Category: Military Intelligence

  • MIL-OSI USA: ICYMI: Fox News Opinion: “JD Vance and Trump personify political theater. And we’re watching their biggest act yet”

    US Senate News:

    Source: United States Senator Alex Padilla (D-Calif.)

    ICYMI: Fox News Opinion: “JD Vance and Trump personify political theater. And we’re watching their biggest act yet”

    Fox News Op-Ed

    Padilla: “The Trump administration wants this spectacle. They want to distract from their failures, while giving them an excuse to push the boundaries of Trump’s power.”

    WASHINGTON, D.C. — In case you missed it, U.S. Senator Alex Padilla (D-Calif.), Ranking Member of the Senate Judiciary Immigration Subcommittee, published an op-ed on Fox News’ website where he slammed President Trump and Vice President Vance for creating a militarized spectacle and scapegoating immigrants to distract from their failed and unpopular policies, including their “Big Ugly Bill” that will add trillions to the federal deficit and kick tens of millions of Americans off their health care in order to fund tax cuts for billionaires.

    Padilla emphasized that Trump’s deployment of 4,000 National Guard troops and 700 Marines draws them away from important core missions and puts them in an “impossible position” of being “political props.” He also warned about how Trump’s manufactured crisis in Los Angeles sets a dangerous precedent for presidents abusing the military for their own partisan goals, causing chaos to suppress Americans’ fundamental rights.

    Key Excerpts:

    • “Last month, Vice President JD Vance visited Los Angeles. No, not to better coordinate with local law enforcement frustrated after the dangerous lack of communication coming from the Trump administration as they keep Marines and National Guardsmen in Los Angeles. Instead, the vice president came to escalate a crisis of President Trump’s own making and to disparage California’s elected officials.
    • “The vice president, my former colleague and the current president of the U.S. Senate intentionally chose to call me ‘Jose’ instead of ‘Alex.’ He knows my name. But sadly, his behavior in June is indicative of a larger trend from this administration. In 2025, there is no one who personifies political theater better than JD Vance and Donald Trump. In fact, we’re in the middle of their biggest act yet — as they use service members and federal law enforcement in Los Angeles as props to justify their latest power grab. None of this is new.”
    • “It was no coincidence that at the lowest point of his presidency yet, Donald Trump turned to his break-glass-in-case-of-emergency option, federalizing and deploying 4,000 National Guard troops to Los Angeles along with hundreds of Marines. The Trump administration wants this spectacle. They want to distract from their failures, while giving them an excuse to push the boundaries of Trump’s power.
    • “This isn’t just about how the Trump administration treats blue states or immigrants. It’s about how they treat our military, too. Anyone who applauds President Trump’s militarization of Los Angeles is also applauding a politician tearing away our service members from critical missions any time the president begins to feel some political pressure. And applauding putting every Guardsman and Marine in an impossible position. No one enlists to become a political prop.
    • “While you might not care to speak up today, imagine if a Democratic president returns to office and chooses to deploy our military to your state. It doesn’t matter that the overwhelming majority of protestors remain peaceful — one bad actor who chooses to exploit a protest to cause chaos, and the president could militarize your community, too.”
    • “In the end, this doesn’t come down to Republican versus Democrat, or Trump and Vance versus Los Angeles. It comes down to the basic question: do you believe that in America, an attack on anyone’s rights is an attack on everyone’s rights? Or, if you’re like J.D. Vance, are you just here for the show?

    Senator Padilla has been outspoken in calling out the Immigration and Customs Enforcement (ICE) raids in Los Angeles and Trump’s misguided deployment of the National Guard and U.S. Marine Corps. Padilla recently led the entire Senate Democratic Caucus in demanding that President Trump immediately withdraw all military forces from Los Angeles and cease all threats to deploy the National Guard or active-duty servicemembers to American cities. He and Senator Adam Schiff (D-Calif.) also demanded answers regarding the Trump Administration’s decision to deploy approximately 700 Marines to Los Angeles. Padilla has spoken at a spotlight hearing and on the Senate floor multiple times to blast President Trump for manufacturing a crisis by launching indiscriminate ICE raids across Los Angeles and deploying the National Guard and active-duty servicemembers to the region. He also joined all Senate Judiciary Committee Democrats last month in calling on Chairman Grassley to schedule Department of Homeland Security Secretary Noem for a broad oversight hearing for testimony before the committee.

    Full text of Senator Padilla’s Fox News op-ed is available here and below:

    Fox News Digital: Sen Alex Padilla: JD Vance and Trump personify political theater. And we’re watching their biggest act yet

    By U.S. Senator Alex Padilla

    Last month, Vice President JD Vance visited Los Angeles.

    No, not to better coordinate with local law enforcement frustrated after the dangerous lack of communication coming from the Trump administration as they keep Marines and National Guardsmen in Los Angeles.

    Instead, the vice president came to escalate a crisis of President Trump’s own making and to disparage California’s elected officials.

    How else would you describe the vice president’s conduct, when three days after Los Angeles Mayor Karen Bass lifted the curfew downtown and protests were dissipating, he staged a press conference to attack state and local leaders, falsely claiming they had ‘decided to go to war against’ law enforcement.

    That’s a far cry from lowering the political temperature. But for this administration, it’s standard operating procedure.

    Yet, one thing the vice president said did surprise me. It came when one of his handpicked reporters lobbed yet another softball question, asking for his comment on the string of Democratic lawmakers — myself included — that the Trump administration has handcuffed for speaking out.

    ‘Well, I was hoping Jose Padilla would be here to ask a question, but unfortunately I guess he decided not to show up because there wasn’t the theater,’ he said, smirking. ‘That’s what this is: it’s pure political theater.’

    Political theater. Huh.

    The vice president, my former colleague and the current president of the U.S. Senate intentionally chose to call me ‘Jose’ instead of ‘Alex.’ He knows my name. But sadly, his behavior in June is indicative of a larger trend from this administration.

    In 2025, there is no one who personifies political theater better than JD Vance and Donald Trump. In fact, we’re in the middle of their biggest act yet — as they use service members and federal law enforcement in Los Angeles as props to justify their latest power grab.

    None of this is new.

    Time and time again, when the Trump administration finds itself in hot water, it returns to the same tired playbook: pick a fight to distract people. Scapegoat immigrants. Threaten the use of force. Do whatever you can to create a spectacle and change the news cycle. And as it turns out, just a few short weeks ago, things were going terribly wrong for Donald Trump.

    He was facing failures on nearly every front: failing to bring prices down or to secure a wave of trade deals despite his trade adviser’s promise to secure “90 deals in 90 days” Failing to quickly pass his “Big, Beautiful Bill” as allies and adversaries alike began to warn of the trillions of dollars it would add to the federal deficit. And perhaps most embarrassing of all, he was facing a messy public break-up with Elon Musk.

    So no, it was no coincidence that at the lowest point of his presidency yet, Donald Trump turned to his break-glass-in-case-of-emergency option, federalizing and deploying 4,000 National Guard troops to Los Angeles along with hundreds of Marines.

    The Trump administration wants this spectacle. They want to distract from their failures, while giving them an excuse to push the boundaries of Trump’s power.

    But this isn’t just about how the Trump administration treats blue states or immigrants. It’s about how they treat our military, too. Anyone who applauds President Trump’s militarization of Los Angeles is also applauding a politician tearing away our service members from critical missions any time the president begins to feel some political pressure. And applauding putting every Guardsman and Marine in an impossible position.

    No one enlists to become a political prop.

    But to Americans watching from home who still think this doesn’t concern them because they’re not a Californian, not an immigrant, not a Democrat, or not from a military family: think hard about what comes next.

    The Trump administration has argued the president alone can deploy the military to put down protests over the wishes of the governor. Of the mayor. Even of local law enforcement.

    While you might not care to speak up today, imagine if a Democratic president returns to office and chooses to deploy our military to your state. It doesn’t matter that the overwhelming majority of protestors remain peaceful — one bad actor who chooses to exploit a protest to cause chaos, and the president could militarize your community, too.

    In the end, this doesn’t come down to Republican versus Democrat, or Trump and Vance versus Los Angeles. It comes down to the basic question: do you believe that in America, an attack on anyone’s rights is an attack on everyone’s rights?

    Or, if you’re like J.D. Vance, are you just here for the show?

    MIL OSI USA News

  • MIL-OSI Africa: Jobs boost as the United Kingdom (UK) and Kenya bolster economic and security partnership


    Download logo

    • Trade and investment deals agreed during the visit will contribute over £1bn to the UK economy and create UK jobs in engineering, defence industries, technical and advisory services, and financial services 
    • The UK and Kenya will also increase collaboration to tackle organised crime, human trafficking and illicit finance through the UK-Kenya Security Compact 
    • The UK and Kenya will commit to a new Strategic Partnership as Kenyan President Ruto visits London

    The UK and Kenya will commit to working together to drive economic growth, protect climate and nature, foster collaboration in science and technology and strengthen regional security. 

    During a visit to the UK by the President of Kenya, a pipeline of trade and investment deals worth over £1bn to the UK economy were agreed which will deliver on this government’s commitment to boost jobs and prosperity back in the UK, as part of the government’s Plan for Change. 

    This includes the launch of a tender for a major urban redevelopment project in Nairobi which has been inspired by the regeneration of London’s Kings Cross.

    The Nairobi Railway City project has already provided opportunities to UK businesses with British architecture firm Atkins UK chosen to design the central rail station and public square.

    The Government of Kenya is exploring funding the project through finance mobilised by the UK’s Export Credit Agency, UK Export Finance, which will create UK jobs in engineering, technical and legal services. 

    Both countries also agreed stronger cooperation to disrupt the air, land and sea routes used by organised crime groups to prevent illegal migrants transiting through Kenya in attempts to reach Libya and other countries before travelling on to Europe. Four of the top ten countries for Small Boat arrivals in the UK are near neighbours of Kenya (Eritrea, Sudan, Somalia and Ethiopia).

    Foreign Secretary, David Lammy, said:

    “Through our shared history and values the UK and Kenya have always had a close connection.”

    “Now we are building a shared future; a modern, innovative and respectful partnership which is delivering real benefits – boosting growth and creating jobs for both Kenyans and the British people. We’re going far, together.”

    The UK and Kenya have also committed to increased defence and counter terrorism collaboration, including joint training and the creation of a new counter insurgency, terrorism and stability operations centre.

    Defence sales worth over £70m were agreed during the visit supporting manufacturing jobs in County Durham, Northamptonshire and Surrey. Kenya hosts the UK’s most significant military footprint in Africa, including a facility that trains 3,000 UK troops a year. 

    The UK’s world leading financial services sector will also benefit; Lloyd’s of London will announce today that they will be joining the Nairobi International Finance Centre, which will deepen the partnership between two leading financial centres providing access to up to £500m of insurance market potential in Kenya and the East Africa region. 

    The two countries also committed to explore the potential of a bilateral digital trade agreement. Dubbed ‘Silicon Savannah’, the value of Kenya’s tech sector is projected to reach £11.5bn by 2032.

    A digital trade agreement will open up opportunities in the sector for UK Plc.

    Distributed by APO Group on behalf of United Kingdom Foreign, Commonwealth and Development Office.

    MIL OSI Africa

  • MIL-OSI USA: Coalition moves for injunction stopping Trump administration’s actions to dismantle the Department of Education

    Source: US National Education Union

    Washington, D.C. — Today, in the case of NAACP v. US, the coalition of plaintiffs and supporters are moving for a preliminary injunction preventing Linda McMahon and the Trump administration from continuing their unlawful actions to dismantle the Department of Education.   

    Those actions include the Department’s announcement yesterday that it planned to withhold nearly $6.8 billion in appropriated education formula funding from states, almost all of which supports students through their local school districts. That illegal decision, like the other steps this administration has taken to shut down the Department, is unlawful and will harm students and families across the country. 

    The case was brought in March by the National Association for the Advancement of Colored People (NAACP), public school parents, the National Education Association (NEA), and AFSCME Maryland Council 3. They are supported by Student Defense and Education Law Center (ELC). Today’s filing asks the Court to block multiple unlawful actions the administration has taken that harm students, schools and communities across the country. Those actions include:   

    • Terminating grants that support the recruitment and retention of teachers and other education professionals in high needs schools and school districts by way of the elimination, without Congressional approval, of the Teacher Quality Partnership, Supporting Effective Educator Development (SEED), and School-Based Mental Health Services Grant Programs, among many others. These programs supported students and educators and met critical needs in schools across the country. They have now been unlawfully shut down.   
       
    • Eliminating the Department’s capacity to award the correct amounts of federal formula grant aid to high needs schools and districts through the ESEA Title I programs, the rural school supports program under REAP, and other critical federal education programs in future school years. Defendants’ abolition of the Institute of Education Sciences and other critical Department offices leaves the Department unable to produce the data inputs and carry out other functions necessary to accurately calculate schools’ and districts’ federal funding awards after this year.
       
    • Gutting the vendor oversight and institutional accountability functions in the Office of Federal Student Aid, which had exercised the critical oversight necessary to make Congressionally mandated student loan forgiveness programs, like the Public Service Loan Forgiveness program, work and which certified schools’ eligibility to participate in federal student financial aid programs by ensuring that college and universities actually provide the services that they advertise.
       
    • Shuttering seven of the twelve regional enforcement offices of the Office for Civil Rights, terminating over half that Office’s investigative workforce, and doubling and even tripling the caseloads of the remaining investigators so as to effectively eliminate OCR’s ability to timely respond to, and remedy, civil rights complaints filed by students, parents, and educators.   

    Today’s filing is supported by record evidence in excess of 1,000 pages, including over 60 individual declarations in support of the plaintiffs’ claims and in opposition to the devastation wrought by the defendants. Declarants include Former Secretaries of Education Miguel Cardona and John King, Former Assistant Secretary for Civil Rights Catherine Lhamon, former Institute for Education Sciences Director John Easton, and many more. In addition, school communities and districts are in support of the motion, including the Lemon Grove School District in CA.  

    The motion seeks a remedy for the serious harm that the Trump Administration has inflicted on students, educators, schools, and colleges and universities, and asks the Court to direct the Department to fulfill its statutory obligations to students nationwide. 

