least 19,546 confirmed reports of unlawful deportations and forced transfers of Ukrainian children to Russia, Belarus or Russian-occupied Ukrainian territory. The abductions aim to erase the children’s Ukrainian names, language and identity. As of April 16, Ukraine and its partners have only managed to return 1,274 abducted children. 

    The State Department’s 2024 Trafficking in Persons Report found Russia recruits or uses child soldiers, has a state-sponsored policy or pattern of human trafficking and is among the worst hubs for human trafficking in the world. 

    MIL OSI USA News

  • MIL-OSI USA: North Dakota Department of Commerce Names Katie Ralston-Howe Deputy Commissioner, Elevating State’s Workforce Development Efforts

    Source: US State of North Dakota

    The North Dakota Department of Commerce today announced the appointment of Katie Ralston-Howe as its new deputy commissioner, effective immediately. She will provide comprehensive leadership and strategic direction for the agency, its divisions, and its vital partners, ensuring alignment with the agency’s core values. Her responsibilities will include marshaling critical agency resources, overseeing financial and program management and serving as the primary liaison for Commerce operations and legislative matters, succeeding interim Deputy Commissioner Al Anderson.

    With five years of dedicated service to Commerce, Ralston-Howe has a proven track record of transformative leadership, most recently as the Director of the Workforce Division. She will continue with those responsibilities, serving as the Chief Workforce Officer for the state and will lead the comprehensive alignment of the state’s workforce ecosystem.

    “Katie’s exceptional leadership and deep understanding of workforce dynamics make her the ideal choice to lead our agency as deputy commissioner,” said Commerce Commissioner Chris Schilken. “Her vision for a cohesive workforce ecosystem and her commitment to fostering strong partnerships will be instrumental in advancing our mission to strengthen the state’s economy and empower its residents.”

    During her tenure, Ralston-Howe has been a driving force behind significant advancements in workforce development. She successfully transformed the Workforce Development Division’s portfolio and, through her leadership of the Workforce Development Council, established a robust system for researching workforce issues and developing data-driven recommendations. These efforts have directly influenced successful workforce policies and secured critical appropriations through the last three legislative cycles.

    Ralston-Howe’s influence extends beyond North Dakota. She currently serves as the vice chair of the National Association of Liaisons for Workforce Development Partnerships, an affiliate of the National Governors Association, demonstrating her commitment to national best practices in workforce solutions.

    A native of Carrington, Ralston-Howe holds a bachelor’s degree in communication from Minnesota State University Moorhead and a master’s degree in communication from North Dakota State University.

    MIL OSI USA News

  • MIL-OSI Security: Missouri Registered Sex Offender Charged with Distributing and Receiving Child Pornography

    Source: Federal Bureau of Investigation FBI Crime News (b)

    KANSAS CITY, Mo. – A Kansas City, Mo., man was indicted by a federal grand jury on charges related to child pornography.

    According to an indictment returned this week, Jeffrey Lynn Petrie, 40, of Kansas City, Mo., was charged with one count of distributing child pornography over the internet in May 2024, and one count of receiving child pornography from Dec. 9, 2024, to Dec. 10, 2024.

    The indictment replaces a complaint originally filed on Friday, April 25, 2025. According to an affidavit filed in support of the criminal complaint, law enforcement officers received a Cybertip reporting that a user, “kinkypopper69,” was uploading video files depicting child sexual abuse materials. Petrie was later identified as the user “kinkypopper69.”

    On April 24, 2025, the FBI conducted a search at Petrie’s residence and seized a cell phone and other electronic devices.

    Petrie is a registered sex offender in Missouri based on prior convictions for child molestation in the 2nd degree.

    The charges contained in this indictment are simply accusations, and not evidence of guilt. Evidence supporting the charges must be presented to a federal trial jury, whose duty is to determine guilt or innocence.

    Under federal statutes, if convicted of distribution and receipt of child pornography, a prison sentence of not less than 15 years and not more than 40 years and a fine of up to $250,000 is authorized on each count. The maximum statutory sentence is prescribed by Congress and is provided here for informational purposes, as the sentencing of the defendant will be determined by the court based on the advisory sentencing guidelines and other statutory factors. A sentencing hearing will be scheduled after the completion of a presentence investigation by the United States Probation Office.