    # # 

    About the National Education Association 

    The National Education Association is the nation’s largest professional employee organization, representing more than 3 million elementary and secondary teachers, higher education faculty, education support professionals, school administrators, retired educators, students preparing to become teachers, healthcare workers, and public employees. Learn more at www.nea.org  

    About the NAACP 

    The NAACP advocates, agitates, and litigates for the civil rights due to Black America. Our legacy is built on the foundation of grassroots activism by the biggest civil rights pioneers of the 20th century and is sustained by 21st century activists. From classrooms and courtrooms to city halls and Congress, our network of members across the country works to secure the social and political power that will end race-based discrimination. That work is rooted in racial equity, civic engagement, and supportive policies and institutions for all marginalized people. We are committed to a world without racism where Black people enjoy equitable opportunities in thriving communities. NOTE: The Legal Defense Fund – also referred to as the NAACP-LDF – was founded in 1940 as a part of the NAACP, but now operates as a completely separate entity. 

    About AFSCME Maryland Council 3 
    AFSCME Maryland Council 3 represents more than 50,000 public service workers in local, city, county and state government as well as in higher education and the private sector who provide the valuable public services that our communities rely on. From Western Maryland to the Eastern Shore, we make Maryland happen. 

    About Education Law Center 

    Education Law Center pursues justice and equity for public school students by enforcing their right to a high-quality education in safe, equitable, non-discriminatory, integrated, and well funded learning environments. We seek to support and improve public schools as the center of communities and the foundation of a multicultural and multiracial democratic society. To achieve these goals, we engage in litigation, research and data analysis, policy advocacy, communications, and strategic partnerships and collaborations. https://edlawcenter.org/ 

    About Student Defense 

    The National Student Legal Defense Network (“Student Defense”) is a non-profit organization that works, through litigation and advocacy, to advance students’ rights to educational opportunity and to ensure that higher education provides a launching point for economic mobility. 

    MIL OSI USA News

  • MIL-OSI Russia: Missile fired from Yemen intercepted over Israel – Israeli army

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    JERUSALEM, July 1 (Xinhua) — Yemen’s Houthi rebel forces fired a rocket toward Israel on Tuesday evening, triggering air raid sirens in central and southern parts of the country before the projectile was intercepted, the Israeli army said in a statement.

    “The missile, launched from Yemeni territory, was intercepted by the Israeli Air Force,” the military said, adding that alarm sirens were activated.

    There are no reports of casualties.

    The Houthis regularly attack Israel with missiles and drones, citing solidarity with Palestinians in Gaza. The rebel group says it will stop its attacks if Israel ends its offensive in the Palestinian enclave and lifts its blockade. In response, the Jewish state has launched massive airstrikes in Yemen, hitting key ports, an airport and other infrastructure. –0–

    MIL OSI Russia News

  • MIL-OSI Security: Defense News in Brief: Department of Navy Top Scientists, Engineers Recognized for Excellence

    Source: United States Navy

    WASHINGTON, DC – The Department of the Navy recognized the finest in Navy and Marine Corps science and engineering June 25 at the Assistant Secretary of the Navy for Research, Development, and Acquisition (ASN RD&A) Dr. Delores M. Etter Top Scientists and Engineers awards ceremony. Dr. Brett A. Seidle, Acting ASN(RD&A) and Mr. Peter C. Reddy, Deputy Assistant Secretary of the Navy for Research, Development, Test, and Engineering (DASN(RDT&E)), personally recognized top scientists and engineers from across the Department of the Navy (DON) and highlighted their incredible accomplishments.

    MIL Security OSI

  • MIL-OSI USA: Senate Passes President Trump’s One Big Beautiful Bill Act, Advancing Agenda for a Strong, Prosperous America

    US Senate News:

    Source: United States Senator Kevin Cramer (R-ND)
    ***Click here for audio.***
    WASHINGTON, D.C. – The U.S. Senate voted today to pass the One Big Beautiful Bill Act (OBBBA) by a vote of 51 to 50. This legislation permanently extends the 2017 Trump tax cuts, accelerates American energy dominance, supports the nation’s farmers and ranchers, reduces federal spending, invests in generational defense capabilities such as President Donald Trump’s Golden Dome missile-defense shield, and delivers the largest single border-security investment in U.S. history.
    Within 10 years, OBBBA will cut the total deficit nearly in half and primary deficits will become surpluses. It builds upon the 2017 Trump tax cuts with incentives for investing in America to create new jobs and revive domestic manufacturing. The pro-growth policies are reflected in the recent Congressional Budget Office score indicating the legislation will reduce the deficit by $507 billion. The Council of Economic Advisors estimates it will slash the deficit by over $2 trillion over the next decade and lead to higher worker wages and increased GDP.
    U.S. Senator Kevin Cramer (R-ND) issued the following statement after voting in favor of the legislation:
    “What we did with this vote today is took a decisive step toward implementing President Trump’s agenda and restoring some fiscal sanity to Washington, D.C. which has been missing for several decades. It delivers on our promise as Republicans to extend pro-growth tax policy permanently, not just another extension, but make it permanent, and it gives much-needed certainty to American families, and businesses, and investment of all types. We are really aligning federal spending with North Dakota pragmatism, quite honestly. We’re slashing Green New Deal gimmicks, boosting reliable energy sources, delivering unprecedented resources to the border, which we know is in high demand, and then bringing defense efforts like the Golden Dome and nuclear modernization to complete fruition. It’s really a win for every American who believes prosperity, security, and fiscal responsibility all go hand in hand.”
    Prevents a $4 Trillion Tax Increase
    ***Click here for audio on OBBBA tax provisions***
    This legislation permanently extends the Tax Cuts and Jobs Act to provide relief for working Americans and job creators. Without this bill, Americans would receive a $4 trillion tax hike, the largest increase in American history. It supports families by expanding the standard deduction, which is utilized by more than 90% of taxpayers, and the Child Tax Credit, and making both improvements permanent.
    The OBBBA includes pro-growth provisions to support small businesses by preserving the small business deduction to support job creation and local economic growth. It also includes efforts to boost domestic production and investment, including full expensing for domestic research and development, and new capital investments. To support financing for domestic investments, the OBBBA reinstates a globally competitive interest deduction.
    Promotes Energy Dominance
    To promote American energy dominance, the legislation rapidly phases out tax credits for intermittent wind and solar projects while boosting reliable domestic energy sources like nuclear, geothermal, and hydropower. The OBBBA also improves the 45Q credit, a critical tool for North Dakota’s lignite coal and oil producers, by indexing the value of the credit to inflation and equalizing the rate for all users of the credit. It promotes oil and gas development by requiring the Bureau of Land Management to hold quarterly leases, reduces royalty rates to pre-Inflation Reduction Act (IRA) levels, ensures timely leasing of federal coal resources, pauses the IRA natural gas tax for a decade, and creates an opt-in program at the Council on Environmental Quality for expedited environmental reviews. Finally, the OBBBA repeals costly Biden-era green energy efforts including the electric vehicle tax credit, rescinds unobligated IRA funds, nixes the costly methane tax, and fully repeals the Greenhouse Gas Reduction Fund.
    Delivers the Largest Border Security Package in American History
    In the few months since President Trump’s return to the White House, illegal border crossings have dropped precipitously. The OBBBA provisions support these efforts and include funding for over 2,300 miles of border walls and barriers while also giving U.S. Border Patrol and U.S. Immigration and Customs Enforcement (ICE) resources to carry out the mission of protecting the border. This funding will allow ICE to hire additional officers and agents to patrol the border. The bill invests $46.55 billion to complete the Trump Wall and upgrade its barriers and intrusion sensors alongside $4.1 billion for hiring and training agents, officers, pilots, and support staff, as well as incentives to retain top talent. It ends the previous administration’s catch-and-release policy, deploys artificial intelligence (AI)-powered non-intrusive inspection systems, drones, counter-Unmanned Aerial Systems radar, and a nationwide biometric entry-exit network to stop fentanyl at the border.
    Curbs Immigration Abuse & Makes the System Pay for Itself
    The legislation flips the “everything is free” asylum pipeline on its head, imposing an inflation-indexed minimum $100 asylum-application fee that is split evenly between immigration courts and U.S. Citizenship and Immigration Services to attack the backlog without touching taxpayers. Aliens removed in absentia now face a $5,000 fee upon apprehension—half of which flows directly into ICE’s Detention & Removal Office Fee Account to fund beds and removals.
    Makes Long Overdue Improvements to the Farm Safety Net
    To address the absence of a new Farm Bill, the OBBBA supports farm country by raising reference prices for covered commodities under the Agriculture Risk Coverage (ARC) and Price Loss Coverage (PLC) programs. For crop year 2025, the U.S. Department of Agriculture will pay farmers the larger of ARC or PLC, regardless of which program they enrolled in for the year. It boosts premium support for the individual-based crop insurance and the Supplemental Coverage Option. The bill increases marketing assistance loan rates, improves disaster and animal disease prevention programs for livestock, and funds a supplemental agricultural trade promotion program. The OBBBA also modifies work requirements for Supplemental Nutrition Assistance Program eligibility and sets in place reforms to improve efficiency and management of the program. 
    Implements Commonsense Medicaid Reforms
    The bill reduces waste, fraud, and abuse in the Medicaid program and puts Medicaid on a fiscally sustainable path. It establishes sensible work requirements for able-bodied adults and provides exemptions for individuals with dependent children or medical needs. It increases the frequency of eligibility verifications and limits the use of financing gimmicks such as provider taxes to ensure Medicaid remains available for the most vulnerable into the future. The bill also establishes a rural health transformation fund to support critical rural hospitals and clinics across the country. 
    Invests in Generational Defense Capabilities
    President Trump’s Golden Dome initiative, unmanned ships, drones, AI and other recent investments in new defense technology in North Dakota and across the country, are included in the OBBBA. The legislation allocates $25 billion for the Golden Dome missile defense system and $210 million for MH-139 helicopters. Additionally, it provides $15 billion to accelerate nuclear modernization programs specifying $2.5 billion for the Sentinel intercontinental ballistic missile (ICBM) program and $600 million for the Minuteman III ICBM, both of which are housed in North Dakota. It also includes $90 million for APEX Accelerators and significant improvements in quality of life for troops and their families. 
    Modernizes Commerce & Transportation Infrastructure
    The OBBBA injects more than $34 billion into the arteries of American commerce—keeping goods, data, and people moving safely and on time. It fully recapitalizes the Coast Guard with $24.593 billion for new Offshore, Fast-Response, Polar, and Arctic cutters, long-range UAVs, autonomous surface vessels, and critical shore-facility upgrades. Another $12.57 billion modernizes the Federal Aviation Administration’s radars, telecom backbone, runway-safety tech, and controller displays to cut delays and boost air-travel safety nationwide. The bill restores the Federal Communications Commission’s auction authority through 2034 and directs the auction of mid-band spectrum within two years—part of a plan which ultimately reallocates 500 MHz for 5G/6G—and gives National Telecommunications and Information Administration the resources to value and relocate Federal users.
    Click here for bill text. Click here for one-pagers.

    MIL OSI USA News

  • MIL-OSI USA: Capito Votes to Pass Republican Reconciliation Bill

    US Senate News:

    Source: United States Senator for West Virginia Shelley Moore Capito
    WASHINGTON, D.C. – U.S. Senator Shelley Moore Capito (R-W.Va.), chairman of the Senate Republican Policy Committee (RPC), released the below statement following the passage of the Republican Reconciliation bill:
    “The Republican Reconciliation bill is a clear reflection of our priorities: securing our borders, rebuilding our military, preventing the largest tax increase in U.S. history, and unleashing American energy. I was proud to vote in favor of this commonsense legislation that not only delivers on the promises we’ve made to the American people, but will put West Virginia and our entire nation on a path to greater economic growth, national security, energy independence, and opportunity,” Senator Capito said.
    Senator Capito, who also chairs the Senate Environment and Public Works (EPW) Committee, led efforts to craft legislative text for the reconciliation bill within the EPW Committee’s jurisdiction. Click HERE for more details on this portion of the bill, including a one-pager, highlights, and a section-by-section.
    Additional West Virginia wins included in the legislation are below:
    Extends the Hydrogen Tax Credit (45V) until January 1, 2028, which will save Hydrogen Hubs across the country, including West Virginia’s ARCH2 project and the thousands of jobs that it will bring to West Virginia.
    Permanently restore 163j interest deductibility beginning after December 31, 2024, which will provide West Virginia’s small business owners the tools they need to compete, grow, and hire.
    Adds metallurgical coal as a critical mineral to 45x, which will have a significant impact on Southern West Virginia.
    Provides historic investments to strengthen America’s border security and immigration system, something that Senator Capito has long-championed during her time in the Senate, including during her many years as the top Republican on the Homeland Security Appropriations Subcommittee.
    Supports law enforcement officers by providing funding for training and equipment, hiring, and critical grant programs.
    Provides resources to help curb the opioid crisis, particularly the fight against fentanyl, by increasing funding to the U.S. Department of Justice to support efforts to combat deadly drug trafficking.
    Provides funding to the Federal Aviation Administration (FAA) for the acquisition, construction, sustainment, and improvement of air traffic control (ATC) facilities and equipment.
    Sustains safety net programs like Medicaid and SNAP over the long-term. Specifically, the legislation puts Medicaid back on a more fiscally stable trajectory for those who need it.
    Invests significant funding in a rural health transformation program to improve access to care and stabilize critical hospitals and other providers.
    Creates a relief fund for rural hospitals, helping to support their critical services and those they serve in rural communities like the many throughout West Virginia.
    Establishes investment accounts for newborns to secure financial futures for every American child from birth.
    Provides $25 billion to replenish and increase stockpiles of critical munitions, including many that have key components manufactured at sites like Allegany Ballistics Laboratory in Mineral County, W.Va.
    Provides $500 million to support the readiness of National Guard units.
    Provides $100 million to accelerate production of the MQ-25 Stingray unmanned refueling drone, of which key components are manufactured in Harrison County, W.Va.
    Provides $1 billion for U.S. Department of Defense (DoD) support to border security missions and counterdrug enforcement to protect West Virginians from drug trafficking and fentanyl.
    Provides $9 billion to support service members and their families, including improvements to housing, healthcare, child care, and education benefits.
    Enhances the Child and Dependent Care Tax Credit (CDCTC), a tax credit that helps working parents offset the cost of child care.
    Establishes workforce Pell, which will allow students across West Virginia to utilize the Pell Grant to obtain certificates and credentials through short term programs, something Senator Capito has long-advocated for.
    Improves the Employer-Provided Child Care Credit (45F), which supports businesses that want to help provide child care for their employees.
    Expands the Dependent Care Assistance Plans (DCAP), which are flexible spending accounts that allow working parents to set aside pre-tax dollars to pay for child care expenses.
    Invests in rural America by providing significant funding for competitive grants to assist in the construction, alteration, acquisition, modernization, renovation, or remodeling of agricultural research facilities under the Research Facilities Act—something that various institutions of higher education throughout West Virginia support.

    MIL OSI USA News

  • MIL-OSI USA: Ames Science Directorate’s Stars of the Month: July 2025

    Source: NASA

    The NASA Ames Science Directorate recognizes the outstanding contributions of (pictured left to right) Sigrid Reinsch, Lori Munar, Kevin Sims, and Matthew Fladeland. Their commitment to the NASA mission represents the entrepreneurial spirit, technical expertise, and collaborative disposition needed to explore this world and beyond.

    Space Biosciences Star: Sigrid Reinsch
    As Director of the SHINE (Space Health Impacts for the NASA Experience) program and Project Scientist for NBISC (NASA Biological Institutional Scientific Collection), Sigrid Reinsch is a high-performing scientist and outstanding mentor in the Space Biosciences Research Branch. Her dedication to student training and her efforts to streamline processes have significantly improved the experience of welcoming summer interns at NASA Ames.

    Space Science and Astrobiology Star: Lori Munar
    Lori Munar serves as the assistant Branch Chief of the Exobiology Branch. In the past few months, she has gone above and beyond to organize a facility and laboratory surplus event that involved multiple divisions over multiple days. The event resulted in considerable savings across the groups involved and improved the safety of N239 staff and the appearance of offices and labs.

    Space Science and Astrobiology Star: Kevin Sims
    Kevin Sims is a NASA Technical Project Manager serving the Astrophysics Branch as a member of the Flight Systems Implementation Branch in the Space Biosciences Division. Kevin is recognized for outstanding project management for exoplanet imaging instrumentation development in support of the Habitable Worlds Observatory. Kevin has streamlined, organized, and improved the efficiency of the Ames Photonics Testbed being developed as part the AstroPIC Early Career Initiative project.

    Earth Science Star: Matthew Fladeland
    Matthew Fladeland is a research scientist in the Earth Science Division managing NASA SMD’s Program Office for the Airborne Science Program, located at Ames. He is recognized for exemplary leadership and teamwork leading to new reimbursable agreements with the Department of Defense, for accelerating science technology solutions through the SBIR program, and for advancing partnerships with the US Forest Service on wildland ecology and fire science.

    MIL OSI USA News

  • MIL-OSI NGOs: GAZA: Starvation or Gunfire – This is Not a Humanitarian Response

    Source: Amnesty International –

    NGOs call for immediate action to end the deadly Israeli distribution scheme (including the so-called Gaza Humanitarian Foundation) in Gaza, revert to the existing UN-led coordination mechanisms, and lift the Israeli government’s blockade on aid and commercial supplies. The 400 aid distribution points operating during the temporary ceasefire across Gaza have now been replaced by just four military-controlled distribution sites, forcing two million people into overcrowded, militarized zones where they face daily gunfire and mass casualties while trying to access food and are denied other life-saving supplies.

    Today, Palestinians in Gaza face an impossible choice: starve or risk being shot while trying desperately to reach food to feed their families. The weeks following the launch of the Israeli distribution scheme have been some of the deadliest and most violent since October 2023. 

    In less than four weeks, more than 500 Palestinians have been killed and almost 4,000 injured just trying to access or distribute food. Israeli forces and armed groups – some reportedly operating with backing from Israeli authorities – now routinely open fire on desperate civilians risking everything just to survive.

    The humanitarian system is being deliberately and systematically dismantled by the Government of Israel’s blockade and restrictions, a blockade now being used to justify shutting down nearly all other aid operations in favour of a deadly, military-controlled alternative that neither protects civilians nor meets basic needs. These measures are designed to sustain a cycle of desperation, danger, and death. Experienced humanitarian actors remain ready to deliver life-saving assistance at scale. Yet more than 100 days since Israeli authorities reimposed a near-total blockade on aid and commercial goods, Gaza’s humanitarian conditions are collapsing faster than at any point in the past 20 months.

    Under the Israeli government’s new scheme, starved and weakened civilians are being forced to trek for hours through dangerous terrain and active conflict zones, only to face a violent, chaotic race to reach fenced, militarized distribution sites with a single entry point. There, thousands are released into chaotic enclosures to fight for limited food supplies. These areas have become sites of repeated massacres in blatant disregard for international humanitarian law. Orphaned children and caregivers are among the dead, with children harmed in over half of the attacks on civilians at these sites. With Gaza’s healthcare system in ruins, many of those shot are left to bleed out alone, beyond the reach of ambulances and denied lifesaving medical care. 

    Amidst severe hunger and famine-like conditions, many families tell us they are now too weak to compete for food rations. Those who do manage to obtain food often return with only a few basic items – nearly impossible to prepare without clean water or fuel to cook with. Fuel is nearly depleted, bringing critical lifesaving services – including bakeries, water systems, ambulances, and hospitals – to a standstill. Families are sheltering under plastic sheets, operating makeshift kitchens amid the rubble, without fuel, clean water, sanitation, or electricity. 

    This is not a humanitarian response.

    Concentrating more than two million people into further confined areas for a chance to feed their families is not a plan to save lives. For 20 months, more than two million people have been subjected to relentless bombardment, the weaponization of food, water and other aid, repeated forced displacement, and systematic dehumanization – all under the watch of the international community. The Sphere Association, which sets minimum standards for quality humanitarian aid, has warned that the Gaza Humanitarian Foundation’s approach does not adhere to core humanitarian standards and principles.
    This normalization of suffering must not be allowed to stand. States must reject the false choice between deadly, military-controlled food distributions and total denial of aid. States must uphold their obligations under international humanitarian and human rights law, including prohibitions on forced displacement, indiscriminate attacks, and obstruction of humanitarian aid. States must ensure accountability for grave violations of international law. 

    We, the undersigned organizations, once again call on all third states to:

    • Take concrete measures to end the suffocating siege and uphold the right of civilians in Gaza to safely access aid and receive protection. 
    • Urge donors not to fund militarized aid schemes that violate international law, do not adhere to humanitarian principles, deepen harm, and risk complicity in atrocities. 
    • Support the restoration of a unified, UN-led coordination mechanism—grounded in international humanitarian law and inclusive of UNRWA, Palestinian civil society, and the wider humanitarian community—to meet people’s needs.

    We reiterate our urgent calls for an immediate and sustained ceasefire, the release of all hostages and arbitrarily detained prisoners, full humanitarian access at scale, and an end to the pervasive impunity that enables these atrocities and denies Palestinians their basic dignity. 

    Editor’s Note
    • On 15 June, the Red Cross field hospital in Al Mawasi received at least 170 patients injured while trying to reach a food distribution site. The following day, 16 June, more than 200 patients arrived at the same facility – the highest number recorded in a single mass casualty incident in Gaza. Of that number, 28 Palestinians were declared dead. A WHO official underscored the deadly pattern: “The recent food distribution initiatives by non-UN actors every time result in mass casualty incidents.”
    • These deaths add to the broader toll: since October 2023, over 56,000 Palestinians have been killed in Gaza, including at least 17,000 children.

    List of signatory organizations:

    ABCD Bethlehem, ACT Alliance, Act Church of Sweden, Action Against Hunger (ACF), Action Corps, ActionAid, Age International, Agricultural Development Association – PARC, Al Ard for Agricultural Development, Al-Najd Developmental Forum, American Friends Service Committee, Amnesty International, Amos Trust, Anera, Anti-Slavery International, Arab Educational Institute – Pax Christi Bethlehem, Asamblea de Cooperación por la Paz, Asociación de Solidaridad Internacional UNADIKUM, Association for Civil Rights Israel (ACRI), Association Switzerland Palestine, B’Tselem – The Israeli Information Center for Human Rights in the Occupied Territories, BADIL Resource Center for Palestinian Residency and Refugee Rights, Beesan Charitable Association, Bimkom – Planning and Human Rights, Bisan Center for Research and Development, Botswana Watch Organisation, Breaking the Silence, Broederlijk Delen, CADUS e.V., Caritas Germany, Caritas International Belgium, Caritas Internationalis, Caritas Jerusalem, Caritas Middle East and North Africa, Center of Jewish Nonviolence, CESIDA – Spanish Coordinator of HIV and AIDS., Children Not Numbers, Choose Love, Christian Aid, Churches for Middle East Peace (CMEP), CIDSE – International Family of Catholic Social Justice Organisations, CNCD-11.11.11, codepink, Combatants for Peace, Comité de Solidaridad con la Causa Árabe, Congregations of St Joseph, COOPERATIVE AGRICULUTAL ASSOCIATION, Cordaid, Council for Arab-British Understanding (Caabu), Coventry Friends of Palestine, Cultures of Resistance, DanChurchAid, Danish Refugee Council, DAWN, Diakonia, Ekō, Embrace the Middle East, Emmaüs International, Entraide et Fraternité, Episcopal Peace Fellowship Palestine Justice Network, EuroMed Rights, FÓRUM DE POLÍTICA FEMINISTA, Friends Committee on National Legislation, Friends of Sabeel North America (FOSNA), Fund for Global Human Rights, Fundación Mundubat, Gaza Culture and Development Group (GCDG), Gaza Society for Sustainable Agriculture and Friendly Environment (SAFE), German Platform of Development and Humanitarian Aid NGOs (VENRO), Gisha – Legal Center for Freedom of Movement, Glia, Global Centre for the Responsibility to Protect (GCR2P), Greenpeace, HaMoked: Center for the Defence of the Individual, Hands for Charity, HEKS/EPER(Swiss Church Aid), HelpAge International, Human Security Collective, Humanité Solidarité Médecine (HuSoMe ONG), Humanity & Inclusion – Handicap International, Humanity Above All, INARA, Independent Catholic News, Indiana Center for Middle East Peace, International Federation for Human Rights (FIDH), International NGO Safety Organisation (INSO), INTERSOS, Islamic Relief Worldwide, Jewish Network for Palestine, Jüdische Stimme für Demokratie und Gerechtigkeit in Israel/Palästina, JVJP, Just Foreign Policy, Just Treatment, Kairos Ireland, Kenya Human Rights Commission, Kvinna till Kvinna Foundation, Martin Etxea Elkartea, Maryknoll Office for Global Concerns, Médecins du Monde International Network, Médecins Sans Frontières, MedGlobal, Medical Aid for Palestinians, Medico International, medico international schweiz, Medicos sin fronteras (MSF – Spain), Mennonite Central Committee, Middle East Children’s Alliance, Mothers Manifesto, MPower Change Action Fund, Muslim Aid, Mwatana for Human Rights, Nonviolent Peaceforce, Norwegian Church Aid, Norwegian People’s Aid, Norwegian Refugee Council, Oxfam International, Palestine Children’s Relief Fund (PCRF), Palestine Justice Network of the Presbyterian Church (U.S.A.), Palestinian American Medical Association (PAMA), Parents Against Child Detentions, Partners for Palestine, Partners for Progressive Israel, PAX, Pax Christi Australia, Pax Christi England and Wales, Pax Christi International, Pax Christi Italy, pax christi Munich, Pax Christi Scotland, Pax Christi USA, Peace Direct, Peace Watch Switzerland, Penny Appeal Canada, Physicians for Human Rights Israel, Plan International, Plataforma de Solidaridad con Palestina de Sevilla, Plateforme des ONG françaises pour la Palestine, Polish-Palestinian Justice Initiative KAKTUS, Première Urgence Internationale, Presbyterian Church (USA), Quixote Center, Religious of the Sacred Heart of Mary – NGO, ReThinking Foreign Policy, Right to Movement, Rumbo a Gaza-Freedom Flotilla, Saferworld, Saskatoon Chapter of Canadians for Justice and Peace in the Middle East, Save the Children, Scottish Catholic International Aid Fund, Sisters of Mercy of the Americas – Justice Team, Solsoc, Stichting Heimat International Foundation, STOPAIDS, Støtteforeningen Det Danske Hus i Palæstina, Terre des Hommes International Federation, Terre des hommes Lausanne, Terres des Hommes Italia, The Eastern Mediterranean Public Health Network (EMPHNET), The Israeli Committee Against House Demolitions (ICAHD UK), The Palestine Justice Network of the Presbyterian Church USA Bay Area, The Rights Forum, Union of Agricultural Work Committees-UAWC, United Against Inhumanity (UAI), Universities Allied for Essential Medicines UK, US-Lutheran Palestine Israel Justice Network, Vento di Terra, War Child Alliance, War on Want, Welthungerhilfe, and Yesh Din.

    MIL OSI NGO

  • MIL-OSI Europe: Written question – Is it possible for Türkiye to participate in the SAFE tool when it is threatening Greece? – E-002202/2025

    Source: European Parliament

    Question for written answer  E-002202/2025/rev.1
    to the Commission
    Rule 144
    Georgios Aftias (PPE)

    The SAFE regulation was recently approved, despite strong reservations from the European Parliament. Türkiye, as a non-EU country, occasionally makes threats against a member state of the European Union, such as Greece.