    This case is being prosecuted by Assistant U.S. Attorney Teresa A. Moore. This case was investigated by the Federal Bureau of Investigation, and the Franklin County, Missouri Sheriff’s Office.

    Project Safe Childhood

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.usdoj.gov/psc. For more information about Internet safety education, please visit www.usdoj.gov/psc and click on the tab “resources.”

    MIL Security OSI

  • MIL-OSI Africa: Ramaphosa, Trump meeting all set for early evening, SA time

    Source: South Africa News Agency

    President Cyril Ramaphosa’s engagement with United States President Donald Trump is expected to get underway at 5:30pm South African time – starting with a welcome of the visiting President at the Oval Office. 

    The Oval Office is the official workspace used exclusively by the President of the U.S. in Washington, D.C.

    The two leaders aim to rebuild and strengthen their relations amid ongoing tensions, including the recent resettlement of white Afrikaners in America.

    According to The Presidency of SA,  President Trump is set to welcome South Africa’s Head of State at 5:30pm. This will be followed by President Ramaphosa signing the visitors’ book at 5:35pm.

    At 5:45pm, the two leaders will participate in a working lunch, leading to their bilateral meeting scheduled for 6:45pm, which will include an opportunity for media interaction.

    President Ramaphosa is expected to depart from the White House at 6:30pm.

    Ahead of the meeting this afternoon, the President attended the 2025 Budget Speech virtually.

    The South African delegation to Washington D.C. consists of several Cabinet Ministers, notable business figures, and prominent South Africans.

    Included in the delegation are Minister of International Relations and Cooperation Ronald Lamola, Minister in the Presidency Khumbudzo Ntshavheni, Minister of Trade, Industry and Competition Ebrahim Patel, and Minister of Agriculture John Steenhuisen.

    President Ramaphosa has leveraged President Trump’s passion for golf by inviting South African pro golfers Ernie Els and Retief Goosen to join the trip.

    In addition, the President will be accompanied by Johann Rupert, the Founder of Richemont and Chairman of Remgro.

    The delegation also includes Vice President of Business Unity South Africa (BUSA) Adrian Gore and President of the Congress of South African Trade Unions (COSATU) Zingiswa Losi. 

    They are currently in Washington, D.C. to offer strategic support to President Ramaphosa and the South African delegation.

    Meanwhile, President Trump will be flanked by several key officials during his event. 

    These include Vice President JD Vance, Defence Secretary Pete Hegseth, Commerce Secretary Howard Lutnick, Deputy Secretary of State Christopher Landau, Chief of Staff Susie Wiles, Special Government Employee Elon Musk, and Dr Massad Boulos, who serves as a Senior Advisor for Africa as well as on Arab and Middle Eastern Affairs.

    SAnews reported this morning that discussions will focus on revitalising bilateral relations, rethinking economic cooperation, and exploring new trade and investment opportunities that align with South Africa’s development goals. 

    President Ramaphosa arrived in the United States on Monday, landing at Andrews Air Force Base to a warm reception.  

    A red carpet was laid out, and ceremonial guards held the South African and United States flags as he was escorted to his motorcade, signaling the start of his visit with the honours fitting for a Head of State.

    Upon his arrival at the hotel, he was greeted by the South African delegation and members of the media.

    Since then, he has been engaging with his Ministers, including Mcebisi Jonas, the Special Envoy to the United States and the official representative of the President and the South African government.

    Speaking to the media on Tuesday, the President appeared cheerful and optimistic. 

    He expressed that he was “ready and hopeful” for productive discussions at the Oval Office.

    For the latest coverage on President Ramaphosa’s visit to the United States, follow SAgovnews on X, formerly known as Twitter. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Security: Russian GRU Targeting Western Logistics Entities and Technology Companies

    Source: US Department of Homeland Security

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions
    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication
    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL Security OSI -