    The Prime Minister of Greece, Kyriakos Mitsotakis, has raised the issue of lifting the casus belli. The threat of war from Türkiye is ever-present, despite the fact that Greece, as is its right, applies international law and the law of the sea. The Minister for National Defence of Greece, Nikos Dendias, pointed out that ‘in order for Europe to exist, it must be based on common principles and a common understanding of the threat to the standard of life, otherwise it undermines itself’. Greek journalists record Turkish threats daily. Nikos Chatzinikolaou[1], one of the leading journalists in my country, recalled Article 42(7) TFEU for immediate assistance by other states if a Member State is attacked by another.

    Given the above:

    • 1.How is it possible for Türkiye to participate in the financing of defence programmes for common defence, when it systematically threatens the territorial integrity and sovereignty of Greece?
    • 2.Will you request the immediate termination of any partnership with Türkiye if it does not remove the direct threats against Greece, an EU Member State, in accordance with Article 16(4) of the SAFE Regulation?
    • 3.What measures will you take if Türkiye launches new threats?

    Submitted: 2.6.2025

    • [1] https://www.real.gr/ta-scholia-tou-nikou-chatzinikolaou/
    Last updated: 1 July 2025

    MIL OSI Europe News

  • MIL-OSI Europe: Answer to a written question – Inadequate consideration of eastern EU countries’ significance and contribution to European security in EU defence industry initiatives – E-001541/2025(ASW)

    Source: European Parliament

    Member States that are also North Atlantic Treaty Organisation allies have committed to spend at least 2% of their gross domestic product on defence.

    While not all Member States have reached this target yet, the trajectory over the past years is going in that direction. The White Paper for European Defence — Readiness 2030[1] recognises this positive trend and notes a growth in the defence spending by Member States of more than 31% since 2021, reaching 1.9% of the EU’s combined gross domestic product in 2024. But this is not enough, in particular to compensate for decades of underinvestment in defence.

    In view of the growing geopolitical challenges EU faces, its security depends on this overall increase of defence spending and defence investments, as well as Member States closely coordinating and working together.

    The Commission therefore offers support to all Member States in this endeavour, including by offering the possibility to Member States to use the national escape clause of the Stability and Growth Pact[2] for additional expenditure in defence up to EUR 650 billion, in a framed and coordinated manner.

    Finally, the Security Action for Europe Regulation adopted by Member States on 27 May 2025[3] will provide Member States with loans up to EUR 150 billion.

    Its recital (8) acknowledges that ‘… there is a growing need to accelerate, in a spirit of solidarity, the provision of Union support to those Member States that are likely to be threatened by serious difficulties due to the massive public investments needed, which may have an impact on their economic situation and that …, such solidarity is especially essential for those Member States which are most exposed to military threats’.

    • [1] https://commission.europa.eu/document/download/e6d5db69-e0ab-4bec-9dc0-3867b4373019_en?filename=White%20paper%20for%20European%20defence%20%E2%80%93%20Readiness%202030.pdf.
    • [2] https://defence-industry-space.ec.europa.eu/document/download/a57304ce-1a98-4a2c-aed5-36485884f1a0_en?filename=Communication-on-the-national-escape-clause.pdf.
    • [3] https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L_202501106.
    Last updated: 1 July 2025

    MIL OSI Europe News

  • MIL-OSI USA: Meeks Statement on Peace Deal Between DRC and Rwanda

    Source: United States House of Representatives – Congressman Gregory W Meeks (5th District of New York)

    Washington, DC – Representative Gregory W. Meeks, Ranking Member of the House Foreign Affairs Committee, issued the following statement on the signing of a peace deal between the Democratic Republic of the Congo and Rwanda:

    “I welcome today’s announcement of a peace deal between the DRC and Rwanda, which includes a prohibition of hostilities in eastern Congo and an agreement between both parties to facilitate full humanitarian access and the return of refugees and internally displaced persons. For too long, Congolese civilians in the east have been subjected to displacement, extreme violence, sexual abuse, and intimidation by armed groups. This brutality must end immediately.

    “Good-faith implementation of the agreement in the weeks ahead must be paramount. I look forward to seeing the full withdrawal of Rwandan Defense Forces from the DRC, as well as swift action to disarm the M23, Democratic Forces for the Liberation of Rwanda (FDLR), and other armed groups. It is also imperative to undertake transparent security reforms and ensure robust inclusion of Congolese civil society in determining how to address DRC’s many internal governance and security challenges. And the planned regional economic integration framework referenced in this deal can be a critical step toward securing a brighter future—and it must incorporate the full engagement of the Congolese and Rwandan people, including communities in mining areas who deserve to benefit.

    “For its part, the Trump administration must now work to facilitate this promising deal by reversing its harmful foreign aid cuts and surging humanitarian and development assistance to those in the region who have long suffered from this conflict. Continued high-level U.S. attention on monitoring and accountability during the implementation process will be critical. I applaud both the Congolese and Rwandan governments for taking this step toward peace, which is essential to the region’s future prosperity.”

    ###

    MIL OSI USA News

  • MIL-OSI Security: Defense News in Brief: Acting Chief of Naval Operations Adm. Jim Kilby Observes Atlantic Alliance 2025 Amphibious Operations with U.S. and Allied Force

    Source: United States Navy

    Acting Chief of Naval Operations Adm. Jim Kilby joined U.S., Dutch and British forces on June 30 to observe an amphibious assault during Atlantic Alliance 2025 (AA25), the premier East Coast naval integration exercise focused on improving joint readiness and interoperability.

    MIL Security OSI

  • MIL-OSI Russia: Yuri Trutnev: Sakhalin Region will be presented as an energy and logistics center of the Asia-Pacific region on the “Far East Street” within the framework of the EEF

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – An important disclaimer is at the bottom of this article.

    Sakhalin Region will traditionally be one of the participants in the Far East Street exhibition, which will be held from September 3 to 9 as part of the tenth, anniversary Eastern Economic Forum – 2025 in Vladivostok. The exhibition is organized by the Roscongress Foundation with the support of the Office of the Plenipotentiary Representative of the President of Russia in the Far Eastern Federal District. The only island region in the country will present information about its main investment and social projects, history and culture, and will also talk about the development of unmanned aviation.

    “Sakhalin Oblast is one of the leading regions in the Far East in terms of attracting investment. In the national investment climate rating, Sakhalin Oblast ranks first in the Far Eastern Federal District and fourth in the country. There is growth in the manufacturing industry, coal industry, and construction. Entrepreneurs can take advantage of the benefits of the priority development area, free port, and preferential regime on the Kuril Islands. The region is actively developing scientific and technologically. An international-level campus is being created on the instructions of the President. An engineering school and an electrical engineering laboratory are operating, the first stage of the Oil and Gas Industrial Park has been launched, and a research and production center for the development of unmanned systems has been created. This and much more allows us to create new production facilities, attract new personnel, and train young specialists. Thanks to the master plan, the urban environment of Yuzhno-Sakhalinsk is changing. I am sure that the region has something to show and be proud of,” emphasized Deputy Prime Minister and Presidential Plenipotentiary Representative in the Far Eastern Federal District Yuri Trutnev.

    The main pavilion of the Sakhalin Region on the “Far East Street” will be made in the form of waves. This year it will be decorated with installations on the theme of logistics: a hydrogen train, a UAV, an airplane and the port of Korsakov. Next to it there will be an investor’s pavilion in the form of a scallop shell.

    “The Eastern Economic Forum has long been an important platform for the Sakhalin Region to develop the region’s economy. Over the past five years, we have signed more than 60 agreements here, which will create 5.7 thousand jobs, and launch key projects in energy, transport, and education. Among them are the modernization of the electric grid complex, the development of hydrogen energy, the continuation of gasification of the region, the modernization of port infrastructure, the construction of clinics, and the development of science as part of the construction of the SakhalinTech campus. It is important for us that Sakhalin and the Kuril Islands become increasingly attractive for living, and that comfort for residents and visitors to the region grows. And we will consistently continue this work in the future,” said Sakhalin Region Governor Valery Limarenko.

    An installation dedicated to the 80th anniversary of Victory in the Great Patriotic War will be placed inside the pavilion. The exhibition “Roads of Victory” will tell about the Yuzhno-Sakhalinsk operation and the landing on Shumshu. It is planned to show a film about the expedition to the island, videos about reconstructions of battles in the Kholmsky and Smirnykhovsky districts.

    “On the instructions of the President of the Russian Federation Vladimir Vladimirovich Putin, we are creating a memorial complex on Shumshu Island dedicated to the Kuril landing operation. Shumshu is one of the islands of the Kuril chain. In fact, World War II ended there. The Kwantung Army was defeated. Our soldiers defeated the superior forces of the enemy, demonstrated mass heroism, landed in the water with full equipment and attacked tanks and firing points that were on the heights. This is one of the most significant pages in our history,” concluded Yuri Trutnev.

    In the Tourism zone, new programs will be presented: military-historical tours “Battle for Shumshu” and “Liberation of the South of Sakhalin”, seasonal offers for winter and summer recreation, as well as gastronomic tours and the “Far East – Land of Adventure” project.

    The Sakhalin – Showcase of Russia zone will showcase key projects of the master plan for the first belt of the agglomeration, as well as the main areas of development of the region: medicine, science and education, logistics, culture, and the urban environment.

    The results of the decade of work of the Sakhalin Region Development Corporation will be presented in a separate zone. With the help of multimedia technologies, the exposition will present the results of the organization’s work over 10 years, including the initiatives of the Merci Agro Sakhalin livestock complex, the Gorizont residential complex, the Uyun territory development project, the agropark and the oil service park.

    The UAV and BEK zone will tell about how the island region strives to become a leader in Russia in the implementation of unmanned aircraft systems. This topic will be dedicated to a separate exposition aimed at promoting Sakhalin’s achievements in this area.

    In 2025, Sakhalin Oblast plans to hold three international forums – Wings of Sakhalin, Energy of Sakhalin and Islands of Sustainable Development: Climate Aspect – at a new venue – the Pushisty drone port. The Sakhalin Expo exposition will be dedicated to the development of congress and exhibition activities in the region.

    Next to the main pavilion there will be a stand “Made in Sakhalin”. The exposition will present regional brands – clothes, jewelry, souvenirs, gastronomic products, health products, and achievements of the film industry and computer graphics will also be demonstrated. The pavilion’s design will include works by Sakhalin photographers and musicians, as well as various murals, including an image of the Aniva lighthouse – the unofficial symbol of the region.

    The art object “Happy Motherhood” will also be exhibited, symbolizing family values. 2025 has been declared the Year of Happy Motherhood on the islands. The regional government’s social block is paying special attention to solving the demographic issue and creating conditions under which women can successfully combine motherhood with professional activity, without sacrificing either their career or family.

    This year, the cultural program of the Sakhalin Region is aimed at popularizing the work of local authors and musicians. Songs by Sakhalin composer and poet Georgy Zobov will be presented, performed by artists of the Variety Academy, accompanied by the dance studio “Aritmiya” and the group Dreambox. The duet “Vishnya” will present a combination of electronic music, songs and ethnic music. The ensemble of the Variety Academy of Larisa Dolina will perform cover versions of famous hits of the Russian variety art. Stilt walkers of the theater studio 2233 will also perform for the guests.

    In addition, the regional delegation will present a series of unique performances called “Sea Meditation”. For three days, Sakhalin artist Konstantin Kolupaev will create paintings dedicated to the beauty and power of nature on a huge canvas using unique techniques. Spectators will be able to watch the master at work.

    As part of the sports program, Sakhalin Oblast plans to organize an interactive platform using VR glasses, where you can try alpine skiing, ski jumping or parachuting. There will be a chess platform called “Beat the Champion.”

    The 10th Eastern Economic Forum will be held on September 3–6 at the campus of the Far Eastern Federal University in Vladivostok. During these days, the exhibition will be available to forum participants, and on September 7, 8, and 9, it will be open to everyone. The EEF is organized by the Roscongress Foundation.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI USA: Chairman Graham Statement On Senate Passage Of The One Big Beautiful Bill Act

    US Senate News:

    Source: United States Senator for South Carolina Lindsey Graham
    WASHINGTON – U.S. Senator Lindsey Graham (R-South Carolina), Chairman of the Senate Budget Committee, today made this statement after the Senate passed the One Big Beautiful Bill Act by a vote of 51-50.
    “After a long but fruitful day, the Republican Senate delivered.  Senate Majority Leader Thune, Chairman Crapo and all my Republican colleagues did a great job, clinching a big win for President Trump and the American people.
    “Here’s what we accomplished:
    The most comprehensive border security package in American history.
    Prevented the largest tax hike in history by making the 2017 tax cuts permanent, helping the American economy and working families.
    The biggest reduction in spending in American history due to common sense government reforms.
    A $150 billion infusion for the Department of Defense to make us safe.
    Raising the debt ceiling so we do not have to worry about default.
    “I am honored to be the Senate Budget Chairman at such a crucial time. I am also proud to have worked with my Republican colleagues, helping deliver the foundation of President Trump’s domestic agenda. As a result of the Republican Senate passing this bill, America will be more prosperous and safe.
    “Now it is up to my House colleagues to get this historic legislation over the finish line and on to the President’s desk as soon as possible.”

    MIL OSI USA News

  • MIL-OSI USA: Fischer Statement on Senate Passage of One Big Beautiful Bill

    US Senate News:

    Source: United States Senator for Nebraska Deb Fischer
    Fischer’s Paid Family and Medical Leave policy made permanent in bill—delivering long-term support for working families and employers
    Today, U.S. Senator Deb Fischer (R-Neb.) released the following statement after the U.S. Senate passed the One Big Beautiful Bill:  
    “Last November, Americans spoke loud and clear: they want safer communities, lower energy costs, and real relief for working families. Today, the Senate delivered—blocking a $4 trillion tax hike and investing in border security to keep America safe. This bill locks in the 2017 Tax Cuts and Jobs Act, saving the average Nebraska family $2,400 a year. It keeps taxes low, boosts small businesses, strengthens our military, supports farmers and ranchers, and makes energy more affordable for everyone.
    “I’m also pleased this bill makes permanent my Paid Family and Medical Leave (PFML) Tax Credit. Since I established the nation’s first and only federal PFML policy in 2017, this credit has empowered employers of all sizes to offer paid leave to their workers voluntarily, rather than through a government mandate. Now, employers across America have the certainty they need to support employees as they care for a newborn or an aging parent without sacrificing their job or paycheck.
    “I urge the House to take up this bill and send it to the president’s desk so we can deliver on our promises to empower working families and keep America safe, strong, and prosperous.”
     
    One Big Beautiful Bill Provisions:The One Big Beautiful Bill contains the following provisions championed by Fischer:
    Paid Family Medical Leave Tax Credit Extension and Enhancement Act: makes the PFML Employer Tax Credit—the country’s first-ever nationwide PFML policy—permanent, helping employers of all sizes to voluntarily – not through a government mandate—offer PFML plans to their employees; 
    A carve-out for the Department of Defense—for the first time in history—of specific spectrum bands (3, 7, and 8 gigahertz frequencies) from general Federal Communications Commission auction authority, which will safeguard the missile defense of the homeland, protect our military radars and sensors, and lay the groundwork for long-term defense innovation—including the Golden Dome Missile Defense Shield; and
    A modified version of her Protecting Rural Seniors Access to Care Act, which repeals a harmful Biden-era staffing mandate that would have forced several long-term care (LTC) facilities to close, depriving America’s seniors of care.
    It also includes the following tax provisions to benefit Nebraska families:
    Prevents a more-than $2,400 tax hike on the average Nebraska family;
    Protects over 44,000 family-owned farms in Nebraska from having their death tax exemption cut in half;
    Protects 37,000 jobs in Nebraska from being lost;
    Ensures more than 239,000 Nebraska households’ child tax credit is not cut in half;
    Makes sure more than 868,000 Nebraska families’ standard deduction is not cut in half;
    Establishes work requirements for able-bodied adults who are choosing not to work and do not have dependent children or elderly parents in their care; and
    Ensures no taxes on tips or overtime for millions of tipped and hourly workers.
    It also supports Nebraska’s agricultural industry by: 
    Extending the 45Z Clean Fuels Production Tax Credit to support Nebraska’s farmers and biofuel producers;
    Investing in and modernizing the farm safety net, including improvements to crop insurance;
    Expanding markets for Nebraska’s ag producers by investing in trade promotion;
    Increasing funding for foreign animal disease prevention to protect Nebraska’s ag industry; and
    Increasing funding for agricultural research.
    The bill invests in America’s border security through the following provisions:
    $46.5 billion for U.S. Customs and Border Patrol (CBP) to build the border wall and associated infrastructure;
    $45 billion to increase the detention of illegal migrants;
    $6 billion for improvements to surveillance at the border; and
    Funding for the U.S. Department of Homeland Security (DHS) to increase staffing and enhance migrant screening and vetting processes.
    The bill also makes crucial investments in America’s national security through the following provisions:
    $15 billion to modernize nuclear weapons and delivery systems and to invest in the infrastructure needed to restore America’s ability to manufacture nuclear weapons;
    $25 billion to accelerate procurement of key munitions and expand production capacity;
    $25 billion for America’s Golden Dome—building a layered missile defense shield and developing space-based assets to protect the homeland and deployed troops; and
    $1 billion to support Department of Defense personnel and logistics for border security and counterdrug operations.

    MIL OSI USA News

  • MIL-OSI USA: Justice Department Charges Two Individuals with Acting as Agents of the PRC Government

    Source: US State of California

    Arrests Disrupted Clandestine PRC Ministry of State Security Intelligence Network Operating in the United States

    Two nationals of the People’s Republic of China (PRC) made their initial appearances in federal court in Portland, Oregon, and Houston, Texas, yesterday to face charges issued out of the Northern District of California for acting as agents of the Government of the PRC without prior notification to the Attorney General. The defendants, Yuance Chen, 38, a PRC national and legal permanent resident who resides in Happy Valley, Oregon, and Liren “Ryan” Lai, 39, a PRC national who traveled from the PRC to Houston, Texas, on a tourist visa in April 2025, were arrested Friday on a criminal complaint charging them with overseeing and carrying out various clandestine intelligence taskings in the United States on behalf of the PRC Government’s principal foreign intelligence service, the Ministry of State Security (MSS). These activities included facilitating a “dead drop” payment of cash for information relating to the national security of the United States previously provided to the MSS, gathering intelligence about U.S. Navy service members and bases, and assisting with efforts to recruit other individuals from within the U.S. military as potential MSS assets.

    Chen and Lai were arrested on June 27, 2025, by the FBI in Happy Valley, Oregon, and Houston Texas, as part of a coordinated counterintelligence and law enforcement operation across multiple states.

    “This case underscores the Chinese government’s sustained and aggressive effort to infiltrate our military and undermine our national security from within,” said Attorney General Pamela Bondi. “The Justice Department will not stand by while hostile nations embed spies in our country – we will expose foreign operatives, hold their agents to account, and protect the American people from covert threats to our national security.”

    “The FBI arrested two Chinese nationals who were allegedly attempting to recruit U.S. military service members on behalf of the PRC,” said FBI Director Kash Patel. “The Chinese Communist Party thought they were getting away with their scheme to operate on U.S. soil, utilizing spy craft, like dead drops, to pay their sources. This case was a complex, coordinated effort and is an example of outstanding counterintelligence work done by FBI San Francisco, Portland, Houston, San Diego, and the Counterintelligence Division. The FBI will continue to vigilantly defend the homeland from China’s pervasive attempts to infiltrate our borders.”

    “Adverse foreign intelligence services like the PRC’s Ministry of State Security dedicate years to recruiting individuals and cultivating them as intelligence assets to do their bidding within the United States,” said Assistant Attorney General for National Security John A. Eisenberg. “Under my leadership, the National Security Division will continue to defend our nation and neutralize our adversaries’ clandestine spy networks.”

    “These charges reflect the breadth of the efforts by our foreign adversaries to target the United States — this time by conducting illegal intelligence-gathering operations aimed at our national security information and military service members,” said U.S. Attorney Craig H. Missakian for the Northern District of California. “My office and the FBI remain ever vigilant in guarding against these threats to the United States. We will continue to undertake counterespionage investigations and prosecutions, no matter how complex and sensitive, to disrupt attempts to weaken our national security.”

    As alleged in the criminal complaint unsealed yesterday, the PRC Government conducts intelligence activities against the United States through multiple arms, including the MSS. The MSS handles civilian intelligence collection for the PRC and is responsible for counterintelligence and foreign intelligence, as well as political security. The MSS and its bureaus seek to obtain information on political, economic, and security policies that might affect the PRC, along with military, scientific, and technical information of value to the PRC. The MSS and its bureaus are tasked with conducting clandestine and covert human source operations, of which the United States is a principal target.

    As alleged in the criminal complaint, Lai recruited Chen to work on behalf of the MSS in or about 2021. While in Guangzhou, China, in January 2022, Lai and Chen worked together to facilitate a dead-drop payment of at least $10,000 on behalf of the MSS, working with other individuals located in the United States to leave a backpack with the cash at a day-use locker at a recreational facility located in Livermore, California.

    Following the January 2022 dead drop, Lai and Chen continued to work on behalf of the MSS, including to help identify potential assets for MSS recruitment within the ranks of the U.S. Navy. For example, beginning in 2022, Chen was tasked by Lai and other agents of the MSS to contact a Navy employee over social media, and then later, in 2025, arranged for a tour with the employee of the USS Abraham Lincoln and provided information about the employee to the MSS. In 2022 and 2023, Chen was tasked to visit a U.S. Naval installation in Washington State and a U.S. Navy recruitment center in San Gabriel, California. While in the recruitment center, Chen obtained photographs of a bulletin board containing the names, programs, and hometowns of recent Navy recruits, the majority of whom listed their hometown as “China,” which he appears to have transmitted to an MSS intelligence officer in China. The complaint also alleges that Chen received instruction from the MSS on what to say to potential recruits regarding potential payment that could be made by the MSS, preferred Naval job assignments for potential recruits, and methods for minimizing Chen’s risk of exposure. The complaint alleges that in 2023, Lai flew to the United States from the PRC and provided Chen with a cellphone that Chen then used to communicate with the MSS. The complaint also alleges that Chen traveled to Guangzhou and met with MSS intelligence officers in April 2024 and March 2025 in order to discuss compensation and specific taskings.

    The complaint also alleges that Lai traveled to Houston, Texas, in April 2025, claiming that the purpose of his visit was related to his business as an online retail seller, and that he would be staying in the Houston area for two weeks. However, on May 9, 2025 – more than four weeks after his arrival in the United States – Lai traveled by car with a companion from Houston to Southern California, via New Mexico and Tucson, Arizona, before returning to Texas, on May 15, 2025.

    Chen and Lai are charged with violating Title 18, United States Code, Section 951, which makes it a crime for a person to operate or agree to operate within the United States as an agent of a foreign government without notification to the Attorney General of the United States. If convicted, the defendants face a fine of up to $250,000 and a term of imprisonment of up to 10 years.

    The FBI San Francisco Field Office is leading the investigation, with valuable assistance provided by the FBI Portland, Houston, and San Diego Field Offices. The Naval Criminal Investigative Service (NCIS) also provided valuable assistance during the operation. 

    The National Security and Special Prosecutions Section of the U.S. Attorney’s Office for the Northern District of California and the National Security Division’s Counterintelligence and Export Control Section are in charge of the prosecution. Significant operational support and assistance is also being provided by the District of Oregon, the Southern District of Texas, and the Southern District of California.

    A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI USA: Feenstra Commends Trump Administration for Detaining Chinese Nationals Found Spying on U.S. Navy

    Source: United States House of Representatives – Representative Randy Feenstra (IA-04)

    HULL, IOWA – Today, U.S. Rep. Randy Feenstra (R-Hull) issued the following statement commending President Trump and FBI Director Kash Patel for arresting two Chinese nationals found spying on U.S. Navy servicemembers and bases:

    “I commend the Trump administration for arresting two Chinese nationals with ties to the Chinese Communist Party who were spying on U.S. Navy servicemembers and bases. From buying up our farmland to deploying spy balloons in our sovereign airspace, the Chinese Communist Party is no friend of the United States. We will not tolerate foreign espionage that threatens our troops and undermines our national security.”

    ###

    MIL OSI USA News

  • MIL-OSI Security: Justice Department Charges Two Individuals with Acting as Agents of the PRC Government

    Source: United States Attorneys General 7

    Arrests Disrupted Clandestine PRC Ministry of State Security Intelligence Network Operating in the United States

    Two nationals of the People’s Republic of China (PRC) made their initial appearances in federal court in Portland, Oregon, and Houston, Texas, yesterday to face charges issued out of the Northern District of California for acting as agents of the Government of the PRC without prior notification to the Attorney General. The defendants, Yuance Chen, 38, a PRC national and legal permanent resident who resides in Happy Valley, Oregon, and Liren “Ryan” Lai, 39, a PRC national who traveled from the PRC to Houston, Texas, on a tourist visa in April 2025, were arrested Friday on a criminal complaint charging them with overseeing and carrying out various clandestine intelligence taskings in the United States on behalf of the PRC Government’s principal foreign intelligence service, the Ministry of State Security (MSS). These activities included facilitating a “dead drop” payment of cash for information relating to the national security of the United States previously provided to the MSS, gathering intelligence about U.S. Navy service members and bases, and assisting with efforts to recruit other individuals from within the U.S. military as potential MSS assets.

    Chen and Lai were arrested on June 27, 2025, by the FBI in Happy Valley, Oregon, and Houston Texas, as part of a coordinated counterintelligence and law enforcement operation across multiple states.

    “This case underscores the Chinese government’s sustained and aggressive effort to infiltrate our military and undermine our national security from within,” said Attorney General Pamela Bondi. “The Justice Department will not stand by while hostile nations embed spies in our country – we will expose foreign operatives, hold their agents to account, and protect the American people from covert threats to our national security.”

    “The FBI arrested two Chinese nationals who were allegedly attempting to recruit U.S. military service members on behalf of the PRC,” said FBI Director Kash Patel. “The Chinese Communist Party thought they were getting away with their scheme to operate on U.S. soil, utilizing spy craft, like dead drops, to pay their sources. This case was a complex, coordinated effort and is an example of outstanding counterintelligence work done by FBI San Francisco, Portland, Houston, San Diego, and the Counterintelligence Division. The FBI will continue to vigilantly defend the homeland from China’s pervasive attempts to infiltrate our borders.”

    “Adverse foreign intelligence services like the PRC’s Ministry of State Security dedicate years to recruiting individuals and cultivating them as intelligence assets to do their bidding within the United States,” said Assistant Attorney General for National Security John A. Eisenberg. “Under my leadership, the National Security Division will continue to defend our nation and neutralize our adversaries’ clandestine spy networks.”

    “These charges reflect the breadth of the efforts by our foreign adversaries to target the United States — this time by conducting illegal intelligence-gathering operations aimed at our national security information and military service members,” said U.S. Attorney Craig H. Missakian for the Northern District of California. “My office and the FBI remain ever vigilant in guarding against these threats to the United States. We will continue to undertake counterespionage investigations and prosecutions, no matter how complex and sensitive, to disrupt attempts to weaken our national security.”

    As alleged in the criminal complaint unsealed yesterday, the PRC Government conducts intelligence activities against the United States through multiple arms, including the MSS. The MSS handles civilian intelligence collection for the PRC and is responsible for counterintelligence and foreign intelligence, as well as political security. The MSS and its bureaus seek to obtain information on political, economic, and security policies that might affect the PRC, along with military, scientific, and technical information of value to the PRC. The MSS and its bureaus are tasked with conducting clandestine and covert human source operations, of which the United States is a principal target.

    As alleged in the criminal complaint, Lai recruited Chen to work on behalf of the MSS in or about 2021. While in Guangzhou, China, in January 2022, Lai and Chen worked together to facilitate a dead-drop payment of at least $10,000 on behalf of the MSS, working with other individuals located in the United States to leave a backpack with the cash at a day-use locker at a recreational facility located in Livermore, California.

    Following the January 2022 dead drop, Lai and Chen continued to work on behalf of the MSS, including to help identify potential assets for MSS recruitment within the ranks of the U.S. Navy. For example, beginning in 2022, Chen was tasked by Lai and other agents of the MSS to contact a Navy employee over social media, and then later, in 2025, arranged for a tour with the employee of the USS Abraham Lincoln and provided information about the employee to the MSS. In 2022 and 2023, Chen was tasked to visit a U.S. Naval installation in Washington State and a U.S. Navy recruitment center in San Gabriel, California. While in the recruitment center, Chen obtained photographs of a bulletin board containing the names, programs, and hometowns of recent Navy recruits, the majority of whom listed their hometown as “China,” which he appears to have transmitted to an MSS intelligence officer in China. The complaint also alleges that Chen received instruction from the MSS on what to say to potential recruits regarding potential payment that could be made by the MSS, preferred Naval job assignments for potential recruits, and methods for minimizing Chen’s risk of exposure. The complaint alleges that in 2023, Lai flew to the United States from the PRC and provided Chen with a cellphone that Chen then used to communicate with the MSS. The complaint also alleges that Chen traveled to Guangzhou and met with MSS intelligence officers in April 2024 and March 2025 in order to discuss compensation and specific taskings.

    The complaint also alleges that Lai traveled to Houston, Texas, in April 2025, claiming that the purpose of his visit was related to his business as an online retail seller, and that he would be staying in the Houston area for two weeks. However, on May 9, 2025 – more than four weeks after his arrival in the United States – Lai traveled by car with a companion from Houston to Southern California, via New Mexico and Tucson, Arizona, before returning to Texas, on May 15, 2025.

    Chen and Lai are charged with violating Title 18, United States Code, Section 951, which makes it a crime for a person to operate or agree to operate within the United States as an agent of a foreign government without notification to the Attorney General of the United States. If convicted, the defendants face a fine of up to $250,000 and a term of imprisonment of up to 10 years.

    The FBI San Francisco Field Office is leading the investigation, with valuable assistance provided by the FBI Portland, Houston, and San Diego Field Offices. The Naval Criminal Investigative Service (NCIS) also provided valuable assistance during the operation. 

    The National Security and Special Prosecutions Section of the U.S. Attorney’s Office for the Northern District of California and the National Security Division’s Counterintelligence and Export Control Section are in charge of the prosecution. Significant operational support and assistance is also being provided by the District of Oregon, the Southern District of Texas, and the Southern District of California.

    A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Economics: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Source: Microsoft

    Headline: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Since 2024, Microsoft Threat Intelligence has observed remote information technology (IT) workers deployed by North Korea leveraging AI to improve the scale and sophistication of their operations, steal data, and generate revenue for the Democratic People’s Republic of Korea (DPRK). Among the changes noted in the North Korean remote IT worker tactics, techniques, and procedures (TTPs) include the use of AI tools to replace images in stolen employment and identity documents and enhance North Korean IT worker photos to make them appear more professional. We’ve also observed that they’ve been utilizing voice-changing software.

    North Korea has deployed thousands of remote IT workers to assume jobs in software and web development as part of a revenue generation scheme for the North Korean government. These highly skilled workers are most often located in North Korea, China, and Russia, and use tools such as virtual private networks (VPNs) and remote monitoring and management (RMM) tools together with witting accomplices to conceal their locations and identities.

    Historically, North Korea’s fraudulent remote worker scheme has focused on targeting United States (US) companies in the technology, critical manufacturing, and transportation sectors. However, we’ve observed North Korean remote workers evolving to broaden their scope to target various industries globally that offer technology-related roles. Since 2020, the US government and cybersecurity community have identified thousands of North Korean workers infiltrating companies across various industries.

    Organizations can protect themselves from this threat by implementing stricter pre-employment vetting measures and creating policies to block unapproved IT management tools. For example, when evaluating potential employees, employers and recruiters should ensure that the candidates’ social media and professional accounts are unique and verify their contact information and digital footprint. Organizations should also be particularly cautious with staffing company employees, check for consistency in resumes, and use video calls to confirm a worker’s identity.

    Microsoft Threat Intelligence tracks North Korean IT remote worker activity as Jasper Sleet (formerly known as Storm-0287). We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet. To disrupt this activity and protect our customers, we’ve suspended 3,000 known Microsoft consumer accounts (Outlook/Hotmail) created by North Korean IT workers. We have also implemented several detections to alert our customers of this activity through Microsoft Entra ID Protection and Microsoft Defender XDR as noted at the end of this blog. As with any observed nation-state threat actor activity, Microsoft has directly notified targeted or compromised customers, providing them with important information needed to secure their environments. As we continue to observe more attempts by threat actors to leverage AI, not only do we report on them, but we also have principles in place to take action against them.

    This blog provides additional information on the North Korean remote IT worker operations we published previously, including Jasper Sleet’s usual TTPs to secure employment, such as using fraudulent identities and facilitators. We also provide recent observations regarding their use of AI tools. Finally, we share detailed guidance on how to investigate, monitor, and remediate possible North Korean remote IT worker activity, as well as detections and hunting capabilities to surface this threat.

    From North Korea to the world: The remote IT workforce

    Since at least early 2020, Microsoft has tracked a global operation conducted by North Korea in which skilled IT workers apply for remote job opportunities to generate revenue and support state interests. These workers present themselves as foreign (non-North Korean) or domestic-based teleworkers and use a variety of fraudulent means to bypass employment verification controls.

    North Korea’s fraudulent remote worker scheme has since evolved, establishing itself as a well-developed operation that has allowed North Korean remote workers to infiltrate technology-related roles across various industries. In some cases, victim organizations have even reported that remote IT workers were some of their most talented employees. Historically, this operation has focused on applying for IT, software development, and administrator positions in the technology sector. Such positions provide North Korean threat actors access to highly sensitive information to conduct information theft and extortion, among other operations.

    North Korean IT workers are a multifaceted threat because not only do they generate revenue for the North Korean regime, which violates international sanctions, they also use their access to steal sensitive intellectual property, source code, or trade secrets. In some cases, these North Korean workers even extort their employer into paying them in exchange for not publicly disclosing the company’s data.

    Between 2020 and 2022, the US government found that over 300 US companies in multiple industries, including several Fortune 500 companies, had unknowingly employed these workers, indicating the magnitude of this threat. The workers also attempted to gain access to information at two government agencies. Since then, the cybersecurity community has continued to detect thousands of North Korean workers. On January 3, 2025, the Justice Department released an indictment identifying two North Korean nationals and three facilitators responsible for conducting fraudulent work between 2018 and 2024. The indicted individuals generated a revenue of at least US$866,255 from only ten of the at least 64 infiltrated US companies.

    North Korean threat actors are evolving across the threat landscape to incorporate more sophisticated tactics and tools to conduct malicious employment-related activity, including the use of custom and AI-enabled software.

    Tactics and techniques

    The tactics and techniques employed by North Korean remote IT workers involve a sophisticated ecosystem of crafting fake personas, performing remote work, and securing payments. North Korean IT workers apply for remote roles, in various sectors, at organizations across the globe.

    They create, rent, or procure stolen identities that match the geo-location of their target organizations (for example, they would establish a US-based identity to apply for roles at US-based companies), create email accounts and social media profiles, and establish legitimacy through fake portfolios and profiles on developer platforms like GitHub and LinkedIn. Additionally, they leverage AI tools to enhance their operations, including image creation and voice-changing software. Facilitators play a crucial role in validating fraudulent identities and managing logistics, such as forwarding company hardware and creating accounts on freelance job websites. To evade detection, these workers use VPNs, virtual private servers (VPSs), and proxy services as well as RMM tools to connect to a device housed at a facilitator’s laptop farm located in the country of the job.

    Figure 1. The North Korean IT worker ecosystem

    Crafting fake personas and profiles

    The North Korean remote IT worker fraud scheme begins with the procurement of identities for the workers. These identities, which can be stolen or “rented” from witting individuals, include names, national identification numbers, and dates of birth. The workers might also leverage services that generate fraudulent identities, complete with seemingly legitimate documentation, to fabricate their personas. They then create email accounts and social media pages they use to apply for jobs, often indirectly through staffing or contracting companies. They also apply for freelance opportunities through freelancer sites as an additional avenue for revenue generation. Notably, they often use the same names/profiles repeatedly rather than creating unique personas for each successful infiltration.

    Additionally, the North Korean IT workers have used fake profiles on LinkedIn to communicate with recruiters and apply for jobs.

    Figure 2. An example of a North Korean IT worker LinkedIn profile that has since been taken down.

    The workers tailor their fake resumes and profiles to match the requirements for specific remote IT positions, thus increasing their chances of getting selected. Over time, we’ve observed these fake resumes and employee documents noticeably improving in quality, now appearing more polished and lacking grammatical errors facilitated by AI.

    After creating their fake personas, the North Korean IT workers then attempt to establish legitimacy by creating digital footprints for these fake personas. They typically leverage communication, networking, and developer platforms, (for example, GitHub) to showcase their supposed portfolio of previous work samples:

    Figure 3. Example profile used by a North Korean IT worker that has since been taken down.

    Using AI to improve operations

    Microsoft Threat intelligence has observed North Korean remote IT workers leveraging AI to improve the quantity and quality of their operations. For example, in October 2024, we found a public repository containing actual and AI-enhanced images of suspected North Korean IT workers:

    Figure 4. Photos of potential North Korean IT workers

    The repository also contained the resumes and email accounts used by the said workers, along with the following tools and resources they can use to secure employment and to do their work:

    • VPS and VPN accounts, along with specific VPS IP addresses
    • Playbooks on conducting identity theft and creating and bidding jobs on freelancer websites
    • Wallet information and suspected payments made to facilitators
    • LinkedIn, GitHub, Upwork, TeamViewer, Telegram, and Skype accounts
    • Tracking sheet of work performed, and payments received by the IT workers

    Image creation

    Based on our review of the repository mentioned previously, North Korean IT workers appear to conduct identity theft and then use AI tools like Faceswap to move their pictures over to the stolen employment and identity documents. The attackers also use these AI tools to take pictures of the workers and move them to more professional looking settings. The workers then use these AI-generated pictures on one or more resumes or profiles when applying for jobs.

    Figure 5. Use of AI apps to modify photos used for North Korean IT workers’ resumes and profiles
    Figure 6. Examples of resumes for North Korean IT workers. These two resumes use different versions of the same photo.

    Communications

    Microsoft Threat Intelligence has observed that North Korean IT workers are also experimenting with other AI technologies such as voice-changing software. While we haven’t observed threat actors using combined AI voice and video products as a tactic first hand, we do recognize that combining these technologies could allow future threat actor campaigns to trick interviewers into thinking they aren’t communicating with a North Korean IT worker. If successful, this tactic could allow the North Korean IT workers to do interviews directly and no longer rely on facilitators standing in for them on interviews or selling them account access.

    Facilitators for initial access

    North Korean Remote IT workers require assistance from a witting facilitator to help find jobs, pass the employment verification process, and once hired, successfully work remotely. We’ve observed Jasper Sleet advertising job opportunities for facilitator roles under the guise of partnering with a remote job candidate to help secure an IT role in a competitive market:

    Figure 7. Example of a job opportunity for a facilitator role

    The IT workers may have the facilitators assist in creating accounts on remote and freelance job websites. They might also ask the facilitator to perform the following tasks as their relationship builds:

    • Create a bank account for the North Korean IT worker, or lend their (the facilitator’s) own account to the worker
    • Purchase mobile phone numbers or SIM cards

    During the employment verification process, the witting accomplice helps the North Korean IT workers validate the latter’s fraudulent identities using online background check service providers. The documents submitted by the workers include fake or stolen drivers’ licenses, social security cards, passports, and permanent resident identification cards. Workers train using interview scripts, which include a justification for why the employee must work remotely.

    Once hired, the remote workers direct company laptops and hardware to be sent to the address of the accomplice. The accomplice then either runs a laptop farm that provides the laptops with an internet connection at the geo-location of the role or forwards the items internationally. For hardware that remain in the country of the role, the accomplice signs into the computers and installs software that enables the workers to connect remotely. Remote IT workers might also access devices remotely using IP-based KVM devices, like PiKVM or TinyPilot.

    Defense evasion and persistence

    To conceal their physical location as well as maintain persistence and blend into the target organization’s environment, the workers typically use VPNs (particularly Astrill VPN), VPSs, proxy services, and RMM tools. Microsoft Threat Intelligence has observed the persistent use of JumpConnect, TinyPilot, Rust Desk, TeamViewer, AnyViewer, and Anydesk. When an in-person presence or face-to-face meeting is required, for example to confirm banking information or attend a meeting, the workers have been known to pay accomplices to stand in for them. When possible, however, the workers eliminate all face-to-face contact, offering fraudulent excuses for why they are not on camera during video teleconferencing calls or speaking.

    Attribution

    Microsoft Threat Intelligence uses the name Jasper Sleet (formerly known as Storm-0287) to represent activity associated with North Korean’s remote IT worker program. These workers are primarily focused on revenue generation, use remote access tools, and likely fall under a particular leadership structure in North Korea. We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet.

    How Microsoft disrupts North Korean remote IT worker operations with machine learning

    Microsoft has successfully scaled analyst tradecraft to accelerate the identification and disruption of North Korean IT workers in customer environments by developing a custom machine learning solution. This has been achieved by leveraging Microsoft’s existing threat intelligence and weak signals generated by monitoring for many of the red flags listed in this blog, among others. For example, this solution uses impossible time travel risk detections, most commonly between a Western nation and China or Russia. The machine learning workflow uses these features to surface suspect accounts most likely to be North Korean IT workers for assessment by Microsoft Threat Intelligence analysts.

    Once Microsoft Threat Intelligence reviews and confirms that an account is indeed associated with a North Korean IT worker, customers are then notified with a Microsoft Entra ID Protection risk detection warning of a risky sign-in based on Microsoft’s threat intelligence. Microsoft Defender XDR customers also receive the alert Sign-in activity by a suspected North Korean entity in the Microsoft Defender portal.

    Defending against North Korean remote IT worker infiltration

    Defending against the threats from North Korean remote IT workers involves a threefold strategy:

    • Ensuring a proper vetting approach is in place for freelance workers and vendors
    • Monitoring for anomalous user activity
    • Responding to suspected Jasper Sleet signals in close coordination with your insider risk team

    Investigate

    How can you identify a North Korean remote IT worker in the hiring process?

    To protect your organization against a potential North Korean insider threat, it is important for your organization to prioritize a process for verifying employees to identify potential risks. The following can be used to assess potential employees:

    • Confirm the potential employee has a digital footprint and look for signs of authenticity. This includes a real phone number (not VoIP), a residential address, and social media accounts. Ensure the potential employee’s social media/professional accounts are not highly similar to the accounts of other individuals. In addition, check that the contact phone number listed on the potential employee’s account is unique and not also used by other accounts.
    • Scrutinize resumes and background checks for consistency of names, addresses, and dates. Consider contacting references by phone or video-teleconference rather than email only.
    • Exercise greater scrutiny for employees of staffing companies, since this is the easiest avenue for North Korean workers to infiltrate target companies.
    • Search whether a potential employee is employed at multiple companies using the same persona.
    • Ensure the potential employee is seen on camera during multiple video telecommunication sessions. If the potential employee reports video and/or microphone issues that prohibit participation, this should be considered a red flag.
    • During video verification, request individuals to physically hold driver’s licenses, passports, or identity documents up to camera.
    • Keep records, including recordings of video interviews, of all interactions with potential employees.
    • Require notarized proof of identity.

    Monitor

    How can your organization prevent falling victim to the North Korean remote IT worker technique?

    To prevent the risks associated with North Korean insider threats, it’s vital to monitor for activity typically associated with this fraudulent scheme.

    Monitor for identifiable characteristics of North Korean remote workers

    Microsoft has identified the following characteristics of a North Korean remote worker. Note that not all the criteria are necessarily required, and further, a positive identification of a remote worker doesn’t guarantee that the worker is North Korean.

    • The employee lists a Chinese phone number on social media accounts that is used by other accounts.
    • The worker’s work-issued laptop authenticates from an IP address of a known North Korean IT worker laptop farm, or from foreign—most commonly Chinese or Russian—IP addresses even though the worker is supposed to have a different work location.
    • The worker is employed at multiple companies using the same persona. Employees of staffing companies require heightened scrutiny, given this is the easiest way for North Korean workers to infiltrate target companies.
    • Once a laptop is issued to the worker, RMM software is immediately downloaded onto it and used in combination with a VPN.
    • The worker has never been seen on camera during a video telecommunication session or is only seen a few times. The worker may also report video and/or microphone issues that prohibit participation from the start.
    • The worker’s online activity doesn’t align with routine co-worker hours, with limited engagement across approved communication platforms.

    Monitor for activity associated with Jasper Sleet access

    • If RMM tools are used in your environment, enforce security settings where possible, to implement MFA:
      • If an unapproved installation is discovered, reset passwords for accounts used to install the RMM services. If a system-level account was used to install the software, further investigation may be warranted.
    • Monitor for impossible travel—for example, a supposedly US-based employee signing in from China or Russia.
    • Monitor for use of public VPNs such as Astrill. For example, IP addresses associated with VPNs known to be used by Jasper Sleet can be added to Sentinel watchlists. Or, Microsoft Defender for Identity can integrate with your VPN solution to provide more information about user activity, such as extra detection for abnormal VPN connections.
    • Monitor for signals of insider threats in your environment. Microsoft Purview Insider Risk Management can help identify potentially malicious or inadvertent insider risks.
    • Monitor for consistent user activity outside of typical working hours.

    Remediate

    What are the next steps if you positively identify a North Korean remote IT worker employed at your company?

    Because Jasper Sleet activity follows legitimate job offers and authorized access, Microsoft recommends approaching confirmed or suspected Jasper Sleet intrusions with an insider risk approach using your organization’s insider risk response plan or incident response provider like Microsoft Incident Response. Some steps might include:

    • Restrict response efforts to a small, trusted insider risk working group, trained in operational security (OPSEC) to avoid tipping off subjects and potential collaborators.
    • Rapidly evaluate the subject’s proximity to critical assets, such as:
      • Leadership or sensitive teams
      • Direct reports or vendor staff the subject has influence over
      • Suppliers or vendors
      • People/non-people accounts, production/pre-production environments, shared accounts, security groups, third-party accounts, security groups, distribution groups, data clusters, and more
    • Conduct preliminary link analysis to:
      • Detect relationships with potential collaborators, supporters, or other potential aliases operated by the same actor
      • Identify shared indicators (for example, shared IP addresses, behavioral overlap)
      • Avoid premature action that might alert other Jasper Sleet operators
    • Conduct a risk-based prioritization of efforts, informed by:
      • Placement and access to critical assets (not necessarily where you identified them)
      • Stakeholder insight from potentially impacted business units
      • Business impact considerations of containment (which might support additional collection/analysis) or mitigation (for example, eviction)
    • Conduct open-source intelligence (OSINT) collection and analysis to:
      • Determine if the identity associated with the threat actor is associated with a real person. For example, North Korean IT workers have leveraged stolen identities of real US persons to facilitate their fraud. Conduct OSINT on all available personally identifiable information (PII) provided by the actor (name, date of birth, SSN, home of record, phone number, emergency contact, and others) and determine if these items are linked to additional North Korean actors, and/or real persons’ identities.
      • Gather all known external accounts operated by the alias/persona (for example, LinkedIn, GitHub, freelance working sites, bug bounty programs).
      • Perform analysis on account images using open-source tools such as FaceForensics++ to determine prevalence of AI-generated content. Detection opportunities within video and imagery include: 
        • Temporal consistency issues: Rapid movements cause noticeable artifacts in video deepfakes as the tracking system struggles to maintain accurate landmark positioning. 
        • Occlusion handling: When objects pass over the AI-generated content such as the face, deepfake systems tend to fail at properly reconstructing the partially obscured face.
        • Lighting adaptation: Changes in lighting conditions might reveal inconsistencies in the rendering of the face
        • Audio-visual synchronization: Slight delays between lip movements and speech are detectable under careful observation
          • Exaggerated facial expressions. 
          • Duplicative or improperly placed appendages.
          • Pixelation or tearing at edges of face, eyes, ears, and glasses.
    • Engage counterintelligence or insider risk/threat teams to:
      • Understand tradecraft and likely next steps
      • Gain national-level threat context, if applicable
    • Make incremental, risk-based investigative and response decisions with the support of your insider threat working group and your insider threat stakeholder group; one providing tactical feedback and the other providing risk tolerance feedback.
    • Preserve evidence and document findings.
    • Share lessons learned and increase awareness.
    • Educate employees on the risks associated with insider threats and provide regular security training for employees to recognize and respond to threats, including a section on the unique threat posed by North Korean IT workers.

    After an insider risk response to Jasper Sleet, it might be necessary to also conduct a thorough forensic investigation of all systems that the employee had access to for indicators of persistence, such as RMM tools or system/resource modifications.

    For additional resources, refer to CISA’s Insider Threat Mitigation Guide. If you suspect your organization is being targeted by nation-state cyber activity, report it to the appropriate national authority. For US-based organizations, the Federal Bureau of Investigation (FBI) recommends reporting North Korean remote IT worker activity to the Internet Crime Complaint Center (IC3).

    Microsoft Defender XDR detections

    Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, apps to provide integrated protection against attacks like the threat discussed in this blog.

    Customers with provisioned access can also use Microsoft Security Copilot in Microsoft Defender to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.

    Microsoft Defender XDR

    Alerts with the following titles in the security center can indicate threat activity on your network:

    • Sign-in activity by a suspected North Korean entity

    Microsoft Defender for Endpoint

    Alerts with the following titles in the security center can indicate Jasper Sleet RMM activity on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Suspicious usage of remote management software
    • Suspicious connection to remote access software

    Microsoft Defender for Identity

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Atypical travel
    • Suspicious behavior: Impossible travel activity

    Microsoft EntraID Protection

    Microsoft Entra ID Protection risk detections inform Entra ID user risk events and can indicate associated threat activity, including unusual user activity consistent with known patterns identified by Microsoft Threat Intelligence research. Note, however, that these alerts can be also triggered by unrelated threat activity.

    • Microsoft Entra threat intelligence (sign-in): (RiskEventType: investigationsThreatIntelligence)

    Microsoft Defender for Cloud Apps

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Impossible travel activity

    Microsoft Security Copilot

    Security Copilot customers can use the standalone experience to create their own prompts or run the following pre-built promptbooks to automate incident response or investigation tasks related to this threat:

    • Incident investigation
    • Microsoft User analysis
    • Threat actor profile

    Note that some promptbooks require access to plugins for Microsoft products such as Microsoft Defender XDR or Microsoft Sentinel.

    Hunting queries

    Microsoft Defender XDR

    Because organizations might have legitimate and frequent uses for RMM software, we recommend using the Microsoft Defender XDR advanced hunting queries available on GitHub to locate RMM software that hasn’t been endorsed by your organization for further investigation. In some cases, these results might include benign activity from legitimate users. Regardless of use case, all newly installed RMM instances should be scrutinized and investigated.

    If any queries have high fidelity for discovering unsanctioned RMM instances in your environment, and don’t detect benign activity, you can create a custom detection rule from the advanced hunting query in the Microsoft Defender portal. 

    Microsoft Sentinel

    The alert Insider Risk Sensitive Data Access Outside Organizational Geo-locationjoins Azure Information Protection logs (InformationProtectionLogs_CL) with Microsoft Entra ID sign-in logs (SigninLogs) to provide a correlation of sensitive data access by geo-location. Results include:

    • User principal name
    • Label name
    • Activity
    • City
    • State
    • Country/Region
    • Time generated

    The recommended configuration is to include (or exclude) sign-in geo-locations (city, state, country and/or region) for trusted organizational locations. There is an option for configuration of correlations against Microsoft Sentinel watchlists. Accessing sensitive data from a new or unauthorized geo-location warrants further review.

    References

    Acknowledgments

    For more information on North Korean remote IT worker operations, we recommend reviewing DTEX’s in-depth analysis in the report Exposing DPRK’s Cyber Syndicate and IT Workforce.

    Learn more

    Meet the experts behind Microsoft Threat Intelligence, Incident Response, and the Microsoft Security Response Center at our VIP Mixer at Black Hat 2025. Discover how our end-to-end platform can help you strengthen resilience and elevate your security posture.

    For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog. 

    To get notified about new publications and to join discussions on social media, follow us on LinkedIn, X (formerly Twitter), and Bluesky. 

    To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast. 

    MIL OSI Economics

  • MIL-OSI USA: Sen. Budd Votes for the One Big Beautiful Bill Act ToDeliver Historic Tax Cuts for North Carolina Families

    US Senate News:

    Source: United States Senator Ted Budd (R-North Carolina)
    Washington, D.C. — U.S. Senator Ted Budd (R-N.C.) released the following statement after voting in support of President Trump’s One Big Beautiful Bill Act, historic legislation that lowers taxes for families, makes America safer and more secure, and unleashes economic growth for the future:
    “I voted in favor of the One Big Beautiful Bill Act because the people of North Carolina deserve more of their hard-earned wages, a more secure border, a reinvigorated military, responsible spending reforms for government programs, and a thriving economy. My colleagues and I fought successfully to protect North Carolina’s tobacco growers to help them stay competitive with China. I am also grateful that this bill included my PELL Act, which will help Americans earn in-demand credentials for rewarding careers. I hope my colleagues in the House quickly get this bill on President Trump’s desk because Americans cannot afford the largest tax increase in our nation’s history,” said Sen. Budd. 
    Here’s How the One Big Beautiful Bill Act Directly Benefits North Carolina:
    Provides Unprecedented Tax Relief for Families
    This legislation helps Americans keep more money in their pockets by extending key provisions of President Trump’s 2017 Tax Cuts and Jobs Act. Preventing the largest tax increase in American history will save the average North Carolinian $2,474 in 2026.
    Working families will receive significant savings with the increase and permanence of the child tax credit, expanded tax credits for paid leave, enhanced 529 savings accounts, and additional childcare access.
    This legislation lowers taxes for seniors relying on Social Security.
    Gives Workers the Tools They Need to Advance Their Careers
    Sen. Budd fought to have his PELL Act included in this legislation, a provision that expands Pell Grant eligibility for high-quality, short-term workforce programs. This would benefit individuals seeking to advance their careers without long-term debt while also providing American businesses with a broader, better-prepared talent pool ready to meet the demands of a rapidly evolving economy.
    Protects North Carolina Agriculture
    Sen. Budd successfully defended tobacco’s eligibility to receive the “duty drawback,” allowing tobacco manufacturers to receive reimbursement for the tariffs they pay on materials used to produce tobacco products that they ship to international markets. This will protect North Carolina growers and prevent the tobacco market from being flooded with cheaper, lower-quality products from China and Brazil.
    This legislation provides serious tax relief for North Carolina farmers by raising the death tax exemption, ensuring family farms can be passed down to future generations, rather than being broken up and sold.
    Unlocks Economic Growth & American Manufacturing
    This legislation will create a renaissance in American manufacturing by delivering full expensing for companies that build new factories and invest in equipment and machinery. This will help create new, good-paying jobs.
    By enhancing the small business deduction and making it permanent, small businesses will be able to hire more workers.
    Increasing deductions for small businesses’ equipment and property will quickly help businesses grow.
    Reduces Government Spending to Preserve & Protect Government Programs
    This legislation contains the first structural reforms to address waste, fraud, and abuse in key government programs like SNAP and Medicaid in over three decades. Slowing the rate of exponential cost increases will result in significant deficit savings and will preserve and protect these programs for future generations.
    Invests in America’s National Defense
    Sen. Budd helped secure funding to boost manufacturing capacity for the next generation of the F-15, the F-15EX, which will sustain the training mission at Seymour Johnson far into the future. 
    This legislation also includes significant funding to enhance America’s air superiority by preventing the retirement of the F-15E aircraft flying out of Seymour Johnson Air Force Base. 
    America’s troops deserve a pay raise. This legislation increases pay and allowances while making improvements to housing, healthcare, childcare, and education.
    This legislation makes generational investments in our military readiness that will protect the American homeland and deter our adversaries by boosting America’s missile defense by building the “Golden Dome.”
    Sen. Budd worked to secure investments to improve housing at Fort Bragg and Seymour Johnson and funds for restoration and modernization at Camp Lejeune.
    This legislation creates new production lines to scale innovative, cost-effective munitions, so we are no longer shooting $4M missiles at $50,000 drones.
    This legislation makes the largest ever investment in the Coast Guard’s history, which will purchase more than 40 new helicopters and six new C-130J aircraft, which will be serviced at the Aviation Technical Training Center in Elizabeth City. The legislation also funds 17 new icebreakers to protect American interests and 21 new cutters to combat drug runners and human traffickers.
    Keeps America’s Border Secure
    While President Trump’s policies have resulted in a dramatic drop-off of illegal immigration, this legislation also boosts America’s border security by surging funding for 3,000 new Border Patrol agents and 10,000 new ICE agents. The One Big Beautiful Bill also increases funding to finish President Trump’s border wall.
    Ushers in Next-Generation Technologies
    This legislation includes funding for the transformational air traffic control modernization project underway at the FAA. This will quickly update aging and failing technologies to keep Americans safe in the sky.
    This legislation makes a historic amount of spectrum available for commercial use, which will create new jobs and unleash the next generation of wireless technology. This will ensure America remains the premier destination for innovation and help unleash a new area of advanced manufacturing. This will also make the internet faster & more dependable across the country through commercial success stories like 5G, 6G, wi-fi, and private networks using CBRS.

    MIL OSI USA News

  • MIL-OSI United Kingdom: ARU students across region to celebrate graduation

    Source: Anglia Ruskin University

    An ARU graduation ceremony at Chelmsford Cathedral

    July will see approximately 6,000 Anglia Ruskin University (ARU) students across the East of England cross the stage to graduate, ready to take the next step in their careers.

    Ceremonies begin at the Cambridge Corn Exchange from Monday, July 7 until Wednesday, July 9. In addition to students formally receiving their degrees, an honorary doctorate will be bestowed on Nadia Edwards-Dashti, entrepreneur, author, equity and inclusion thought-leader, and co-founder of London-based Harrington Starr, a global leader in FinTech recruitment.

    Peterborough Cathedral will host the first ever set of graduations for ARU Peterborough students at 2pm on Friday, 11 July.

    On Monday, 14 July, graduation ceremonies take place in Essex, with 21 ceremonies to be held at Chelmsford Cathedral across the week.

    On Thursday, 17 July, ARU will bestow the award of Honorary Doctor of Business Administration on alumnus Vice Admiral Andrew Kyte, the Royal Navy’s Chief of Defence Logistics and Support.

    Many of the 6,000 students due to attend graduation ceremonies this month will go on to take up vital roles in public service, including careers as doctors and police officers.

    “Graduation is always a fantastic occasion, not only for our students and their families, but also our staff who have worked with them for several years to help them to earn their degree.

    “My warmest congratulations to all our graduates, we are extremely proud of them and they will always be part of our ARU community.”

    Professor Roderick Watkins, Vice Chancellor of Anglia Ruskin University (ARU)

    MIL OSI United Kingdom

  • MIL-OSI USA: The Justice Department Files Lawsuit Against Sanctuary City Policies In Los Angeles, California

    Source: US State of North Dakota

    Today, the Department of Justice filed a lawsuit against the City of Los Angeles, California, Los Angeles Mayor Karen Bass, and the Los Angeles City Council over policies that Los Angeles enacted shortly after President Donald J. Trump’s reelection to interfere with the federal government’s enforcement of its immigration laws.

    Not only are Los Angeles’s “sanctuary city” policies illegal under federal law, but, as alleged in the complaint, Los Angeles’s refusal to cooperate with federal immigration authorities contributed to the recent lawlessness, rioting, looting, and vandalism that was so severe that it required the federal government to deploy the California National Guard and the United States Marines to quell the chaos.

    “Sanctuary policies were the driving cause of the violence, chaos, and attacks on law enforcement that Americans recently witnessed in Los Angeles,” said Attorney General Pamela Bondi. “Jurisdictions like Los Angeles that flout federal law by prioritizing illegal aliens over American citizens are undermining law enforcement at every level – it ends under President Trump.”

    “Today’s lawsuit holds the City of Los Angeles accountable for deliberately obstructing the enforcement of federal immigration law,” said U.S. Attorney Bill Essayli for the Central District of California. “The United States Constitution’s Supremacy Clause prohibits the City from picking and choosing which federal laws will be enforced and which will not. By assisting removable aliens in evading federal law enforcement, the City’s unlawful and discriminatory ordinance has contributed to a lawless and unsafe environment that this lawsuit will help end.”

    On her first day in office, Attorney General Bondi instructed the Department’s Civil Division to identify state and local laws, policies, and practices that facilitate violations of federal immigration laws or impede lawful federal immigration operations, and, where appropriate, to take legal action to challenge such laws, policies, and practices. Today’s lawsuit is the latest in a series of lawsuits brought by the Civil Division targeting illegal sanctuary city policies across the country, including in New York and New Jersey.

    MIL OSI USA News

  • MIL-OSI USA: Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes

    Source: US State of North Dakota

    Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers

    The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.

    According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.

    As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.

    “These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”

    “North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”

    “North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”

    Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts

    Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme. 

    “The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”

    According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).

    Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.

    IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files  containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.

    Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.

    Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.

    The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.

    Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.

    Kim Kwang Jin et al. Indictment – Northern District of Georgia

    Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.

    “The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”

    According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

    After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

    To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.

    The FBI Atlanta Field Office is investigating the case.

    Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.

    21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District

    Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.

    Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.

    ***

    The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.

    As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.

    Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.

    The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.

    The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI USA: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: US State of California

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: United States Attorneys General

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: United States Attorneys General

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: The Justice Department Files Lawsuit Against Sanctuary City Policies In Los Angeles, California

    Source: United States Attorneys General

    Today, the Department of Justice filed a lawsuit against the City of Los Angeles, California, Los Angeles Mayor Karen Bass, and the Los Angeles City Council over policies that Los Angeles enacted shortly after President Donald J. Trump’s reelection to interfere with the federal government’s enforcement of its immigration laws.

    Not only are Los Angeles’s “sanctuary city” policies illegal under federal law, but, as alleged in the complaint, Los Angeles’s refusal to cooperate with federal immigration authorities contributed to the recent lawlessness, rioting, looting, and vandalism that was so severe that it required the federal government to deploy the California National Guard and the United States Marines to quell the chaos.

    “Sanctuary policies were the driving cause of the violence, chaos, and attacks on law enforcement that Americans recently witnessed in Los Angeles,” said Attorney General Pamela Bondi. “Jurisdictions like Los Angeles that flout federal law by prioritizing illegal aliens over American citizens are undermining law enforcement at every level – it ends under President Trump.”

    “Today’s lawsuit holds the City of Los Angeles accountable for deliberately obstructing the enforcement of federal immigration law,” said U.S. Attorney Bill Essayli for the Central District of California. “The United States Constitution’s Supremacy Clause prohibits the City from picking and choosing which federal laws will be enforced and which will not. By assisting removable aliens in evading federal law enforcement, the City’s unlawful and discriminatory ordinance has contributed to a lawless and unsafe environment that this lawsuit will help end.”

    On her first day in office, Attorney General Bondi instructed the Department’s Civil Division to identify state and local laws, policies, and practices that facilitate violations of federal immigration laws or impede lawful federal immigration operations, and, where appropriate, to take legal action to challenge such laws, policies, and practices. Today’s lawsuit is the latest in a series of lawsuits brought by the Civil Division targeting illegal sanctuary city policies across the country, including in New York and New Jersey.

    MIL Security OSI

  • MIL-OSI Security: Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes

    Source: United States Attorneys General

    Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers

    The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.

    According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.

    As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.

    “These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”

    “North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”

    “North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”

    Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts

    Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme. 

    “The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”

    According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).

    Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.

    IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files  containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.

    Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.

    Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.

    The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.

    Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.

    Kim Kwang Jin et al. Indictment – Northern District of Georgia

    Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.

    “The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”

    According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

    After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

    To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.

    The FBI Atlanta Field Office is investigating the case.

    Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.

    21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District

    Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.

    Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.

    ***

    The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.

    As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.

    Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.

    The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.

    The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI USA: ICYMI: Bipartisan Warren, Scott (Fla.) Letter Questions Biden Defense Secretary’s Decision to Launch Lobbying Firm

    US Senate News:

    Source: United States Senator for Massachusetts – Elizabeth Warren
    July 01, 2025
    Austin publicly promised Warren in 2021 he would not become a lobbyist after leaving government service
    “When our highest-ranking government officials and military officers treat their positions as steppingstones to personal enrichment, they corrupt the very institution they swore to defend.” 
    Text of Letter (PDF)
    Washington, D.C. — U.S. Senators Elizabeth Warren (D-Mass.) and Rick Scott (R-Fla.), both members of the Senate Armed Services Committee, wrote to former Secretary of Defense Lloyd Austin seeking an explanation and further information on his recent decision to start a strategic advisory firm. Austin had publicly promised Senator Warren during his 2021 confirmation process that he would not become a lobbyist after his government service ended. 
    On June 3, 2025, Politico reported that Austin was launching Clarion Strategies, along with other former Biden defense and national security officials, to help clients “navigate geopolitical upheaval…, advancements in defense technology…, [and] global trade shifts and emerging alliances among U.S. adversaries like Russia, China, North Korea and China.” This new venture undermines his promises to Senator Warren to “ensure that the public has no reason to question my impartiality” and “[had] no intent to be a lobbyist.” 
    “The revolving door between the Pentagon and K Street has been spinning for years during both Democratic and Republican administrations. In your case, this move is particularly disappointing because you made a clear promise during your nomination hearing to uphold the public trust,” wrote the senators. 
    Austin’s pledges helped secure similar commitments from other defense nominees, including Air Force Secretary Frank Kendall, Under Secretary of Defense for Research and Engineering Heidi Shyu, and Under Secretary of the Army Gabriel Camarillo. 
    Austin appears to have found a loophole by serving as an “adviser” rather than a registered lobbyist. 
    “[That] undermines the very purpose of the promise that you made to the American people: to close the revolving door of government officials cashing in on their public service by lobbying, advising…” wrote the lawmakers.
    The senators demanded clarity on Austin’s new role by July 14, 2025, including whether he’ll register to lobby on behalf of any company; if any current or prospective clients have contracts with the Defense Department; if he’ll work on behalf of any foreign government; if he’ll recuse from any matters involving any companies he worked with as Defense Secretary; and whether any clients would benefit from his security clearance. 
    As leaders of the Senate Armed Services Subcommittee on Personnel, Senators Warren and Scott held a hearing on the dangers of the revolving door. Both have also introduced legislation to tackle the revolving door, with Senator Warren introducing the Department of Defense Ethics and Anti-Corruption Act and Senator Scott introducing the Banning Lobbying and Safeguarding Trust (BLAST) Act to ban members of Congress from lobbying.
    Senator Warren has long sought to protect servicemembers and national security by pushing defense nominees to resolve their conflicts of interest: 
    In May 2025, Senator Warren pressed Mr. Michael Obadal, nominee for Under Secretary of the Army, on his refusal to divest from major defense contractors.
    In April 2025, Senator Warren secured a commitment from Lieutenant General John D. Caine, President Trump’s nominee to be the next Chairman of the Joint Chiefs of Staff, not to work for any major defense contractors—or companies affected by his official actions—after leaving government service. 
    In March 2025, ahead of his confirmation vote, Senator Elizabeth Warren wrote to Deputy Defense Secretary Nominee Stephen Feinberg, urging him to recuse himself from all matters related to Ligado Networks, which has a pending $39 billion lawsuit against the DoD. 
    In March 2025, Senator Elizabeth Warren wrote to Mr. Emil Michael, nominee for Under Secretary of Defense for Research and Engineering, with concern over his history of inappropriate behavior at work, his attacks on journalists and public accountability, and his ties to technology companies that may seek contracts with the Department of Defense. 
    In February 2025, ahead of his confirmation hearing before the Senate Armed Services Committee, Senator Elizabeth Warren wrote to Mr. Stephen Feinberg, nominee for Deputy Secretary of the Department of Defense, pressing him to explain his “serious conflicts of interest” and his track record of mismanagement.
    In January 2025, Senator Elizabeth Warren wrote to Mr. Michael Duffey, nominee for Under Secretary of Defense for Acquisition and Sustainment of the Department of Defense, ahead of his confirmation hearing, with serious concerns about his record, which include violating the law, disregarding Congressional authority, and his involvement in Project 2025. 
    In January 2025, Senator Elizabeth Warren wrote to Mr. Pete Hegseth, nominee for Secretary of the Department of Defense, regarding his ethics conflicts ahead of the Senate’s consideration of his nomination. Mr. Hegseth’s household’s ownership of stock in several defense contractors and his unwillingness to commit to the same post-employment restrictions he previously advocated for were particularly troubling for a prospective Secretary of Defense.
    In March 2024, Senator Elizabeth Warren secured ethics commitments from Douglas Schmidt, ahead of his confirmation to be the Director of Operational Test and Evaluation (DOT&E) for the Department of Defense.
    In July 2023, Senator Elizabeth Warren secured a commitment from General Charles Q. Brown, Jr., President Biden’s nominee to be the next Chairman of the Joint Chiefs of Staff, not to become a defense industry lobbyist or receive compensation from a defense contractor for four years after leaving government service. 
    In June 2023, Senator Elizabeth Warren and representative Andy Kim reintroduced the Department of Defense Ethics and Anti-Corruption Act, to limit the influence of contractors on the military, constrain foreign influence on retired senior military officers, and assert greater transparency over contractors and their interaction with DoD.
    In July 2021, Senator Elizabeth Warren secured agreements to four-year recusals from former clients’ and employers’ party matters from then-Secretary of the Air Force Frank Kendall and then-USD(R&E) Heidi Shyu.

    MIL OSI USA News